matthew caesarcaesar.web.engr.illinois.edu/cv.pdf · matthew caesar, martin casado, teemu koponen,...

23
Matthew Caesar Associate Professor Department of Computer Science University of Illinois at Urbana-Champaign 201 N. Goodwin Avenue, Room 3118 Urbana, IL 61801, USA Cell: (847) 323-2968 Fax: (217) 333-3501 Email: [email protected] Web: http://www.cs.illinois.edu/ ~ caesar/ 1

Upload: others

Post on 03-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

Matthew Caesar

Associate Professor

Department of Computer ScienceUniversity of Illinois at Urbana-Champaign

201 N. Goodwin Avenue, Room 3118Urbana, IL 61801, USA

Cell: (847) 323-2968Fax: (217) 333-3501

Email: [email protected]: http://www.cs.illinois.edu/~caesar/

1

Page 2: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

1 FIELDS OF INTEREST

Simplifying management and improving reliability of distributed systems and networks throughprinciples of self-organization and self-diagnosis, with an emphasis on wide-area networks andnetworked systems.

2 EDUCATIONAL BACKGROUND

Degree Year Field University

Ph.D. 2007 Computer Science University of California, BerkeleyDissertation: Identity-based RoutingAdvisors: Prof. Randy H. Katz, Prof. Ion StoicaMinors: Statistics/Machine Learning, CS Theory

M.S. 2004 Computer Science University of California, BerkeleyDissertation: Root Cause Analysis of BGP DynamicsAdvisors: Prof. Randy H. Katz

B.S. 2000 Computer Science University of California, Davis

3 PROFESSIONAL EXPERIENCE

Title Organization Years

Associate Professor University of Illinois at Urbana-Champaign 2014-PresentAssistant Professor University of Illinois at Urbana-Champaign 2008-2014Chief Science Officer Veriflow Systems, Inc. 2016-PresentPresident Veriflow Systems, Inc. 2012-2016Postdoctoral Fellow Princeton University 2007-2008Research Assistant University of California at Berkeley 2001-2007Research Intern/Consultant AT&T Labs–Research 2004-2005, 2008

Network Management and Engineering GroupResearch Intern/Consultant Microsoft Research 2003, 2005

Systems and Networking GroupMember of Technical Staff iScale Inc. 2000-2001Software Engineering Intern Hewlett-Packard 1999Software Engineering Intern Nokia 1998Research Intern Center for Neuroscience 1998

University of California at DavisSoftware Engineering Intern Diamond Lane Communications 1997Laboratory Assistant CS Department, Santa Rosa Junior College 1995-1997

2

Page 3: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

4 TEACHING

4.1 Courses Taught

Quarter/Year Course Number and Title Comments

Fall 2008 CS 598 – Advanced Internetworking New SyllabusFall 2008 Networks reading groupSpring 2009 CS 438 – Communication Networks I2CS CourseFall 2009 CS 498 – Networks and Systems Laboratory New SyllabusFall 2009 CS 591SN – Systems and Networking SeminarSpring 2010 CS 591SN – Systems and Networking SeminarFall 2010 CS 591SN – Systems and Networking SeminarSpring 2011 CS 591SN – Systems and Networking SeminarSpring 2010 CS 438 – Communication Networks I2CS CourseSpring 2011 CS 598 – Advanced InternetworkingFall 2011 CS 241 – System ProgrammingFall 2011 CS 591SN – Systems and Networking SeminarSpring 2012 CS 498 – Networks and Systems LaboratorySpring 2012 CS 591SN – Systems and Networking SeminarFall 2012 CS 591SN – Systems and Networking SeminarSpring 2013 CS 598 – Network Security New SyllabusSpring 2013 CS 591AoA – Acting Out Algorithms Seminar New SyllabusFall 2013 CS 591AoA – Acting Out Algorithms Seminar New SyllabusSpring 2014 CS 438 – Communication Networks Online CourseFall 2014 CS 591SN – Systems and Networking Seminar

4.2 Other Teaching Experience

Participant, Academy for Excellence in Engineering Education (AE3) Program, Fall 2011-Present.Teaching Assistant, EE 122: Computer Networks, taught by Prof. Scott Shenker and Prof. IonStoica at University of California at Berkeley, Fall 2003.Teaching Assistant, ECS 152B: Computer Networks, taught by Prof. Demet Aksoy at Universityof California at Davis, Spring 2001.Teaching Assistant, ECS 152B: Computer Networks, taught by Prof. Dipak Ghosal at Universityof California at Davis, Winter 2001.Teaching Assistant, ECS 152B: Computer Networks, taught by Prof. Dipak Ghosal at Universityof California at Davis, Spring 2000.Teaching Assistant, ECS 122A: Algorithm Design and Analysis, taught by Prof. Charles Martelat University of California at Davis, Winter 2000.

4.2.1 Postdoctoral Researchers Supervised

1. Kevin (Dong) Jin, Department of Computer Science, Summer 2013-Spring 2014. Now anAssistant Professor at the Illinois Institute of Technology.

2. Anduo Wang, Department of Computer Science, Fall 2013-Present.

3

Page 4: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

4.2.2 Ph.D. Students Supervised

1. Bingzhe Liu, Department of Computer Science, Fall 2016 - Present.

2. Fred Douglas, Department of Computer Science, Spring 2012 - Present.

3. Rashid Tahir, Department of Computer Science, Spring 2012 - Present.

4. Wenxuan Zhou, Department of Computer Science, Fall 2010 - Present.

5. Jason Croft, Department of Computer Science, Fall 2010 - Present.

6. Virajith Jalaparti, Department of Computer Science, Fall 2009 - Present.

7. Chi-Yao Hong, Department of Computer Science, Fall 2009 - Present. Now in the corenetwork architectures group at Google.

8. Rachit Agarwal, Department of Electrical and Computer Engineering, Summer 2009 -2013. Coadvised with Prof. Brighten Godfrey (CS). Preliminary exam passed April 5,2012. Graduated December 2013. Now a Postdoc at UC Berkeley.

9. Chia-Chi Lin, Department of Computer Science, Spring 2009 - Present. Preliminary exampassed December 6, 2012. Thesis defense passed August 7, 2013. Now researcher atFacebook Research.

10. Ahmed Khurshid, Department of Computer Science, Spring 2009 - Present. Preliminaryexam passed May 19, 2013.

4.2.3 M.S. Students Supervised

1. Ailing Zhang, Department of Computer Science, Fall 2015 - Present.

2. Yongli Chen, Department of Computer Science, Fall 2015 - Present.

3. Hassan Khan, Department of Computer Science, Fall 2015 - Present.

4. Jereme Lamps, Department of Computer Science, Fall 2013 - Spring 2015 (expected).Joining Sandia National Labs.

5. Rohan Sharma, Department of Computer Science, Fall 2012 - Fall 2013.

6. Yiwei Yang, Spring 2013 - Spring 2014. Now at Yahoo! Labs, Champaign.

7. Joseph Leong, Department of Computer Science, Fall 2008 - Fall 2009. Now at Microsoft,in the Windows Core Networking Team.

