John Alexander Halderman (born January 1981) is an American computer scientist. He currently serves as a professor of
computer science and engineering at the
University of Michigan
The University of Michigan (U-M, U of M, or Michigan) is a public university, public research university in Ann Arbor, Michigan, United States. Founded in 1817, it is the oldest institution of higher education in the state. The University of Mi ...
, as well as being the director of the Center for Computer Security and Society at
Michigan Engineering. His research focuses on
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
and
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
, with an emphasis on problems that broadly impact society and public policy.
Education
From
Princeton University
Princeton University is a private university, private Ivy League research university in Princeton, New Jersey, United States. Founded in 1746 in Elizabeth, New Jersey, Elizabeth as the College of New Jersey, Princeton is the List of Colonial ...
, Halderman received a
Bachelor of Arts
A Bachelor of Arts (abbreviated B.A., BA, A.B. or AB; from the Latin ', ', or ') is the holder of a bachelor's degree awarded for an undergraduate program in the liberal arts, or, in some cases, other disciplines. A Bachelor of Arts deg ...
''
summa cum laude'' in June 2003, a
Master of Arts
A Master of Arts ( or ''Artium Magister''; abbreviated MA or AM) is the holder of a master's degree awarded by universities in many countries. The degree is usually contrasted with that of Master of Science. Those admitted to the degree have ...
in June 2005, and a
Doctor of Philosophy
A Doctor of Philosophy (PhD, DPhil; or ) is a terminal degree that usually denotes the highest level of academic achievement in a given discipline and is awarded following a course of Postgraduate education, graduate study and original resear ...
in June 2009, all in computer science.
Career and research
As a student at Princeton, Halderman played a significant role in exposing flaws in
digital rights management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
(DRM) software used on
compact discs. In 2004, he discovered that a DRM system called
MediaMax CD-3 could be bypassed simply by holding down the
shift key
The Shift key is a modifier key on a alphanumeric keyboard, keyboard, used to type majuscule, capital letters and other alternate "upper" characters. There are typically two Shift keys, on the left and right sides of the row below the home row. T ...
while inserting a CD. The company behind the system briefly threatened him with a $10 million lawsuit, landing him on the front page of ''
USA Today
''USA Today'' (often stylized in all caps) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth in 1980 and launched on September 14, 1982, the newspaper operates from Gannett's corporate headq ...
''. Later, in 2005, he helped show that a DRM system called
Extended Copy Protection functioned identically to a
rootkit and weakened the security of computers in which audio CDs were played. The ensuing
Sony BMG copy protection rootkit scandal led to the recall of millions of CDs, class action lawsuits, and enforcement action by the U.S.
Federal Trade Commission
The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) United States antitrust law, antitrust law and the promotion of consumer protection. It ...
.
In 2008, Halderman led the team that discovered the
cold boot attack against
disk encryption, which allows an attacker with physical access to a computer device to extract encryption keys or other secrets from its memory. The technique, which was initially effective against nearly every full-disk encryption product on the market, exploits
DRAM data remanence to retrieve memory contents even after the device has been briefly powered off.
One version of the technique involves cooling DRAM modules with
freeze spray
Freeze spray (cold spray or vapocoolant) is a type of aerosol spray product containing a liquified gas used for rapidly cooling surfaces, in medical and industrial applications. It is usually sold in hand-held spray cans. It may consist of var ...
to slow data decay, then removing them from the computer and reading them in an external device. It has become an important part of
computer forensics practice and has also inspired a wide variety of defensive research, such as leakage-resilient cryptography and hardware implementations of encrypted RAM. For their work developing the attack, Halderman and his coauthors received the
Pwnie Award for Most Innovative Research and the Best Student Paper Award from the
USENIX Security Symposium.
At the
University of Michigan
The University of Michigan (U-M, U of M, or Michigan) is a public university, public research university in Ann Arbor, Michigan, United States. Founded in 1817, it is the oldest institution of higher education in the state. The University of Mi ...
, Halderman and coauthors performed some of the first comprehensive studies of
Internet censorship in China and in
Iran
Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, and of underground "
street networks" in Cuba. In 2009, he led a team that uncovered security problems and copyright infringement in
client-side censorship software mandated by the Chinese government. The findings helped catalyze popular protest against the program, leading China to reverse its policy requiring its installation on new PCs. In 2011, Halderman and his students invented
Telex
Telex is a telecommunication
Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communica ...
