HOME

TheInfoList



OR:

Edward William Felten (born March 25, 1963) is the
Robert E. Kahn Robert Elliot Kahn (born December 23, 1938) is an American electrical engineer who, along with Vint Cerf, first proposed the Transmission Control Protocol (TCP) and the Internet Protocol (IP), the fundamental communication protocols at the hear ...
Professor of Computer Science and Public Affairs at
Princeton University Princeton University is a private research university in Princeton, New Jersey. Founded in 1746 in Elizabeth as the College of New Jersey, Princeton is the fourth-oldest institution of higher education in the United States and one of the ...
, where he was also the Director of the Center for Information Technology Policy from 2007 to 2015 and from 2017 to 2019. On November 4, 2010, he was named Chief Technologist for the
Federal Trade Commission The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) antitrust law and the promotion of consumer protection. The FTC shares jurisdiction ov ...
, a position he officially assumed January 3, 2011. On May 11, 2015, he was named the Deputy U.S. Chief Technology Officer. Felten has done a variety of
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
research, including groundbreaking work on proof-carrying authentication and work on security related to the
Java programming language Java is a high-level, class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible. It is a general-purpose programming language intended to let programmers ''write once, run anyw ...
, but he is perhaps best known for his paper on the
Secure Digital Music Initiative Secure Digital Music Initiative (SDMI) was a forum formed in late 1998,Leonardo ChiariglioneRiding the Media Bits. Opening content protection chiariglione.org, 2003 composed of more than 200 IT, consumer electronics, security technology, ISP and re ...
(SDMI) challenge.


Biography

Felten attended the
California Institute of Technology The California Institute of Technology (branded as Caltech or CIT)The university itself only spells its short form as "Caltech"; the institution considers other spellings such a"Cal Tech" and "CalTech" incorrect. The institute is also occasional ...
and graduated with a degree in
Physics Physics is the natural science that studies matter, its fundamental constituents, its motion and behavior through space and time, and the related entities of energy and force. "Physical science is that department of knowledge which re ...
in 1985. He worked as a staff programmer at Caltech from 1986 to 1989 on a parallel supercomputer project at Caltech. He then enrolled as a graduate student in Computer Science at the
University of Washington The University of Washington (UW, simply Washington, or informally U-Dub) is a public research university in Seattle, Washington. Founded in 1861, Washington is one of the oldest universities on the West Coast; it was established in Seattle ...
. He was awarded a
Master of Science A Master of Science ( la, Magisterii Scientiae; abbreviated MS, M.S., MSc, M.Sc., SM, S.M., ScM or Sc.M.) is a master's degree in the field of science awarded by universities in many countries or a person holding such a degree. In contrast t ...
degree in 1991 and a Ph.D in 1993. His Ph.D. thesis was on developing an automated protocol for communication between parallel processors. In 1993, he joined the faculty of
Princeton University Princeton University is a private research university in Princeton, New Jersey. Founded in 1746 in Elizabeth as the College of New Jersey, Princeton is the fourth-oldest institution of higher education in the United States and one of the ...
in the Department of Computer Science as an Assistant Professor. He was promoted to Associate Professor in 1999 and to Professor in 2003. In 2006, he joined the
Woodrow Wilson School of Public and International Affairs The Princeton School of Public and International Affairs (formerly the Woodrow Wilson School of Public and International Affairs) is a professional public policy school at Princeton University. The school provides an array of comprehensive course ...
, but computer science remains his home department. In 2005, he became the Director of th
Center for Information and Technology Policy
at
Princeton Princeton University is a private research university in Princeton, New Jersey. Founded in 1746 in Elizabeth as the College of New Jersey, Princeton is the fourth-oldest institution of higher education in the United States and one of the ...
. He has served as a consultant to law firms, corporations, private foundations, and government agencies. His research involves computer security, and technology policy. He lives in
Princeton, New Jersey Princeton is a municipality with a borough form of government in Mercer County, in the U.S. state of New Jersey. It was established on January 1, 2013, through the consolidation of the Borough of Princeton and Princeton Township, both of wh ...
with his family. From 2006 to 2010, he was a member of the board of the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet c ...
(EFF). In 2007, he was inducted as a Fellow of the
Association for Computing Machinery The Association for Computing Machinery (ACM) is a US-based international learned society for computing. It was founded in 1947 and is the world's largest scientific and educational computing society. The ACM is a non-profit professional membe ...
. In November 2010, he was named Chief Technologist of the
Federal Trade Commission The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) antitrust law and the promotion of consumer protection. The FTC shares jurisdiction ov ...
. In 2013, Felton was elected a member of the
National Academy of Engineering The National Academy of Engineering (NAE) is an American nonprofit, non-governmental organization. The National Academy of Engineering is part of the National Academies of Sciences, Engineering, and Medicine, along with the National Academy o ...
for contributions to security of computer systems, and for impact on public policy. On May 11, 2015, he was named Deputy U.S. Chief Technology Officer for
The White House The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue NW in Washington, D.C., and has been the residence of every U.S. president since John Adams in 1800 ...
.