8. Brent Mochizuki, Department of Electrical and Computer Engineering, Fall 2008 - Summer2010. Now at UC Berkeley Space Sciences Laboratory.

9. Firat Kiyak, Department of Computer Science, Fall 2008 - Fall 2009. Now at Microsoft, inthe Windows Core Networking Team.

10. Fatih Boyaci, Department of Computer Science, Fall 2008 - Fall 2009. Now at Microsoft.

4

Page 5: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

4.2.4 Undergraduate Students Supervised

1. Rohan Sharma, Fall 2012-present. Research on software-defined networking. Winner of the2013 CRA Undergradate Researcher Award. Entered graduate program in CS at UIUC.

2. Devasia Manuel, Fall 2012-Spring 2013. Research on network verification. Now conductingan undergraduate research summer internship at MIT.

3. Kelvin Zou, Fall 2012-Spring 2013. Research on network verification. Will join the PhDprogram at Princeton this fall.

4. Jereme Lamps, Fall 2012. Research on software-defined networking. Joined the MS pro-gram at UIUC, with tuition funded by his new job at Sandia National Labs.

5. Branden Kroske, Summer 2012. Information Trust Institute Summer Fellow. Research onnetwork software analysis.

6. Yang Xu, Summer 2012. Research on network compression algorithms.

7. Zitian Liu, Spring 2012. Research on hardware acceleration for TCP.

8. Sukolsak Sakshuwong, Spring 2012. Research on Internet Routing. Now in the PhD pro-gram at Stanford.

9. Pratch Piawonagol, Spring 2012. Research on anonymity networks. Now in the PhDprogram at CMU.

10. Frank Li, Summer 2012. Information Trust Institute Summer Fellow. Research on Sybilattacks. Now in the PhD program at UC Berkeley.

11. Raul Gonzalez, Spring 2011. Research on anonymity networks. Now in the PhD programat CMU.

12. Tim Sally, Fall 2010-Spring 2011. Research on anonymity networks. Now at MIT LincolnLaboratory.

13. Jacob Tolar, Spring 2011. Research on router design.

14. Thien Nguyen, Fall 2010. Research on cloud computing.

15. Yo Han Ko, Summer 2010. Research on cloud computing.

16. Brandon Schlinker, Summer 2010. Information Trust Institute Summer Internship. Re-search on data center software.

17. Harihar Nandagopal, Spring 2010. Research on distributed consistency protocols. Now atResearch In Motion.

18. Brian Patzin, Spring 2010. Research on distributed consistency protocols. Now in thegraduate program at CMU.

19. Ben DuPont (I2CS student), Spring 2010. Research on distributed consistency protocols.

20. Alex Loeb, Fall 2009. Research on botnet mitigation. Now at UIUC pursuing graduatestudies. Awarded as a Siebel Scholar, 2010.

5

Page 6: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

21. Jurand Nogiec, Summer 2009. Research on malware detection. Now at UIUC pursuinggraduate studies.

22. Matthew Sparks, Fall 2008. Research on combined congestion control and routing. Nowat Stanford University pursuing graduate studies.

23. David O’Brien, Fall 2008. Research on network neutrality. Now at a research/developmentposition in Amazon’s Cloud Computing group.

Co-advisor to Daniel Pall, undergraduate at Princeton University. Co-advisor to Atul Vasu, anintern at the International Computer Science Institute (ICSI). Mentored junior Ph.D. studentson specific projects. Led guest lectures in several systems-related classes. Regularly organizedmock preliminary exams for junior Ph.D. students.

4.2.5 Student Award Winners

1. Rohan Sharma, CRA Undergraduate Researcher Award, 2013.

2. Chi-Yao Hong, Symantec Graduate Fellowship, 2012.

3. Rachit Agarwal, Rambus Fellowship, 2012.

4. Jason Croft, NSF Graduate Fellowship, Honorable Mention, 2011.

5. Chia-Chi Lin, Excellence in Teaching, Graduate Teaching Assistant Award, 2011.

6. Firat Kiyak and Fatih Boyaci, State Farm Prize in Siebel Center’s Computing HabitatCompetition, 2009.

7. Chia-Chi Lin, Grand Prize, Qualcomm Q Award, 2009.

8. Rachit Agarwal, Yi-Min Wang and Pi-Yu Chung Research Award (single awardee fromECE department), 2010.

5 RESEARCH AND CREATIVE SCHOLARSHIP

5.1 Theses

1. Wenxuan Zhou. ASAP: A Low Latency Transport Layer. MS thesis, University of Illinoisat Urbana-Champaign, May 2012.

2. Firat Kiyak. Protecting DNS from Software Errors. MS thesis, University of Illinois atUrbana-Champaign, May 2009.

3. Brent Mochizuki. Hardware Amenable Internet Routing. MS thesis, University of Illinoisat Urbana-Champaign, May 2010.

4. Matthew Caesar. Identity-based Routing. PhD thesis, University of California at Berkeley,August 2007.

5. Matthew Caesar. Root Cause Analysis of BGP Dynamics. Masters thesis, University ofCalifornia at Berkeley, December 2004.

6

Page 7: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

5.2 Journal Publications

1. Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, ChaseCotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy,William Lehr, Boon Loo, David Mazires, Antonio Nicolosi, Jonathan M. Smith, Ion Sto-ica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo, ABrief Overview of the NEBULA Future Internet Architecture. ACM SIGCOMM ComputerCommunication Review, October 2014.

2. Brighten Godfrey, Matthew Caesar, Yaron Singer, Ian Haken, Scott Shenker, Ion Stoica,Stable Internet Route Selection, IEEE/ACM Transactions on Networking, April 2014.

3. Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey, VeriFlow: Ver-ifying Network-Wide Invariants in Real Time, ACM SIGCOMM Computer Communica-tions Review, October 2012.

4. Elliott Karpilovsky, Matthew Caesar, Jennifer Rexford, Kobus van der Merwe, AmanShaikh, Practical Network-wide Compression of IP Routing Tables, IEEE Transactionson Network and Service Management, November 2012.

5. Brent Mochizuki, Firat Kiyak, Eric Keller, Matthew Caesar, Better by a HAIR: Hard-ware Amenable Interdomain Routing, Elsevier Communication Networks, Special Issue onArchitectures and Protocols for the Future Internet, February 2011.

