National Academies Press: OpenBook

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop (2019)

Chapter: Appendix C: Planning Committee and Staff Biographies

« Previous: Appendix B: Additional Discussion Questions from Sponsor
Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×

C

Planning Committee and Staff Biographies

FREDERICK R. CHANG, Workshop Chair, is the chair of the Computer Science Department in the Lyle School of Engineering at Southern Methodist University (SMU). He is also the executive director of the Darwin Deason Institute for Cyber Security, the Bobby B. Lyle Endowed Centennial Distinguished Chair in Cyber Security, and professor in the Department of Computer Science. He is a senior fellow in the John Goodwin Tower Center for Political Studies in SMU’s Dedman College. Additionally, Dr. Chang’s career spans service in the private sector and in government including as the former director of research at the National Security Agency (NSA). He was elected as a member of the National Academy of Engineering (NAE) in 2016. He is currently the co-chair of the Intelligence Community Studies Board and a member of the Army Research Laboratory Technical Assessment Board of the National Academies of Sciences, Engineering, and Medicine, where he has also served as a member of the Computer Science and Telecommunications Board. He was a member of the Commission on Cybersecurity for the 44th Presidency, is the lead inventor on two U.S. patents, and has appeared before Congress as a cybersecurity expert witness on multiple occasions. Dr. Chang received his B.A. from the University of California, San Diego, and his M.A. and Ph.D. degrees from the University of Oregon. He has also completed the Program for Senior Executives at the Sloan School of Management at the Massachusetts Institute of Technology. He has been awarded the NSA Director’s Distinguished Service Medal.

KATHLEEN FISHER is a professor and the chair of the Computer Science Department at Tufts University. Previously, she was a program manager at the Defense Advanced Research Projects Agency (DARPA) where she started and managed the High-Assurance Cyber Military Systems and Probabilistic Programming for Advanced Machine Learning programs, a consulting faculty member in the Computer Science Department at Stanford University, and a principal member of the technical staff at AT&T Labs Research. Dr. Fisher is an Association for Computing Machinery (ACM) fellow. She has served as program chair for Programming Language Design and Implementation, Object-Oriented Programming, Systems, Languages and Applications, International Conference on Functional Programming, Commercial Users of Functional Programming, Foundations of Object-Oriented Language, and as general chair for the International Conference on Functional Programming 2015. She is a former associate editor for Transactions on Programming Language and Systems and a former editor of the Journal of Functional Programming. Dr. Fisher is a past chair of the ACM Special Interest Group in Programming Languages (SIGPLAN) and past co-chair of the Computing Research Association’s Committee on the Status of Women. She is a recipient of the SIGPLAN Distinguished Service Award. She is vice chair of DARPA’s ISAT Study Group and a member of

Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×

the board of trustees of Harvey Mudd College. Dr. Fisher’s work involves developing domain-specific languages to make it easier to solve problems in particular domains. Examples include Hancock for stream processing, PADS for data format manipulation, and Forest for filestore management. She also works in the area of program synthesis, which uses search and/or machine learning techniques to generate programs from high-level specifications. Examples include synthesizing high-performance data structure(s) and concurrency control strategies for a given program and workload, inferring data descriptions from example data, and synthesizing lenses for synchronizing data stored in different formats. She is also interested in applying formal methods and other programming language techniques to produce software that is provably functionally correct with the goal of making hacking into systems much harder than it is today. She is currently working on building tools to make it possible to generate domain-specific language implementations and tools from high level specifications. Dr. Fisher received her Ph.D. in computer science from Stanford University.