''United States v. Microsoft''

Felten was a witness for the United States government in '' United States v. Microsoft'', where the software company was charged with committing a variety of antitrust crimes. During the trial, Microsoft's attorneys denied that it was possible to remove the
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft which was used in the Windows line of operating systems (i ...
web browser from a
Windows 98 Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. The second operating system in the 9x line, it is the successor to Windows 95, and was released t ...
equipped computer without significantly impairing the operation of Windows. Citing research he had undertaken with Christian Hicks and Peter Creath, two of his former students, Felten testified that it was possible to remove Internet Explorer functionality from Windows without causing any problems with the operating system. He demonstrated his team's tool in court, showing 19 ways in which it is normally possible to access the web browser from the Windows platform that his team's tool rendered inaccessible. Microsoft argued that Felten's changes did not truly remove Internet Explorer but only made its functionality inaccessible to the end user by removing icons, shortcuts and the iexplore.exe executable file, and making changes to the system registry. This led to a debate as to what exactly constitutes the "web browser," since much of the core functionality of Internet Explorer is stored in a shared
dynamic-link library Dynamic-link library (DLL) is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems. These libraries usually have the file extension DLL, OCX (for libraries containing ActiveX controls), ...
, accessible to any program running under Windows. Microsoft also argued that Felten's tool did not even completely remove web-browsing capability from the system since it was still possible to access the web through other Windows executables besides iexplore.exe, such as the Windows help system.


The SDMI challenge

As part of a contest in 2000,
SDMI Secure Digital Music Initiative (SDMI) was a forum formed in late 1998,Leonardo ChiariglioneRiding the Media Bits. Opening content protection chiariglione.org, 2003 composed of more than 200 IT, consumer electronics, security technology, ISP and r ...
(Secure Digital Music Initiative) invited researchers and others to try to break the
digital audio Digital audio is a representation of sound recorded in, or converted into, digital form. In digital audio, the sound wave of the audio signal is typically encoded as numerical samples in a continuous sequence. For example, in CD audio, sam ...
watermark A watermark is an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations ...
technologies that they had devised. In a series of individual challenges, the participants were given a sample audio piece, with one of the watermarks embedded. If the participants sent back the sample with the watermark removed (and with less than an acceptable amount of signal loss, though this condition was not stated by SDMI), they would win that particular challenge. Felten was an initial participant of the contest. He chose to opt out of
confidentiality Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information. Legal confidentiality By law, lawyers are often required ...
agreements that would have made his team eligible for the cash prize. Despite being given very little or no information about the watermarking technologies other than the audio samples and having only three weeks to work with them, Felten and his team managed to modify the files sufficiently that SDMI's automated judging system declared the watermark removed. SDMI did not accept that Felten had successfully broken the watermark according to the rules of the contest, noting that there was a requirement for files to lose no sound quality. SDMI claimed that the automated judging result was inconclusive, as a submission which simply wiped all the sounds off the file would have successfully removed the watermark but would not meet the quality requirement.


SDMI lawsuits

Felten's team developed a scientific paper explaining the methods used by his team in defeating the SDMI watermarks. Planning to present the paper at the Fourth International
Information Hiding In computer science, information hiding is the principle of segregation of the ''design decisions'' in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decisio ...
Workshop of 2001 in
Pittsburgh Pittsburgh ( ) is a city in the Commonwealth (U.S. state), Commonwealth of Pennsylvania, United States, and the county seat of Allegheny County, Pennsylvania, Allegheny County. It is the most populous city in both Allegheny County and Wester ...
, Felten was threatened with legal action by SDMI, the
Recording Industry Association of America The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and ...
(RIAA), an
Verance Corporation
under the terms of the DMCA, on the argument that one of the technologies his team had broken was currently in use in the market. Felten withdrew the presentation from the workshop, reading a brief statement about the threats instead. SDMI and other copyright holders denied that they had ever threatened to sue Felten. However, SDMI appears to have threatened legal action when spokesman Matt Oppenheim warned Felten in a letter that "any disclosure of information gained from participating in the Public Challenge....could subject you and your research team to actions under the Digital Millennium Copyright Act.". Felten, with help from the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet c ...
, sued the groups, requesting a declaratory judgement ruling that their publication of the paper would be legal. The case was dismissed for a lack of standing. Felten presented his paper at the USENIX security conference in 2001. The
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United State ...
has offered Felten and other researchers assurances that the DMCA does not threaten their work and stated that the legal threats against them were invalid.


