Amir, Yair

Professor and Chair
Computer Science

Malone 209
(301) 806-4803
yairamir@jhu.edu

Jump to:

News

Whiting School computer scientists lead effort to protect vital networks

June 28, 2016

Whiting School of Engineering computer scientists have led an effort to create a proven way to prevent sabotage from disrupting electronic networks supporting major infrastructure such as power grids and the electronic cloud. The system – meant to protect against the sort of attack that in 2010 disrupted thousands of internet networks in the United States […]

Read More

About

Education
  • Ph.D. 1995, Hebrew Univ of Jerusalem
Experience
  • 2016 - Present:  Vice Chair, IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance,
  • 2012 - 2013:  Chair, Ad hoc Committee
  • 2002 - 2002:  Program Committee Vice Chair, IEEE
  • 2002 - 2002:  Chair, IEEE
Research Areas
  • Algorithms: Distributed algorithms, fault tolerance, intrusion tolerence, replication
  • CLOUDS
  • Critical infrastructure
  • DISTRIBUTED algorithms
  • Distributed systems
  • Fault tolerance,
  • Group communication
  • Intrusion tolerance
  • Intrusion tolerant systems
  • Multicast
  • Networks: Overlay networks, cloud networking, wireless mesh networks
  • OVERLAY networks
  • Replication
  • Systems: Distributed systems, distributed datacenters, high availability, security, survivability
  • WIRELESS mesh networks
Awards
  • 2014:  Alumni Association Excellence in Teaching Award
  • 2014:  Best paper nomination
  • 2014:  Finalist, Excellence in Mentoring and Advising
  • 2014:  Technology selected for DARPA Demo Day at Pentagon
  • 2013:  Finalist, Excellence in Teaching Award
  • 2006:  Award paper for 'Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks'. Invited to Special Issue of IEEE Transactions on Dependable and Secure Computing (TDSC) for the best DSN 2006 papers.
  • 2004:  Nominated to the DARPA 'Performer with Significant Technical Achievement' award - 2004. From the notification message: This is an annual award - made to the DARPA researcher who made the most significant technical contributions to the DARPA research
  • 2003:  Secure Spread selected by DARPA as one of 12 technologies appearing on a DVD summarizing the accomplishments of 6 DAPRA programs (Cyber Panel - Dynamic Coalitions - Chats - OASIS - Fault Tolerant Networks - and IA OPX) - out of about 200 projects.
  • 2002:  DARPA Dynamic Coaltions "Bytes for Buck" trophy
Presentations
  • "Software Rejuvenation in the Field: Beyond Aging", International Workshop on Software Aging and Rejuvenation (WoSAR 2015).  Gaithersburg MD.  November 2, 2015
  • "Intrusion-Tolerant Communication on a Global Scale".  DSN Lab at Johns Hopkins (Malone Hall).  September 4, 2015
  • "Intrusion-Tolerant Communication and Consistent State on a Global Scale".  DSN Lab at Johns Hopkins University (Malone Hall).  August 31, 2015
  • "Intrusion-Tolerant Communication and Consistent State on a Global Scale".  Ft. Meade, MD.  July 20, 2015
  • "Resilient Messaging and Consistent State at Global Scale".  Washington DC.  May 1, 2015
  • "Toward Intrusion Tolerant Clouds", DARPA PI meeting.  Menlo Park, CA.  April 15, 2015
  • "Technology Innovation / Venturing in Military Communications", Invited talk in a MILCOM panel.  Baltimore MD.  October 8, 2014
  • "Toward Intrusion Tolerant Clouds", DARPA PI Meeting, Jacksonville FL.  Jacksonville FL.  September 23, 2014
  • "Intrusion Tolerance for Critical Infrastructures", Invited talk at IFIP 10.4 Meeting in Dawsonville GA.  Dawsonville GA.  June 27, 2014
  • "Resilient Cloud Networking", DARPA Demo Day at the Pentagon.  Pentagon, Washington D.C..  May 21, 2014
  • "Intrusion Tolerant Cloud Infrastructure", IFIP 10.4 Meeting in Sorento, Italy.  Sorento, Italy.  January 27, 2014
  • "Overlay Networks on a Global Scale: Performance, Quality of Service, and Ultimate Resiliency", Invited talk, University of Rome, Italy.  Rome, Italy.  January 22, 2014
  • "Toward Intrusion Tolerant Clouds", DARPA PI Meeting.  San Diego.  January 16, 2014