ERIC HORVITZ is technical fellow and director of Microsoft Research Labs. He has pursued principles and applications of machine intelligence, with a focus on the use of probability and decision theory in systems that learn and reason. Dr. Horvitz has made contributions in automated diagnosis and decision support, models of bounded rationality, machine learning, human-computer collaboration, and human computation and crowdsourcing. His research and collaborations have led to fielded systems in health care, transportation, human-computer interaction, robotics, operating systems, networking, and aerospace. Dr. Horvitz has been awarded the Feigenbaum Prize and the Association for the Advancement of Artificial Intelligence (AAAI)-ACM Allen Newell Award for contributions to artificial intelligence and human-computer interaction. He is a member of the NAE, an elected fellow of the AAAI, the ACM, and the American Academy of Arts and Sciences, and he has been inducted into the CHI Academy. Dr. Horvitz serves on the CSTB and the National Security Commission on Artificial Intelligence. Dr. Horvitz earned a Ph.D. in biomedical informatics and an M.D. at Stanford University.

SUBBARAO “RAO” KAMBHAMPATI is a professor of computer science and engineering at Arizona State University (ASU). He joined ASU in 1991 and was promoted to associate professor in 1996 and professor in 2000. Prior to joining ASU, he was a research associate with the Center for Design Research and the Department of Computer Science at Stanford University. Dr. Rao’s research interests are in artificial intelligence with particular emphasis on planning, machine learning, analogical and case-based reasoning, and their applications to automated manufacturing. He is the recipient of a 3-year National Science Foundation (NSF) research initiation award in 1992 and a 5-year NSF Young Investigator award in 1994. He currently serves as the president of the AAAI. He completed his B.Tech. in electrical engineering at Indian Institute of Technology, Madras, India, in 1983. He received his M.S. (1985) and Ph.D. (1989) degrees in computer science from University of Maryland, College Park.

WENKE LEE is a professor and the John P. Imlay Jr. Chair in the College of Computing at the Georgia Institute of Technology. He also serves as the director of the Georgia Tech Information Security Center. Dr. Lee works in systems and network security. His current research projects are in the areas of botnet detection and attribution, malware analysis, virtual machine monitoring, mobile phone security, and detection and mitigation of information manipulation on the Internet, with funding from NSF, the Department of Homeland Security, the Department of Defense, and the industry. He has published over 100 articles with more than 40 of them cited more than 100 times. In 2006, Dr. Lee co-founded Damballa, Inc., a spin-off from his laboratory that focuses on botnet detection and mitigation. He received his Ph.D. in computer science from Columbia University in 1999.

JOHN MANFERDELLI is a professor of the practice and executive director of the Cybersecurity and Privacy Institute at Northeastern University. Immediately prior, Dr. Manferdelli was engineering director for production security development at Google, Inc. Prior to Google, he was a senior principal engineer at Intel Corporation and co-principal investigator (with David Wagner) for the Intel Science and Technology Center for Secure Computing at the University of California, Berkeley. He was also a member of the Information Science and Technology advisory group at DARPA and is a member of the Defense Science Board. Prior to Intel, Dr. Manferdelli was a distinguished engineer at Microsoft and was an affiliate faculty member in computer science at the University of

Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×

Washington. He was responsible for computer security, cryptography, and systems research, as well as research in quantum computing. At Microsoft, he also worked as a senior researcher, software architect, product unit manager, and general manager and was responsible the development of the next-generation secure computing base technologies and the rights management capabilities currently integrated into Windows, for which he was the original architect. He joined Microsoft in 1995, when it acquired his company, Natural Language, Inc., based in Berkeley, California. At Natural Language, Dr. Manferdelli was the founder and, at various times, vice president of research and development and CEO. Other positions he has held include staff engineer at TRW, Inc., computer scientist and mathematician at Lawrence Livermore National Laboratory, and principal investigator at Bell Labs. He was also an adjunct associate professor at Stevens Institute of Technology. Dr. Manferdelli’s professional interests include cryptography and cryptographic mathematics, combinatorial mathematics, operating systems, and computer security. He is also a licensed Radio Amateur (AI6IT). He has a bachelor’s degree in physics from the Cooper Union for the Advancement of Science and Art and a Ph.D. in mathematics from the University of California, Berkeley.