, a new approach to circumventing Internet censorship, partially by placing anticensorship technology into core network infrastructure outside the censoring country.
With support from the
United States Department of State
The United States Department of State (DOS), or simply the State Department, is an United States federal executive departments, executive department of the U.S. federal government responsible for the country's foreign policy of the United State ...
, which called the technique a "generational jump forward" in censorship resistance,
Halderman led a multi-institutional collaboration that further developed the technology and deployed it at ISP-scale under the name Refraction Networking. In 2015, United States Ambassador to the United Nations
Samantha Power brought him to New York to demonstrate the technology at a meeting alongside the
General Assembly.
In 2012, Halderman and coauthors discovered serious flaws in
random number generators that weakened the
public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
used for
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protoc ...
and
SSH servers in millions of
Internet of things
Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
devices. They
disclosed vulnerabilities to 60 device manufacturers and spurred changes to the
Linux
Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
kernel. Their work received the Best Paper Award at the USENIX Security Symposium and was named one of the notable computing articles of the year by ''
ACM Computing Reviews''. Halderman played a significant role in fixing several major vulnerabilities in the
TLS protocol. He was a co-discoverer of the
Logjam and
DROWN attacks, and conducted the first impact assessment of the
FREAK attack. The three flaws compromised the security of tens of millions of HTTPS websites and resulted in changes to HTTPS server software, web browsers, and the TLS protocol. Since they worked by exploiting remnants of ways in which older versions of the protocol had been deliberately weakened due to 1990s-era restrictions on the
export of cryptography from the United States, they carried lessons for the ongoing public policy debate about
cryptographic back doors for law enforcement.
Halderman's Logjam work also provided a plausible explanation for a major question raised by the
Edward Snowden revelations: how the
National Security Agency could be decoding large volumes of encrypted network traffic. By extrapolating their results to the resources of a major government, the researchers concluded that nation-state attackers could plausibly break 1,024-bit
Diffie-Hellman key exchange using a purpose-built
supercomputer
A supercomputer is a type of computer with a high level of performance as compared to a general-purpose computer. The performance of a supercomputer is commonly measured in floating-point operations per second (FLOPS) instead of million instruc ...
.
For a cost on the order of a hundred million dollars, an intelligence agency could break the cryptography used by about two-thirds of all
virtual private networks. Snowden publicly responded that he shared the researchers suspicions and blamed the U.S. government for failing to close a vulnerability that left so many people at risk. The work received the 2015
Pwnie Award for Most Innovative Research and was named Best Paper at the ACM Conference on Computer and Communications Security.
In 2013, Halderman and his
graduate students created
ZMap, a
free and open-source
Free and open-source software (FOSS) is software available under a Software license, license that grants users the right to use, modify, and distribute the software modified or not to everyone free of charge. FOSS is an inclusive umbrella term ...
security scanning tool designed for information security research.
By making efficient use of
network bandwidth, ZMap can scan the Internet's entire
IPv4
Internet Protocol version 4 (IPv4) is the first version of the Internet Protocol (IP) as a standalone specification. It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. ...
address space in under an hour, allowing researchers to quantify vulnerable systems, track the adoption of security patches, and even measure the impact of
natural disaster
A natural disaster is the very harmful impact on a society or community brought by natural phenomenon or Hazard#Natural hazard, hazard. Some examples of natural hazards include avalanches, droughts, earthquakes, floods, heat waves, landslides ...
s that disrupt Internet access. Halderman and collaborators used it to track the
OpenSSL Heartbleed vulnerability and raised the global rate of patching by 50% by warning the operators of unpatched web servers. Their work won the Best Paper award at the ACM Internet Measurement Conference. In partnership with
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
, Halderman's research group used ZMap to study the security of
email delivery, highlighting seven countries where more than 20% of inbound Gmail messages arrived unencrypted due to
network attackers. To mitigate the problem,
Gmail
Gmail is the email service provided by Google. it had 1.5 billion active user (computing), users worldwide, making it the largest email service in the world. It also provides a webmail interface, accessible through a web browser, and is also ...
added an indicator to let users know when they receive a message that wasn't delivered using encryption, resulting in a 25% increase in inbound messages sent over an encrypted connection. Halderman and his collaborators were recognized with the 2015
IRTF Applied Networking Research Prize.