6. Changhoon Kim, Matthew Caesar, Jennifer Rexford, Floodless in SEATTLE: A ScalableEthernet Architecture for Large Enterprises, IEEE/ACM Transactions on Networking, Au-gust 2010.

7. Zuoning Yin, Matthew Caesar, Yuanyuan Zhou, Towards Understanding Bugs in OpenSource Router Software, ACM SIGCOMM Computer Communications Review, June 2010.

8. Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful, ACM SIGCOMM Computer Communica-tions Review, April 2010.

5.3 Conference Publications

1. Rashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, Amiremad Ghassami,Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash, Sneak-Peek: High SpeedCovert Channels in Data Center Networks, IEEE INFOCOM, April 2016.

2. Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar DefendingTor from Network Adversaries: A Case Study of Network Path Prediction, Network andDistributed System Security Symposium (NDSS), February 2016.

3. Anupam Das, Nikita Borisov, Matthew Caesar, Tracking Mobile Web Users Through Mo-tion Sensors: Attacks and Defenses, Privacy Enhancing Technologies Symposium (PETS),June 2015.

4. Wenxuan Zhou, Dong Jin, Jason Croft, Matthew Caesar, Brighten Godfrey, Enforcing Cus-tomizable Consistency Properties in Software-Defined Networks, Symposium on NetworkedSystems Design and Implementation (NSDI), May 2015.

7

Page 8: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

5. Soudeh Ghorbani, Eric Keller, Matthew Monaco, Matthew Caesar, Jennifer Rexford, DavidWalker, Transparent, Live Migration of a Software-Defined Network, Symposium on CloudComputing (SOCC), November 2014.

6. Jereme Lamps, David M. Nicol, Matthew Caesar, TimeKeeper: A Lightweight VirtualTime System for Linux, ACM Principles of Advanced and Distributed Simulation (PADS),November 2014.

7. Anupam Das, Nikita Borisov, Matthew Caesar, Do You Hear What I Hear? FingerprintingSmart Devices Through Embedded Acoustic Components, ACM CCS, November 2014.

8. Wenxuan Zhou, Dong Jin, Jason Croft, Matthew Caesar, Brighten Godfrey, Enforcing Cus-tomizable Consistency Properties in Software-Defined Networks, Symposium on NetworkedSystems Design and Implementation (NSDI), May 2015.

9. Soudeh Ghorbani, Eric Keller, Matthew Monaco, Matthew Caesar, Jennifer Rexford, DavidWalker, Transparent, Live Migration of a Software-Defined Network, Symposium on CloudComputing (SOCC), November 2014.

10. Anupam Das, Nikita Borisov, Matthew Caesar, Analyzing an Adaptive Reputation Metricfor Anonymity Systems, HotSoS, April 2014.

11. Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar, RE3: Relay Reliabil-ity Reputation for Anonymity Systems, ACM Symposium on Information, Computer andCommunications Security (ASIACCS), June 2014. Received Best Paper Award. (accep-tance rate=20%)

12. Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, Xiaofeng Wang, TheTangled Web of Password Reuse, Network and Distributed System Security Symposium(NDSS), February 2014. (acceptance rate=18%)

13. Chi-Yao Hong, Matthew Caesar, Brighten Godfrey, Software-Defined Transport: Flexibleand Deployable Flow Rate Control, Open Networking Summit (ONS), March 2014.

14. Anduo Wang, Brighten Godfrey, Matthew Caesar, Software-Defined Networks as Databases,Open Networking Summit (ONS), March 2014.

15. Chia-Chi Lin, Virajith Jalaparti, Matthew Caesar, Kobus van der Merwe, DEFINED: De-terministic Execution for Interactive Control-Plane Debugging, USENIX Annual TechnicalConference (ATC), June 2013. (acceptance rate=15%)

16. Ahmed Khurshid, Kelvin Zou, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey, Veri-Flow: Verifying Network-Wide Invariants in Real Time, Open Networking Summit (ONS’13),April 2013. (acceptance rate=22%)

17. Ahmed Khurshid, Kelvin Zou, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey, Veri-Flow: Verifying Network-Wide Invariants in Real Time, Symposium on Networked SystemsDesign and Implementation (NSDI’13), April 2013. (acceptance rate=22%)

18. Chi-Yao Hong, Matthew Caesar, Brighten Godfrey, Finishing Flows Quickly with Preemp-tive Scheduling, ACM SIGCOMM, August 2012. (acceptance rate=13%)

19. Chi-Yao Hong, Matthew Caesar, Nick Duffield, Jia Wang, Tiresias: Online Anomaly De-tection for Hierarchical Operational Network Data, International Conference on DistributedComputing Systems (ICDCS), June 2012. (acceptance rate=13%)

8

Page 9: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

20. Prateek Mittal, Matthew Caesar, Nikita Borisov, X-Vine: Secure and Pseudonymous Rout-ing in DHTs Using Social Networks, Network and IT Security Conference (NDSS), Febru-ary 2012. (acceptance rate=17.8%)

21. Wenxuan Zhou, Qingxi Li, Matthew Caesar, Brighten Godfrey, ASAP: A Low LatencyTransport Layer, ACM CoNEXT, December 2011. (acceptance rate=18.8%)

22. Ahmed Khurshid, Firat Kiyak, Matthew Caesar, Improving Robustness of DNS to SoftwareVulnerabilities, Annual Computer Security Applications Conference (ACSAC), December2011. (acceptance rate=16.3%)

23. Amir Houmansadr, Giang Ngyuen, Matthew Caesar, Nikita Borisov, Stealth: Achievingusage stealthiness of secure communication services, ACM Conference on Computer andCommunications Security (CCS), December 2011. (acceptance rate=13.9%)

24. Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov, StealthyTraffic Analysis of Low-Latency Anonymous Communication Using Throughput Finger-printing, ACM Conference on Computer and Communications Security (CCS), December2011. (acceptance rate=13.9%)

25. Ahsan Arefin, Ahmed Khurshid, Matthew Caesar, Klara Nahrstedt, Scaling Data-PlaneLogging in Large Scale Networks, IEEE MILCOM, November 2011.

26. Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, Brighten Godfrey, SamuelT. King, Debugging the Data Plane with Anteater, ACM SIGCOMM, August 2011. (ac-ceptance rate=14.3%)

27. Shishir Nagaraja, Virajith Jalaparti, Matthew Caesar, Nikita Borisov, P3CA: PrivacyPreserving Traffic Anomaly Detection for ISP Networks, Privacy Enhancing TechnologiesSymposium (PETS), July 2011. (acceptance rate=24.5%)

28. Md Yusuf Uddin, Ahmed Khurshid, Hee Dong Jung, Carl Gunter, Matthew Caesar, TarekAbdelzaher, Making DTNs Robust Against Spoofing Attacks with Localized Countermea-sures, IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks(SECON), June 2011. (acceptance rate=22.0%)

29. Giang Nguyen, Rachit Agarwal, Matthew Caesar, Brighten Godfrey, Junda Liu, ScottShenker, SlickPackets, ACM Sigmetrics, June 2011. (acceptance rate=14.7%)

30. Chi-Yao Hong, Chia-Chi Lin, Matthew Caesar, Clockscalpel: Understanding root causes ofInternet clock synchronization inaccuracy, Passive and Active Measurement Conference,March 2011. (Received Best Paper Award)

31. Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov, Bot-Grep: Finding P2P Bots with Structured Graph Analysis, USENIX Security, August 2010.(acceptance rate=14%)

32. Benny Applebaum, Haakon Ringberg, Michael Freedman, Matthew Caesar, Jennifer Rex-ford, Collaborative, Privacy-Preserving Data Aggregation at Scale, Privacy Enhancing Tech-nologies Symposium (PETS), July 2010. (acceptance rate=28%)

33. Rachit Agarwal, Virajith Jalaparti, Matthew Caesar, Brighten Godfrey, Stable Path(s)Assignment for Inter-domain Routing, ICDCS, June 2010. (acceptance rate=14%)

9

Page 10: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

34. Dong Jin, David Nicol, Matthew Caesar, Efficient Gigabit Ethernet Switch Models forLarge-scale Simulation, Principles of Advanced and Distributed Simulation (PADS), May2010.

35. Firat Kiyak, Brent Mochizuki, Eric Keller, Matthew Caesar, Better by a HAIR: HardwareAmenable Interdomain Routing, IEEE ICNP, October 2009. (acceptance rate=18%)

36. Eric Keller, Minlan Yu, Matthew Caesar, Jennifer Rexford, Virtually Eliminating RouterBugs, ACM CoNEXT, December 2009. (acceptance rate=17%)

37. Shameem Ahmed, Thadpong Pongthawornkamol, Guijun Wang, Klara Nahrstedt, MatthewCaesar, Topology Aware Optimal Task Allocation for Publish/Subscribe Based Mission Crit-ical Environments, IEEE MILCOM, October 2009.

38. Vijay Raman, Matthew Caesar, A Practical Approach for Providing QoS in MultichannelAd-Hoc Networks using Spectrum Width Adaptation, IEEE GLOBECOM, December 2009.(acceptance rate=34.8%)

39. Changhoon Kim, Matthew Caesar, Alex Gerber, Jennifer Rexford, Revisiting Route Caching:The World Should Be Flat, Passive and Active Measurement Conference, April 2009. (ac-ceptance rate=28%)

40. Changhoon Kim, Matthew Caesar, Jennifer Rexford, Floodless in SEATTLE: A ScalableEthernet Architecture for Large Enterprises, ACM SIGCOMM, August 2008. (acceptancerate=12.5%)

41. Karthik Lakshminaryanan, Matthew Caesar, Murali Rangan, Thomas Anderson, ScottShenker, Ion Stoica, Achieving Convergence-Free Routing using Failure-Carrying Packets,ACM SIGCOMM, August 2007. (acceptance rate=13.6%)

42. P. Brighten Godfrey, Matthew Caesar, Ian Haken, Scott Shenker, Ion Stoica, Stable InternetRoute Selection, NANOG 40, June 2007.

43. Matthew Caesar, Tyson Condie, Jayanthkumar Kannan, Karthik Lakshminarayanan, IonStoica, Scott Shenker, ROFL: Routing on Flat Labels, ACM SIGCOMM, September 2006.(acceptance rate=12.4%)

44. Matthew Caesar, Miguel Castro, Edmund Nightingale, Greg O Shea, Antony Rowstron,Virtual Ring Routing: Network routing inspired by DHTs, ACM SIGCOMM, September2006. (acceptance rate=12.4%)

45. Matthew Caesar, Jennifer Rexford, BGP Routing Policies in ISP Networks, IEEE NetworkMagazine, special issue on Interdomain Routing, Nov/Dec 2005.

46. Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, MorleyMao, Scott Shenker, Ion Stoica, HLP: A Next-generation Interdomain Routing Protocol,ACM SIGCOMM, August 2005. (acceptance rate=10.6%)

47. Matthew Caesar, Donald Caldwell, Nick Feamster, Jennifer Rexford, Aman Shaikh, Kobusvan der Merwe, Design and Implementation of a Routing Control Platform, Second Sym-posium on Networked Systems Design and Implementation (NSDI’05), April 2005. (accep-tance rate=22%)

48. Matthew Caesar, Lakshminarayanan Subramanian and Randy H. Katz, Root-cause Anal-ysis of Internet Dynamics, NANOG 30, Miami Beach, Florida, February 8-10, 2004.

10

Page 11: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

49. Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Jo-hansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Z. Morley Mao, George Porter, Timo-thy Roscoe, Mukund Seshadri, Jimmy Shih, Keith Sklower, Lakshminarayanan Subrama-nian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica,The SAHARA Model for Service Composition Across Multiple Providers, Invited Paper,International Conference on Pervasive Computing (Pervasive 2002), August 2002.

50. Matthew Caesar and Dipak Ghosal, IP Telephony, Encyclopedia of Telecommunications,John Wiley & Sons (Invited Paper).

51. Matthew Caesar, Sujatha Balaraman and Dipak Ghosal, A Comparative Study of Pric-ing Strategies for IP Telephony, IEEE Globecom 2000, Global Internet Symposium, SanFrancisco, USA. (acceptance rate=35%)

5.4 Workshop Publications

1. Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, SWEET: Serving the Web by Ex-ploiting Email Tunnels, 6th Workshop on Hot Topics in Privacy Enhancing Technologies(HotPETs 2013)

2. Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey, VeriFlow: Ver-ifying Network-Wide Invariants in Real Time, ACM SIGCOMM Workshop on Hot Topicsin Software Defined Networking (HotSDN), August 2012. (Received Best Paper Award)

3. Soudeh Ghorbani, Matthew Caesar, Walk the Line: Consistent Network Updates withBandwidth Guarantees, ACM SIGCOMM Workshop on Hot Topics in Software DefinedNetworking (HotSDN), August 2012.

