Carl E. Landwehr
Born
CitizenshipAmerican
Alma materYale
University of Michigan
Known forComputer Security
AwardsNational Cyber Security Hall of Fame Inductee (2012)
IEEE Fellow (2013)
Scientific career
FieldsComputer science
InstitutionsMerit Network
Naval Research Laboratory
Mitretek Systems
National Science Foundation
University of Maryland
IARPA
George Washington University
ThesisLoad Sharing in Computer Networks: A Queueing Model (1974)
Doctoral advisorBernard A. Galler
Websitehttp://www.landwehr.org

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing.[1] His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures.[2] He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security.[3] The final committee report is available through the Cyber Security and Policy Institute of the George Washington University,[4] and the building code through the IEEE.[5]

Carl Landwehr has developed and led cybersecurity research programs at the National Science Foundation (2001-2004, 2009–2011), IARPA (2005-2009), Mitretek Systems and the Naval Research Laboratory (1982-1999). From 2007 to 2010, he served as editor-in-chief of IEEE Security & Privacy Magazine[6] as well as associate editor of several IEEE journals. He was a member of DARPA's Information Science and Technology Study Group and has served on several studies for the National Academy of Sciences. Research begun while visiting at the Isaac Newton Institute at Cambridge eventually led to the development of a patent for a secure identification system held by Dr. Landwehr and Daniel Latham.[7] He is the author of several highly cited publications.

Carl Landwehr holds degrees from Yale University (BS) and the University of Michigan (MS, PhD).[8] While at Michigan, he worked for the Merit Network, currently the longest running regional computer network in the United States.[9] He has taught and lectured widely, including at Purdue University, Georgetown University, Virginia Tech University, and the University of Maryland.[10] He is currently a lead research scientist at the Cyber Security Policy and Research Institute at George Washington University. In 2015 and 2016, Dr. Landwehr was the visiting McDevitt Professor of Computer Science at the McDevitt Center for Creativity and Innovation of LeMoyne College to develop and teach an inter-disciplinary undergraduate course entitled "Cybersecurity for Future Presidents".[11] In 2019, he became a visiting professor in the Electrical and Computer Engineering Division of the University of Michigan in Ann Arbor. Dr. Landwehr joined the Board of Directors of the Center for Democracy and Technology in September 2016.[12]

Carl Landwehr was interviewed by Gary McGraw of Cigital for the Silver Bullet podcasts on Security for IEEE discussing changing threats in cybersecurity.[13] He has also been interviewed for the computer history series hosted by the Charles Babbage Institute of the University of Minnesota.[14] For the 30th Anniversary IEEE Symposium on Security and Privacy, he provided a history of U.S. Government investments in cyber security research.[15]

Dr. Landwehr is an IEEE Fellow (2013) and has received various awards, including the ACM SIGSAC's Outstanding Contribution Award (2013)[16] and the National Science Foundation Director's Award for Meritorious Service (2012). He was a member of the founding class (2012) inducted into the National Cyber Security Hall of Fame.[17][18]

References

  1. "Carl Landwehr becomes NSF Trustworthy Computing Director". Institute for Systems Research. 30 November 2009. Retrieved 5 January 2013.
  2. "ACM Digital Library". ACM. 31 December 2013. Retrieved 5 June 2014.
  3. "NSF Where Discoveries Begin". NSF. 25 August 2014. Retrieved 5 February 2015.
  4. "Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security" (PDF). GWU. 8 January 2015. Archived from the original (PDF) on 5 February 2015. Retrieved 5 February 2015.
  5. "Building Code for Medical Device Software Security" (PDF). IEEE. 17 May 2015. Archived from the original (PDF) on 20 May 2015. Retrieved 17 May 2015.
  6. "Landwehr named editor-in-chief of IEEE Security and Privacy". Institute for Systems Research. 6 July 2006. Retrieved 5 January 2013.
  7. US 5892901, Landwehr, Carl & Latham, Daniel, "Secure Identification System", issued 6 April 1999
  8. "Disruptive Technologies for Information Assurance". Dartmouth College Institute for Security, Technology, and Society. Archived from the original on 5 February 2015. Retrieved 5 January 2013.
  9. Merit Network
  10. "Carl Landwehr named IEEE Fellow". Retrieved 15 January 2013.
  11. "McDevitt Center Appoints Endowed Chair and Visiting Professor of Computer Science". Lemoyne College. 5 June 2014. Retrieved 5 February 2015.
  12. "CDT Welcomes Three New Board Members". CDT. 15 September 2016. Retrieved 28 September 2016.
  13. "Show 061 - An Interview with Carl Landwehr". Cigital. 28 April 2011. Retrieved 8 January 2013.
  14. Landwehr, Carl E. (21 April 2014). "Oral History Interview with Carl E. Landwehr". Retrieved 4 February 2015.
  15. "CS Digital Library Abstract A History of US Government Investments in Cybersecurity Research: A Personal Perspective". IEEE Computer Society. 16–19 May 2010. Retrieved 8 January 2013.
  16. "ACM Special Interest Group on Security, Audit and Control (SIGSAC)". ACM. 31 May 2012. Archived from the original on 2 April 2013. Retrieved 14 January 2013.
  17. "Cyber Security Hall of Fame to induct 11 security pioneers". Infosecurity. 17 September 2012. Retrieved 5 January 2013.
  18. "National Cyber Security Hall of Fame". 6 January 2014. Archived from the original on 4 December 2013. Retrieved 6 January 2014.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.