PHIL VENABLES is a senior advisor to the firm and a member of the board of directors of Goldman Sachs Bank. As a senior advisor, he supports the firm’s executive leadership and client franchise on cybersecurity, technology risk, digital business risk, and operational resilience. In addition to this, Mr. Venables spearheads the firm’s work with industry associations and initiatives to reduce systemic risk. He is also a member of the Firmwide Enterprise Risk Committee, the Firmwide Technology Risk Committee, and the Global Business Resilience Committee. Prior to becoming a senior advisor, he was a line executive as chief operational risk officer, and before that, the firm’s first chief information security officer and head of technology risk, a role he held for 17 years. He joined Goldman Sachs as a vice president in London in 2000 and transferred to New York in 2001. Mr. Venables was named managing director in 2003, partner in 2010, and senior advisor in 2019. Prior to joining the firm, he was chief information security officer at Deutsche Bank and also functioned as the global head of technology risk management for Standard Chartered Bank. Before that, Mr. Venables served in various technology, network management, and software engineering roles at a number of finance, energy, and defense organizations. He serves on the Executive Committee of the U.S. Financial Services Sector Coordinating Council for Critical Infrastructure Protection, is co-chair of the board of Sheltered Harbor, and is a member of the boards of the Center for Internet Security and the New York University School of Engineering. He is also an advisor to the cybersecurity efforts of the National Academies and serves on the advisory board to the director of a U.S. intelligence agency. Mr. Venables is a member of the Council on Foreign Relations. He earned a B.Sc. (Honors) in computer science from the University of York and an M.Sc. in computation and cryptography from the Queen’s College at Oxford University. He was awarded the designation of Chartered Engineer in 1995 and Chartered Scientist in 2002 and was elected a fellow of the British Computer Society in 2005.

Staff

EMILY GRUMBLING was a program officer with the CSTB of the National Academies through August 2019. Dr. Grumbling also served as study director for National Academies consensus reports, including Quantum Computing: Progress and Prospects and Information Technology and the U.S. Workforce: Where Are We and Where Do We Go From Here?, and as director and rapporteur for the National Academies workshops on Implications of Artificial Intelligence and Machine Learning for Cybersecurity and Privacy Research and Best Practices. She previously served as an AAAS Science and Technology Policy Fellow in the Directorate for Computer and Information Science and Engineering at NSF (2012-2014) and an American Chemical Society (ACS) Congressional Fellow in the U.S. House of Representatives (2011-2012). She currently serves as a member of the ACS governance Committee on Science, and as a visiting faculty member for Citizen Science, a January-term science literacy immersion program required of all first-year undergraduates at Bard College. She received her Ph.D. in physical chemistry from the University of Arizona in 2010 and her B.A. with a double-major in chemistry and film/electronic media arts from Bard College in 2004.

Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×

JON EISENBERG is the senior board director of the CSTB. Dr. Eisenberg has also been study director for a diverse body of work, including a series of studies exploring Internet and broadband policy and networking and communications technologies. In 1995-1997, he was a AAAS Science, Engineering, and Diplomacy Fellow at the U.S. Agency for International Development, where he worked on technology transfer and information and telecommunications policy issues. Dr. Eisenberg received his Ph.D. in physics from the University of Washington in 1996 and a B.S. in physics with honors from the University of Massachusetts, Amherst, in 1988.

KATIRIA ORTIZ is an associate program officer for the CSTB. She previously served as an intern at the U.S. Department of Justice and as an undergraduate research assistant at the Cybersecurity Quantification Laboratory at the University of Maryland, College Park. She received her M.A. in international science and technology policy from George Washington University and her B.S. in cell biology and molecular genetics and B.A. in criminology and criminal justice from the University of Maryland, College Park.

Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×
Page 76
Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×
Page 77
Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×
Page 78
Suggested Citation:"Appendix C: Planning Committee and Staff Biographies." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×
Page 79
Next: Appendix D: Speaker Biographies »
Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop Get This Book
×
Buy Paperback | $65.00 Buy Ebook | $54.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity.

The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!