4. Virajith Jalaparti, Matthew Caesar, Seungjoon Lee, Jeffrey Pang, Kobus van der Merwe,OGRE: A Cloud Platform for Seamless Wide area Migration of Networked Games, ACM/IEEE11th Annual Workshop on Network and Systems Support for Games (NetGames) 2012.(acceptance rate=20%)

5. Eric Keller, Soudeh Ghorbani, Matthew Caesar, Jennifer Rexford, Live Migration of anEntire Network (and its Hosts), ACM HotNets, October 2012. (acceptance rate=19%)

6. Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov, SybilControl: Practical SybilDefense with Computational Puzzles, ACM Workshop on Scalable Trusted Computing(STC), October 2012.

7. Chia-Chi Lin, Matthew Caesar, A Future Internet Design for Securing Cloud Computing,Future Internet Workshop, June 2011.

8. Jason Croft, Matthew Caesar, Towards Practical Avoidance of Information Leakage inEnterprise Networks, USENIX Workshop on Hot Topics in Security (HotSec), August2011. (acceptance rate=20%)

9. Shishir Nagaraja, Nikita Borisov, Matthew Caesar, GraphSlicer: Localizing bots using com-munity detection algorithms, IEEE Second Annual Workshop on Simplifying Complex Net-works for Practitioners (IEEE Simplex), June 2010.

10. Matthew Caesar, A Substrate for Wide-Area Network Debugging, Workshop on FutureRouter Design, January 2010.

11

Page 12: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

11. Chia-Chi Lin, Matthew Caesar, Kobus van der Merwe, Towards Interactive ISP Debugging,ACM HotNets, October 2009. (acceptance rate=16%)

12. Matthew Caesar, Jennifer Rexford, Building Bug-Tolerant Routers with Virtualization,ACM SIGCOMM Workshop on Programmable Routers for the Extensible Services of To-morrow (PRESTO), August 2008. (acceptance rate=46%)

13. Matthew Caesar, Jiawei Han, Leveraging Data Mining to Improve Internet Security, NSFworkshop on Data and Applications Security, February 2009.

14. Matthew Caesar, Lakshminarayanan Subramanian, Randy H. Katz, A Case for an InternetHealth Monitoring System, Hot Topics in System Dependability (HotDep), June 2005.(acceptance rate=26%)

15. Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, MorleyMao, Scott Shenker and Ion Stoica, HLP: A Next-generation Interdomain Routing Protocol,ACM HotNets, November 2004. (acceptance rate=16%)

16. Matthew Caesar, Dipak Ghosal and Randy H. Katz, Resource Management for IP Tele-phony Networks, International Workshop on QoS (IWQoS), Miami Beach, Florida, May15-17, 2002. (acceptance rate=18.9%)

5.5 Posters and Extended Abstracts

1. Ahmed Khurshid, Kelvin Zou, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey, Ver-iFlow: Verifying Network-Wide Invariants in Real Time, Poster at USENIX Symposiumon Network Design and Implementation, April 2013.

2. Chi-Yao Hong, Matthew Caesar, A Low Cost Data Center Network, Poster at USENIXSymposium on Network Design and Implementation, April 2010.

3. Virajith Jalaparti, Shishir Nagaraja, Matthew Caesar and Nikita Borisov, P3CA: PrivacyPreserving Traffic Anomaly Detection for ISP Networks, Poster at USENIX Symposiumon Network Design and Implementation, April 2010.

4. Wenxuan Zhou, Qingxi Li, Matthew Caesar, Brighten Godfrey, ASAP: A Low-LatencyTransport Layer, Poster at ACM Sigcomm August 2011.

5.6 Books and Book Chapters

1. Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, ChaseCotton, Michael Freedman, Andreas Haeberlen, Zack Ives, Arvind Krishnamurthy, WilliamLehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan Smith, Ion Stoica,Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, and Christopher S. Yoo,The NEBULA Future Internet Architecture: A Mid-Course Report, Book Chapter, FutureInternet Assembly, Springer Lecture Notes in Computer Science (LNCS), May 2013.

2. Abhishek Verma, Shivaram Venkataraman, Matthew Caesar, Roy H. Campbell, ScalableStorage for Data-Intensive Computing, Book Chapter, Handbook of Data Intensive Com-puting, Springer, Ed. Borko Furht.

12

Page 13: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

5.7 Software

1. Routing Control Platform (ISP operations software), 2008. Status: under license by AT&T.This system has been deployed in, and remains in daily use in, core operations of AT&T’sNorth American IP backbone, one of the largest ISP networks in the world, which forwardspetabytes of traffic daily.

2. X-Vine (Secure communications system), 2010. Status: this work is being considered byFreenet (one of the largest online communications systems) as a potential replacement fortheir insecure routing algorithm (https://wiki.freenetproject.org/X-Vine, https://emu.freenetproject.org/pipermail/devl/2013-January/036765.html).

3. Virtual Ring Routing (Wireless routing protocol software), 2008. Status: under license byMicrosoft. This technology is being incorporated into the MS Windows operating system,and has been downloaded and used by a number of universities.

4. iQ (Teaching software to interactively collect feedback from classroom lectures), 2010. Sta-tus: open-source software release, awarded Computing Habitat Programming Competitionaward.

5. Interactive Network Debugger (NDB) (Debugger for distributed software), 2011. Status:pending license by AT&T.

6. Router Hypervisor (Virtualization environment for router software), 2011. Status: open-source software release. I am working with a major router vendor to incorporate my workinto their mainline router operating system.

7. Deterministic Execution Environment for Network Software, open-source software release.

8. Veriflow (Network verification software). My work on Veriflow has led to the creation of acompany (Veriflow Systems, Inc.), which is focused on the development and commercializa-tion of this technology. We are also working with UIUC CITES to deploy this technology inUIUC’s campus backbone and UC2B fiber-to-the-home infrastructures. We are also work-ing with the Global Environment for Network Innovations (GENI), a nationwide Internetinfrastructure, to deploy Veriflow in their software-defined network backbone.

9. LIME (Platform for virtual network migration),” open-source software release. Used byIntelligent Automation, Inc. in platform for network security being developed for DoDuse.

10. OGRE (Platform for network game hosting),” Developed jointly with AT&T.

11. OCEAN (Platform for experimental research on network architectures), http://ocean.cs.illinois.edu

12. Tiresias (Algorithm for Hierarchical Anomaly Detection)”, under license by AT&T. Thissystem was incorporated to form one of AT&T’s core network monitoring systems.

5.8 Research Proposals and Grants

1. Juniper T1600 (hardware grant)

Sponsor: Terabit Systems

13

Page 14: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

Investigators: Matthew Caesar

Amount (my share): This hardware has a list price of $310,000, not including pro-vided modules.