Sony rootkit investigation

The 2005 Sony BMG CD copy protection scandal started when security researcher
Mark Russinovich Mark Eugene Russinovich (born December 22, 1966) is a Spanish-born American software engineer and author who serves as CTO of Microsoft Azure. He was a cofounder of software producers Winternals before it was acquired by Microsoft in 2006. Ea ...
revealed on October 31, 2005 that Sony's Extended Copy Protection ("XCP")
copy protection Copy protection, also known as content protection, copy prevention and copy restriction, describes measures to enforce copyright by preventing the reproduction of software, films, music, and other media. Copy protection is most commonly found on ...
software on the CD '' Get Right with the Man'' by Van Zant contained hidden files that could damage the operating system, install
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
and make the user's computer vulnerable to attack when the CD was played on a Microsoft Windows-based PC. Sony then released a software patch to remove XCP. On November 15, 2005, Felten and J. Alex Halderman showed that Sony's method for removing XCP copy protection software from the computer makes it more vulnerable to attack, as it essentially installed a
rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exi ...
, in the form of an Active X control used by the uninstaller, and left it on the user's machine and set so as to allow any web page visited by the user to execute arbitrary code. Felten and Halderman described the problem in a blog post:
The consequences of the flaw are severe, it allows any Web page you visit to download, install, and run any code it likes on your computer. Any Web page can seize control of your computer; then it can do anything it likes. That's about as serious as a security flaw can get.


Diebold voting machine analysis

On September 13, 2006, Felten and graduate students Ariel Feldman and Alex Halderman discovered severe security flaws in a Diebold Election Systems (now
Premier Election Solutions Premier Election Solutions, formerly Diebold Election Systems, Inc. (DESI), was a subsidiary of Diebold that made and sold voting machines. In 2009, it was sold to competitor ES&S. In 2010, Dominion Voting Systems purchased the primary asset ...
)
voting machine A voting machine is a machine used to record votes in an election without paper. The first voting machines were mechanical but it is increasingly more common to use '' electronic voting machines''. Traditionally, a voting machine has been defi ...
. Their findings claimed, "Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss."


Sequoia voting machine analysis

In early 2008, New Jersey election officials announced that they planned to send one or more Sequoia Advantage voting machines to Ed Felten and
Andrew Appel Andrew Wilson Appel (born 1960) is the Eugene Higgins Professor of computer science at Princeton University. He is especially well-known because of his compiler books, the ''Modern Compiler Implementation in ML'' () series, as well as ''Compiling ...
(also of Princeton University) for analysis. In March 2008, Sequoia sent an e-mail to Professor Felten asserting that allowing him to examine Sequoia voting machines would violate the license agreement between Sequoia and the county which bought them, and also that Sequoia would take legal action "to stop ..any non-compliant analysis, ..publication of Sequoia software, its behavior, reports regarding same or any other infringement of our intellectual property." This action sparked outrage among computer technology activists. After examining Sequoia's machines, Felten and Appel indeed discovered grave problems with the accuracy of the machines.Ed Felten
NJ Election Discrepancies Worse Than Previously Thought, Contradict Sequoia's Explanation
''Freedom To Tinker'', April 4th, 2008.
They also demonstrated that the machines can be hacked and compromised within minutes.Andrew Appel
Security Seals on AVC Advantage Voting Machines are Easily Defeated
''Freedom To Tinker'', December 19th, 2008.
Shortly after that, Sequoia's corporate Web site was hacked. The hack was first discovered by Ed Felten. Sequoia took its Web site down on 20 March and removed the "intrusive content."


Cold boot attack

In February 2008, Felten and his students were part of the team that discovered the
cold boot attack In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) ...
, which allows someone with physical access to a computer to bypass operating system protections and extract the contents of its memory.


Federal Trade Commission

In November 2010, Felten was named the first Chief Technologist of the
Federal Trade Commission The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) antitrust law and the promotion of consumer protection. The FTC shares jurisdiction ov ...
, for which he took a one-year leave of absence from Princeton University.


Awards

*Member of the
American Academy of Arts and Sciences The American Academy of Arts and Sciences (abbreviation: AAA&S) is one of the oldest learned societies in the United States. It was founded in 1780 during the American Revolution by John Adams, John Hancock, James Bowdoin, Andrew Oliver, ...
, elected 2011 *Member of the
National Academy of Engineering The National Academy of Engineering (NAE) is an American nonprofit, non-governmental organization. The National Academy of Engineering is part of the National Academies of Sciences, Engineering, and Medicine, along with the National Academy o ...
, elected 2013


References


External links


Edward W. Felten
at Princeton
Freedom to Tinker
* *
Verance Corporation
* * * {{DEFAULTSORT:Felten, Edward 1963 births Living people American male bloggers American bloggers American computer scientists Computer security academics Copyright activists Place of birth missing (living people) California Institute of Technology alumni University of Washington College of Engineering alumni Princeton University faculty Fellows of the Association for Computing Machinery Fellows of the American Academy of Arts and Sciences Members of the United States National Academy of Engineering Science bloggers