Publications

Journal Articles
  • Babay A, Schultz J, Tantillo T, Amir Y (2018).  Toward an intrusion-tolerant power grid: Challenges and opportunities.  Proceedings - International Conference on Distributed Computing Systems.  2018-July.
  • Babay A, Tantillo T, Aron T, Platania M, Amir Y (2018).  Network-Attack-Resilient Intrusion-Tolerant SCADA for the power grid.  Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018.
  • Babay A, Wagner E, Dinitz M, Amir Y (2017).  Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs.  Proceedings - International Conference on Distributed Computing Systems.
  • Babay A, Danilov C, Lane J, Miskin-Amir M, Obenshain D, Schultz J, Stanton J, Tantillo T, Amir Y (2017).  Structured Overlay Networks for a New Generation of Internet Services.  Proceedings - International Conference on Distributed Computing Systems.
  • Obenshain D, Tantillo T, Babay A, Schultz J, Newell A, Hoque ME, Amir Y, Nita-Rotaru C (2016).  Practical Intrusion-Tolerant Networks.  Proceedings - International Conference on Distributed Computing Systems.  2016-August.
  • Babay A, Amir Y (2016).  Fast Total Ordering for Modern Data Centers.  Proceedings - International Conference on Distributed Computing Systems.  2016-August.
  • Platania M, Obenshain D, Tantillo T, Amir Y, Suri N (2016).  On choosing server-or client-side solutions for BFT.  ACM Computing Surveys.  48(4).
  • Newall A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y (2015).  Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes..  The IEEE Transactions on Dependable and Secure Computing (TDSC).  12(6).  602-614.
  • Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y (2015).  Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.  IEEE Transactions on Dependable and Secure Computing.  12(6).
  • Karlsson J, Amir Y (2015).  Message from Program Chairs.  Proceedings of the International Conference on Dependable Systems and Networks.  2015-September.
  • Babay A, Amir Y (2015).  Fast Total Ordering for Modern Data Centers.  Proceedings - International Conference on Distributed Computing Systems.  2015-July.
  • Platania M, Obenshain D, Tantillo T, Sharma R, Amir Y (2014).  Towards a practical survivable intrusion tolerant replication system.  Proceedings of the IEEE Symposium on Reliable Distributed Systems.  2014-January.
  • Kirsch J, Goose S, Amir Y, Wei D, Skare P (2014).  Survivable SCADA Via Intrusion-Tolerant Replication.  IEEE Transactions on Smart Grid.  5(1).  60-70.
  • Kirsch J, Goose S, Amir Y, Wei D, Skare P (2014).  Survivable SCADA via intrusion-tolerant replication.  IEEE Transactions on Smart Grid.  5(1).
  • Amir Y, Bunn P, Ostrovsky R (2014).  Authenticated adversarial routing.  Journal of Cryptology.  27(4).
  • Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y (2013).  Increasing network resiliency by optimally assigning diverse variants to routing nodes.  Proceedings of the International Conference on Dependable Systems and Networks.
  • Kirsch J, Goose S, Amir Y, Skare P (2011).  Toward survivable SCADA.  ACM International Conference Proceeding Series.
  • Amir Y, Coan B, Kirsch J, Lane J (2011).  Prime: Byzantine replication under attack.  IEEE Transactions on Dependable and Secure Computing.  8(4).
  • Amir Y, Danilov C, MusaLoiu-Elefteri R, Rivera N (2010).  The SMesh wireless mesh network.  ACM Transactions on Computer Systems.  28(3).
  • Amir Y, Mušaloiu-Elefteri R, Rivera N (2010).  A robust Push-to-Talk service for wireless mesh networks.  SECON 2010 - 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
  • Zhang Q, Amir Y, River N, Musaloiu-Elefteri R (2010).  Multi-channel, multi-radio seamless wireless mesh networks.  Johns Hopkins APL Technical Digest (Applied Physics Laboratory).  28(3).
  • Amir Y, Danilov C, Dolev D, Kirsch J, Lane J, Nita-Rotaru C, Olsen J, Zage D (2010).  Steward: Scaling byzantine fault-Tolerant replication to wide area networks.  IEEE Transactions on Dependable and Secure Computing.  7(1).