Awarded: April 2016

2. Research in Trusted Hypervisors

Sponsor: Northrop Grumman

Investigators: Matthew Caesar (PI)

Amount (my share): $10,000 (unrestricted gift)

Awarded: September 2015

3. NeTS: Medium: From Verification to Synthesis in Software Defined Networks

Sponsor: National Science Foundation

Investigators: Brighten Godfrey (PI), Matthew Caesar

Amount (shared): $1,200,000 for 4 years

Awarded: August 2015

4. Data-Plane Verification in Heterogeneous Networks (NSF SBIR, Phase II)

Sponsor: National Science Foundation

Investigators: Serena Chan (PI), Matthew Caesar , Brighten Godfrey

Amount (shared): $750,000 for 2 years

Awarded: October 2014

5. Research in Trusted Hypervisors

Sponsor: Northrop Grumman

Investigators: Matthew Caesar (PI)

Amount (my share): $20,000 for 1 year (unrestricted gift)

Awarded: September 2014

6. Towards a Science of Securing Network Forwarding

Sponsor: National Security Agency

Investigators: Brighten Godfrey (PI), Matthew Caesar, Kevin Jin

Amount (my share): $150,000 for 3 years

Awarded: March 2014

7. Research in Trusted Hypervisors (Phase III)

Sponsor: Northrop Grumman

Investigators: Matthew Caesar (PI)

Amount (my share): $20,000 for 1 year (unrestricted gift)

Awarded: September 2013

14

Page 15: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

8. FIA: Collaborative Research: NEBULA: A Future Internet that SupportsTrustworthy Cloud Computing: Supplemental Funding

Sponsor: National Science Foundation

Investigators: Matthew Caesar (PI)

Amount (my share): $78,594 for 1 year

Awarded: August 2013

9. CyberShield: Network Virtualization for Cyber Defense (Phase III)

Sponsor: DARPA

Investigators: Matthew Caesar (PI)

Amount (my share): $200,000 for 1 year

Awarded: July 2013

10. Data-Plane Verification in Heterogeneous Networks (NSF SBIR, Phase I)

Sponsor: National Science Foundation

Investigators: Matthew Caesar (PI), Brighten Godfrey, Serena Chan

Amount (shared): $150,000 for 1 year

Awarded: July 2013

11. Dynamic Data-Plane Verification in Heterogeneous Networks (Navy SBIR,Phase I)

Sponsor: US Navy

Investigators: Matthew Caesar, Brighten Godfrey, Serena Chan (PI)

Amount (shared): $72,877.47 for 1 year

Awarded: May 2013

12. Research in Trusted Hypervisors (Phase II)

Sponsor: Northrop Grumman

Investigators: Matthew Caesar (PI)

Amount (my share): $30,000 for 1 year (unrestricted gift)

Awarded: September 2012

13. Cyclone: Dynamic Virtualization for Cloud Security

Sponsor: DARPA

Investigators: Matthew Caesar (PI), Jennifer Rexford

Amount (my share): $1,200,000 for 4 years

Awarded: January 2012

14. Towards a Science of Securing Network Forwarding

Sponsor: National Security Agency (NSA)

Investigators: Brighten Godfrey (PI), Matthew Caesar

Amount (my share): $98,199 for 1 year

Awarded: January 2012

15

Page 16: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

15. Research in Trusted Hypervisors

Sponsor: Northrop Grumman

Investigators: Matthew Caesar (PI)

Amount (my share): $15,000 for 1 year (unrestricted gift)

Awarded: October 2011

16. CyberShield: Network Virtualization for Cyber Defense

Sponsor: DARPA

Investigators: Matthew Caesar (PI)

Amount (my share): $400,000 for 2 years

Awarded: April 2011

17. CAREER: Getting RID of Bugs: Realizing Interactive Debugging of NetworkedSystems

Sponsor: National Science Foundation

Investigators: Matthew Caesar (PI)

Amount (my share): $472,179 for 5 years

Awarded: February 2011

18. Simplifying Attribution in Modern Networked Software with Virtual Networks

Sponsor: Boeing

Investigators: David Nicol (PI), Matthew Caesar

Amount (my share): $75,000 for 1 year

Awarded: January 2011

19. FIA: Collaborative Research: NEBULA: A Future Internet that SupportsTrustworthy Cloud Computing

Sponsor: National Science Foundation Future Internet Architectures (FIA) Program

Investigators: Thomas Anderson - University of Washington, Ken Birman - CornellUniversity, Matthew Caesar - University of Illinois, Doug Comer - Purdue University,Charles Cotton - U Delaware, Michael Freedman - Princeton University, WilliamLehr - MIT, David Mazieres - Stanford, Antonio Nicolosi - Stevens Inst. Technology,Jonathan Smith - U Pennsylvania (PI), Ion Stoica - UC Berkeley, Michael Walfish -UT Austin

Amount (my share): $502,602 for 3 years

Awarded: August 2010

20. Research in Network Virtualization

Sponsor: AT&T Labs

Program: AT&T Virtual University Research Initiative (VURI) program.

Investigator: Matthew Caesar (PI)

Amount (my share): Two internship slots for students, plus $25,000 for 1 year(unrestricted gift)

Awarded: March 2010

16

Page 17: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

21. Network Software Reliability

Sponsor: Defense Advanced Research Projects Agency (DARPA), TCTO program

Program: Computer Science Study Panel (Program to educate early-career Com-puter Science faculty on DoD needs. Included four week-long visits to military andindustrial installations. I was selected as one out of twelve junior faculty in theUnited States).

Investigator: Matthew Caesar (PI)

Amount (my share): $100,000 for 1 year (unrestricted gift)

Awarded: April 2010

22. Towards bug-tolerant Internet routers

Sponsor: Cisco Research

Investigator: Matthew Caesar (PI)

Amount (my share): $100,000 for 1 year (unrestricted gift)

Awarded: May 2010

23. Fixing the Reliability Problem in Network Software from its Root

Sponsor: National Science Foundation NeTS-NECO Program

Investigators: Matthew Caesar (PI), Jennifer Rexford, Yuanyuan Zhou

Amount (my share): $350,000 for 4 years

Awarded: August 2008

6 Service and Recognition

6.1 Departmental Service

Preliminary Examination and Thesis Defense Committees:

1. Qingxi Li (Advisor: Brighten Godfrey, CS), “Reducing Short Flows’ Latency in the Inter-net,” August 2015.

2. Anupam Das (Advisor: Nikita Borisov, ECE), “Privacy Risks of Smartphone Sensors andTheir Mitigation,” May 2015.

3. Joshua Juen (Advisor: Nikita Borisov, ECE), “Maintaining Privacy during ContinuousMotion Sensing,” January 2015.

4. Xun Gong (Advisor: Negar Kiyavash, ECE), “A Fast and Robust Watermarking Scheme,”August 2013.

5. Ahmed Khurshid (Advisor: Matthew Caesar, CS), “Monitoring and Verifying NetworkBehavior Using Data-Plane State,” May 2013.

