Ph.D. in Computer Science and Engineering, University of Washington, 1993.
M.S. in Computer Science and Engineering, University of Washington, 1991.
B.S. in Physics, with Honors, California Institute of Technology, 1985.
Employment
Associate Professor of Computer Science, Princeton University, 1999-present.
Assistant Professor of Computer Science, Princeton University, 1993-1999.
Senior Computing Analyst, Caltech Concurrent Computing Project, California Institute of Technology, 1986-1989.
Honors and Awards
Alfred P. Sloan Fellowship, 1997.
Emerson Electric, E. Lawrence Keyes Faculty Advancement Award, Princeton University School of Engineering, 1996.
National Young Investigator award, 1994.
Research Interests
Computer and communications security, especially
relating to consumer devices and software. Impact of the law on technology.
Operating systems. Internet software.
Security of mechanisms for distributing executable content over the Internet. Interaction of security with programming languages and operating systems. Distributed computing. Parallel computing architecture and software.
Professional Service
Submitted testimony
to Senate Judiciary Committee hearings on "Competition,
Innovation, and Public Policy in the Digital Age: Is the Marketplace
Working to Protect Digital Creative Works?", March 2002.
Member, ACM Advisory Committee on Security and Privacy.
Member, National Research Council Study on "Fundamentals of Computer
Science."
Member, Information Science and Technology (ISAT)
advisory board, Defense Advanced Research Projects Agency, U.S. Dept. of
Defense.
Co-chair, ISAT study on "Reconciling National Security with Privacy."
Selected Publications
A General and Flexible Access Control System for the Web. Lujo Bauer, Michael
A. Schneider, and Edward W. Felten. To appear, Proceedings of 11th Usenix
Security Symposium, August 2002.
Timing Attacks on Web Privacy.
Edward W. Felten and Michael A. Schneider.
Proc. of 7th ACM Conference on Computer and Communications Security, Nov.
2000.
Statically Scanning Java Code: Finding Security Vulnerabilities. John Viega,
Tom Mutdosch, Gary McGraw, and Edward W. Felten. IEEE Software, 17(5),
Sept./Oct. 2000.
An Empirical Study of the SHRIMP System. Matthias A. Blumrich, Richard D.
Alpert, Yuqun Chen, Douglas W. Clark, Stefanos, N. Damianakis, Cezary
Dubnicki, Edward W. Felten, Liviu Iftode, Margaret Martonosi, Robert A.
Shillner, and Kai Li. Proc. of 25th International Symposium on Computer
Architecture, June 1998.
Performance Measurements for Multithreaded Programs. Minwen Ji, Edward
W. Felten, and Kai Li. Proc. of 1998 SIGMETRICS Conference, June 1998.
Java Security: Web Browsers and Beyond. Drew Dean, Edward W. Felten,
Dan S. Wallach, and Dirk Balfanz. In "Internet Besieged: Countering
Cyberspace Scofflaws," Dorothy E. Denning and Peter J. Denning, eds.
ACM Press, New York, 1997.
Extensible Security Architectures for Java. Dan S. Wallach, Dirk Balfanz,
Drew Dean, and Edward W. Felten. Proc. of 16th ACM Symposium on
Operating Systems Principles, Oct. 1997. Outstanding Paper Award.
Web Spoofing:
An Internet Con Game. Edward W. Felten, Dirk Balfanz, Drew
Dean, and Dan S. Wallach. Proc. of 20th National Information Systems
Security Conference, Oct. 1997.
A Java Filter.
Dirk Balfanz and Edward W. Felten. Technical Report 567-97,
Dept. of Computer Science, Princeton University, October 1997.
Inside RISKS: Webware Security. Edward W. Felten. Communications of the ACM,
40(4):130, 1997.
Stream Sockets on SHRIMP. Stefanos N. Damianakis, Cezary Dubnicki, and
Edward W. Felten. Proc. of 1st Intl. Workshop on Communication and
Architectural Support for Network-Based Parallel Computing, February 1997.
(Proceedings available as Lecture Notes in Computer Science #1199.)
Early Experience with Message-Passing on the
SHRIMP Multicomputer. Richard D. Alpert, Angelos Bilas, Matthias
A. Blumrich, Douglas W. Clark, Stefanos Damianakis, Cezary Dubnicki,
Edward W. Felten, Liviu Iftode, and Kai Li. Proc. of 23rd
Intl. Symposium on Computer Architecture, 1996.