In order to accelerate the adoption of encryption by web servers, Halderman in 2012 partnered with
Mozilla and the
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
to found the
Let's Encrypt HTTPS certificate authority. Let's Encrypt provides
HTTPS certificates at no cost through an automated protocol, significantly lowering the complexity of setting up and maintaining TLS encryption. Since its launch in 2016, Let's Encrypt has grown to protecting more than 150 million web sites. Halderman and his students laid the foundation for the
IETF
The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
-standard protocol that clients use to interface with the CA, the
Automated Certificate Management Environment. He sits on the board of directors of the
Internet Security Research Group, the non-profit that operates Let's Encrypt. He is also a co-founder and chief scientist of Censys, a network security company that he says aims to "change the way security works by making it more quantitative, more precise, and more accurate."
In 2015, Halderman was part of a team of proponents that included
Steven M. Bellovin,
Matt Blaze,
Nadia Heninger, and
Andrea M. Matwyshyn who successfully proposed a security research exemption to Section 1201 of the Digital Millennium Copyright Act.
Halderman was awarded a
Sloan Research Fellowship in 2015 by the
Alfred P. Sloan Foundation, and in 2019 he was named an Andrew Carnegie Fellow by the
Carnegie Corporation of New York. He was profiled in the November 2016 issue of ''
Playboy''.
Electronic voting
After the
2016 United States presidential election
United States presidential election, Presidential elections were held in the United States on November 8, 2016. The Republican Party (United States), Republican ticket of businessman Donald Trump and Indiana Governor, Indiana governor Mike P ...
, computer scientists, including Halderman, urged the
Clinton campaign to request an
election recount
An election recount is a repeat tabulation of votes cast in an election that is used to determine the correctness of an initial count. Recounts will often take place if the initial vote tally during an election is extremely close. Election reco ...
in Wisconsin, Michigan, and Pennsylvania (three swing states where
Trump had won narrowly, while Clinton won New Hampshire and Maine narrowly) for the purpose of excluding the possibility that the hacking of electronic
voting machines had influenced the recorded outcome.
On June 21, 2017, Halderman testified before the
United States Senate Select Committee on Intelligence. The hearing, titled "
Russian Interference in the 2016 U.S. Election", focused on the federal government's role in safeguarding U.S. elections from outside interference. Halderman discussed his own research in computer science and cybersecurity. He discussed one instance where he tampered with a voting machine and
demonstrated the ability to change the outcome of an election. He also made three policy recommendations to safeguard U.S. elections: upgrading and replacing obsolete and vulnerable voting machines; consistently and routinely checking that American elections results are accurate; and applying cybersecurity best practices to the design of voting equipment and the management of elections. Halderman fielded questions from the Senators about his research and policy recommendations. At the end of the hearing,
Chairman Burr praised Halderman for his work and noted how important his research is.
Following the
2020 United States presidential election
United States presidential election, Presidential elections were held in the United States on November 3, 2020. The Democratic Party (United States), Democratic ticket of former vice president Joe Biden and California junior senator Kamala H ...
, Halderman stated that a software glitch during the unofficial vote tally was not caused by fraud, but rather by human error, and said the conspiracy theory that a supercomputer was used to switch votes from Trump to
Biden was "nonsense".
His
expert witness
An expert witness, particularly in common law countries such as the United Kingdom, Australia, and the United States, is a person whose opinion by virtue of education, training, certification, skills or experience, is accepted by the judge as ...
report on voting machine vulnerabilities was filed in a Georgia case
under seal, but is sought by litigants in another case and an
election official in Louisiana.
In 2022, CISA issued the advisory "Vulnerabilities Affecting Dominion Voting Systems ImageCast X" based on research by Halderman.
References
External links
J. Alex Halderman homepage
{{DEFAULTSORT:Halderman, Alex
1980s births
Living people
American computer security academics
Princeton University alumni
University of Michigan faculty
Year of birth missing (living people)