6. Chia-Chi Lin (Advisor: Matthew Caesar, CS), “Deterministic Network Execution,” March2013.

7. Ghazale Hosseinabadi (Advisor: Nitin Vaidya, ECE), “MAC Layer Protocols for WirelessNetworks,” November 2012.

17

Page 18: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

8. Haohui Mai (Advisor: Sam King, CS), “Secure Web Operating Systems,” September 2012.

9. Kevin Jin (Advisor: David Nicol, ECE), “Simulation-based Evaluation of Smart GridApplications,” September 2012.

10. Shehla Rana (Advisor: Nitin Vaidya, ECE), “Content Security in Advanced MeteringInfrastructure and Location Privacy in Wireless Sensor Networks: Threats and Solutions,”May 2012.

11. Rachit Agarwal (Advisors: Matthew Caesar and Brighten Godfrey, CS), “Design of LowLatency Systems and Networks with Limited Memory,” April 2012.

12. Md Ahsan Arefin (Advisor: Klara Nahrstedt, CS), “Tele-Immersive Environments,” April2012.

13. Ravinder Shankesi (Advisor: Carl Gunter, CS), “Friendsourcing to Detect Network Ma-nipulation,” January 2012.

14. Wucherl Yoo (Advisor: Roy Campbell, CS), “Automated Performance Characterization ofApplications Using Hardware Monitoring Events,” December 2011.

15. Jihyuk Choi (Advisor: Yih-Chun Hu, ECE), “Security Threats of the MAC-Layer in Wire-less Networks,” October 2011.

16. Zuoning Yin (Advisor: Yuanyuan Zhou, UC San Diego), “Characterizing System Failuresin Commercial and Open Source Systems,” May 2011.

17. Eric Keller (Advisor: Jennifer Rexford, Princeton University), “Refactoring Router Soft-ware to Minimize Disruption,” May 2011.

18. Prateek Mittal (Advisor: Nikita Borisov, ECE), “Scalable and Secure Anonymous Rout-ing,” April 2011.

19. Dongho Kim (Advisor: Yih-Chun Hu, ECE), “Scalable and Secure Network Protocols”March 2011.

20. Hossein Ahmadi (Advisor: Tarek Abdelzaher, CS), “Cyber-physical Data Distillation in aSensor-rich World,” November 2010.

21. Yan Gao (Advisor: P. R. Kumar, ECE), “Cross layer design for random access wirelessnetworks,” November 2010.

22. Sam Nelson (Advisor: Robin Kravets, CS), “Leveraging Structure for Communication inHuman-Centric DTNs,” July 2010.

23. Zheng Zeng (Advisor: P. R. Kumar, ECE), “Design and Evaluation of new cooperativePHY-MAC schemes for WLANs,” May 2010.

24. Vijay Raman (Advisor: Nitin Vaidya, ECE), “Traffic-Aware Resource Assignment In Mul-tichannel, Multi-Radio Wireless Networks,” April 2010.

25. Nabil Schear (Advisor: Nikita Borisov, ECE), “Preventing Encrypted Traffic Analysis,”April 2009.

26. Luchuan Kung (Advisor: Nitin Vaidya, ECE), “Application Programming Interfaces forWireless Networks,” September 2009.

18

Page 19: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

27. Thadpong Pongthawornkamol (Advisor: Klara Nahrstedt, CS), “Probabilistic QoS Mod-elling for Prediction and Admission Control in Distributed Best Effort Content-based Pub-lish/Subscribe Systems,” November 2009.

28. Jin Heo (Advisor: Tarek Abdelzaher, CS), “Performance Composability: An EmergingChallenge in Performance-Adaptive Systems,” December 2009.

29. Fariba Khan (Advisor: Carl Gunter, CS), “Assuring Network service with Integrity BasedQueuing,” December 2009.

Other Selected Committees:

1. Fall 2009-2015: Student Awards Committee

2. Fall 2009-2015: Program of Study Committee

3. Fall 2010-2015: Capricious Grading Committee

4. Fall 2010-2015: Undergraduate Study Committee

5. Fall 2009-2015: Undergraduate Advising Committee

6. Spring 2010-2015: Illinois Cyber Security Scholars Program (ICSSP) Admissions Commit-tee and Faculty Advisor

7. Fall 2012-2014: ITI Distinguished Lecture Series Speaker Selection Committee (Chair)

8. Spring 2013: CS Faculty Recruiting Committee

9. Spring 2013: Andrew T. Yang Faculty Research Award Committee

10. Fall 2008-present: I have served on over 35 qualifying examination committees.

I maintain the systems and networks mailing list ([email protected]), a list with over400 subscribers, including students across multiple departments and industry surrounding UIUC,where I regularly disseminate advertisements for talks and job opportunities. I have also beenparticipating in the ECE Faculty Recruiting Committee (Spring 2012). I am the site PI forPlanetlab (a global research network of over 1000 participating institutions).

6.2 Professional Activities

6.2.1 Memberships in Professional Organizations

Member Association for Computing Machinery (ACM)

Member ACM Special Interest Group on Data Communications (SIGCOMM)

Member USENIX Technical Association

Member Institute of Electrical and Electronics Engineers (IEEE)

19

Page 20: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

6.2.2 Conference and Other Committee Activities

2014 Program Committee, ACM Special Interest Group on Data Communication (SIG-COMM)

2014 Tutorial Co-Chair, ACM Special Interest Group on Data Communication (SIGCOMM)

2013 Program Committee, ACM Symposium on Cloud Computing (SOCC)

2013 Selection Committee, ACM Sigcomm Dissertation Award

2013 Program Chair, Poster and Demo Session, USENIX Symposium on Networked SystemsDesign and Implementation (NSDI)

2013 Judge, ACM Student Research Competition, Grand Finals

2013 Program Committee, ACM Special Interest Group on Data Communication (SIG-COMM)

2013 Program Committee, USENIX Symposium on Networked Systems Design and Imple-mentation (NSDI)

2012 Program Committee, Hot Topics in Networks (HotNets-XI)

2012 Program Committee, IEEE International Conference on Network Protocols (ICNP)

2012 Panelist, National Science Foundation CNS Program Panel

2012 Judge, ACM Student Research Competition, Grand Finals

2012 Program Committee, ACM Special Interest Group on Data Communication (SIG-COMM). Winner of Best Reviewer Award.

2012 Program Committee, Passive and Active Measurements Conference (PAM)

2011 Program Committee, ACM International Conference on Emerging Networking EXper-iments and Technologies (CoNEXT)

2011 Judge, Student Research Competition, ACM Special Interest Group on Data Commu-nication (SIGCOMM)

2011 Program Committee, IEEE International Conference on Network Protocols (ICNP)

2011 Program Committee, IEEE International Workshop on Quality of Service (IWQoS)

2010 Program Committee, Programmable Routers and Extensible Services of Tomorrow(PRESTO)

2010 Program Committee, IEEE International Conference on Network Protocols (ICNP)

2010 Program Committee, IEEE International Workshop on Quality of Service (IWQoS)

2010 Program Committee, Passive and Active Measurements Conference (PAM)

2009 Program Co-Chair, ACM International Conference on Emerging Networking EXperi-ments and Technologies, Student Workshop (CoNEXT)

20

Page 21: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

2009 Program Committee, ACM International Conference on Emerging Networking EXper-iments and Technologies (CoNEXT)

2009 Program Committee, IEEE International Workshop on Quality of Service (IWQoS)

2008 Program Committee, Second ACM SIGCOMM Workshop on Networked Systems forDeveloping Regions (NSDR)

2008 Program Committee, 16th IEEE Workshop on Local and Metropolitan Area Networks(LANMAN)

2008 Panelist, National Science Foundation Expeditions Program Panel

Nomination Letter Writer for Jayaram Mudigonda for Principal Researcher at HP Labs.External reviewer for ACM SIGCOMM (2003,2004,2005,2006,2007), ANCS 2005, IEEE/ACMTransactions on Networking (2005, 2009), Elsevier Computer Networks Journal (2006, 2007,2008), Infocom (2003, 2004, 2009) IEEE International Conference on Communications (ICC)2007. IEEE Journal on Selected Areas in Communications (JSAC), 2009. ACM SIGCOMMComputer Communication Review (2008, 2009) Computer Networks Journal 2008, IEEE Net-work Magazine 2008, NSDI 2009.Organized Systems/Networking reading group, Spring 2009.

6.3 Research Honors and Awards

1. NSDI 2015 Test of Time Award, 2015.

2. Engineering Counsel Outstanding Advisor, 2014-2015.

3. ASIACCS 2014 Best Paper Award, 2014.

4. Center for Advanced Study (CAS) Fellowship, 2013.

5. ACM SIGCOMM Outstanding Reviewer Award, 2012.

6. C.W. Gear Outstanding Junior Faculty Award, 2012.

7. Nominee, National Center for Women & Information Technology REU Faculty Award,2012.

8. Academy for Excellence in Engineering Education, Participant, 2011.

9. AT&T Virtual University Research Initiative (VURI) Award, 2011.

10. DARPA Computer Science Study Group Program to educate early-career Computer Sci-ence faculty on DoD needs. Included four week-long visits to military and industrial in-stallations. I was selected as one out of twelve junior faculty in the United States.

11. Passive and Active Measurement Conference, Best Paper Award, 2011.

12. UC Berkeley Institute for Preparing Future Faculty, Fellow, 2007.

13. National Science Foundation (NSF) Graduate Research Fellowship, 2003-2006.

14. Department of Defense National Defense Science and Engineering Graduate (NDSEG)Fellowship, 2001-2003.

21

Page 22: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

15. US Department of Education Graduate Assistance in Areas of National Need (GAANN)Program Fellowship, 2000.

16. UC Davis Computer Science Department Citation Award, 2000. Highest GPA among 150+computer science majors in undergraduate program at UC Davis. Rotary Club scholarship,Doyle scholarship.

I am also a member of the Information Trust Institute and the Coordinated Science Lab hereat Illinois.

6.4 Patents

2013 Ahmed Khurshid, Matthew Caesar, Brighten Godfrey, “VeriFlow,” pending applicationTF12187-US.

2012 Chia-Chi Lin, Matthew Caesar, J. van der Merwe, “Systems, Methods, and Apparatusto Debug a Network Application,” US Patent 8245083.

2011 Elliott Karpilovsky, Matthew Caesar, Alex Gerber, Jennifer Rexford, “Systems andMethods for Optimized Route Caching,” US Patent 12207166.

2011 “Method for Service Migration,” pending.

2010 Matthew Caesar, Miguel Castro, Antony Rowstron, “Network Routing,” US Patent7715396.

2009 “Method for Reduced Ethernet Table Size,” pending.

2008 “Method for Optimized Route Propagation,” pending.

2008 “Network-wide Reduction of IP Routing Tables,” pending.

2006 “Route Control,” pending.

6.5 Press coverage

1. http://www.fastcompany.com/3048458/elasticity/three-real-online-dangers-you-need-to-worry-about

2. http://www.news-gazette.com/news/business/2016-04-24/wired-brighten-godfrey.html

3. http://www.networkworld.com/article/3060237/security/veriflow-systems-applies-formal-verification-to-prevent-network-outages-and-breaches.

html#tk.rss_security

4. http://sector.ca/blog/can-mathematics-prove-that-your-network-is-secure

5. http://packetpushers.net/startup-radar-veriflow-uses-math-prevent-network-outages/

6. http://globalgovernmentventuring.com/news/veriflow-networks-its-way-to-29m

7. http://www.itbusinessedge.com/blogs/it-unmasked/veriflow-applies-mathematical-verification-to-network-change-management.html

8. http://www.crn.com/news/networking/300080292/crn-exclusive-fortuneteller-network-security-startup-veriflow-backed-by-dod-seeking-channel-partners.htm

22

Page 23: Matthew Caesarcaesar.web.engr.illinois.edu/cv.pdf · Matthew Caesar, Martin Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker, Dy-namic Route Computation Considered Harmful,

9. http://www.fierceenterprisecommunications.com/story/veriflow-applies-mathematical-verification-network-changes/2016-04-06

10. http://www.eweek.com/security/veriflow-brings-formal-verification-to-network-security.html

11. http://www.networkworld.com/article/3048484/security/veriflow-promises-to-bulletproof-networks.html

12. If you think just because you use different passwords for different services you’re safe, thinkagain, ZDNet, December 18, 2013.http://www.zdnet.com/if-you-think-just-because-you-use-different-passwords-for-different-services-youre-safe-think-again-7000024435/

13. Researchers unsheathe new tool to battle botnets, Network World, June 12, 2010.http://www.networkworld.com/community/node/63586

14. New Weapon in War on Botnets, IEEE Computer, October, 2010.http://www.computer.org/portal/web/computingnow/archive/news071

15. Re-thinking the Internet with security and mobility in mind, Scientific American (Observa-tions), April, 2010.http://www.scientificamerican.com/blog/post.cfm?id=re-thinking-the-internet-with-secur-2010-08-31

23