  • Kirsch J, Amir Y (2009).  Paxos for system builders: An overview.  ACM International Conference Proceeding Series.  341.
  • Amir Y, Bunn P, Ostrovsky R (2009).  Authenticated adversarial routing.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  5444 LNCS.
  • Amir Y, Coan B, Kirsch J, Lane J (2008).  Byzantine replication under attack.  Proceedings of the International Conference on Dependable Systems and Networks.
  • Amir Y, Danilov C, Kaplan MA, Musaloiu-Elefteri R, Rivera N (2008).  On redundant multipath operating system support for wireless mesh networks.  2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON.
  • Amir Y, Coan B, Kirsch J, Lane J (2007).  Customizable fault tolerance for wide-area replication.  Proceedings of the IEEE Symposium on Reliable Distributed Systems.
  • Amir Y, Danilov C, Musaloiu-Elefteri R, Rivera N (2007).  An inter-domain routing protocol for multi-homed wireless mesh networks.  2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM.
  • Amir Y, Danilov C, Dolev D, Kirsch J, Lane J, Nita-Rotaru C, Olsen J, Zage D (2006).  Scaling Byzantine fault-tolerant replication to wide area networks.  Proceedings of the International Conference on Dependable Systems and Networks.  2006.
  • Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006).  An overlay architecture for high-quality VoIP streams.  IEEE Transactions on Multimedia.  8(6).
  • Amir Y, Danilov C, Hilsdale M, Musaloiu-Elefteri R, Rivera N (2006).  Fast handoff for seamless wireless mesh networks.  MobiSys 2006 - Fourth International Conference on Mobile Systems, Applications and Services.  2006.
  • Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2005).  1-800-Overlays: Using overlay networks to improve VoIP quality.  Proceedings of the International Workshop on Network and Operating System Support for Digital Audio and Video.
  • Amir Y, Awerbuch B, Danilov C, Stanton J (2005).  A cost-benefit flow control for reliable multicast and unicast in overlay networks.  IEEE/ACM Transactions on Networking.  13(5).
  • Amir Y, Nita-Rotaru C, Stanton J, Tsudik G (2005).  Secure spread: An integrated architecture for secure group communication.  IEEE Transactions on Dependable and Secure Computing.  2(3).
  • Amir Y, Kim Y, Nita-Rotaru C, Tsudik G (2004).  On the performance of group key agreement protocols.  ACM Transactions on Information and System Security.  7(3).
  • Amir Y, Kim Y, Nita-Rotaru C, Schultz JL, Stanton J, Tsudik G (2004).  Secure group communication using robust contributory key agreement.  IEEE Transactions on Parallel and Distributed Systems.  15(5).
  • Amir Y, Danilov C (2003).  Reliable Communication in Overlay Networks.  Proceedings of the International Conference on Dependable Systems and Networks.
  • Amir Y, Caudy R, Munjal A, Schlossnagle T, Tutu C (2003).  N-Way Fail-Over Infrastructure for Reliable Servers and Routers.  Proceedings of the International Conference on Dependable Systems and Networks.
  • Amir Y, Caudy R, Munjal A, Schlossnagle T, Tutu C (2003).  The Wackamole approach to fault tolerant networks.  Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003.  2.
  • Amir Y, Nita-Rotaru C, Stanton J, Tsudik G (2003).  Scaling secure group communication systems: Beyond peer-to-peer.  Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003.  1.
  • Amir Y, Awerbuch B, Danilov C, Stanton J (2002).  Global flow control for wide area overlay networks: A cost-benefit approach.  2002 IEEE Open Architectures and Network Programming Proceedings, OPENARCH 2002.
  • Amir Y, Tutu C (2002).  From total order to database replication.  Proceedings - International Conference on Distributed Computing Systems.
  • Amir Y, Kim Y, Nita-Rotaru C, Tsudik G (2002).  On the performance of group key agreement protocols.  Proceedings - International Conference on Distributed Computing Systems.
  • Amir Y, Kim Y, Nita-Rotaru C, Schultz J, Stanton J, Tsudik G (2001).  Exploring robustness in group key agreement.  Proceedings - International Conference on Distributed Computing Systems.
  • Amir Y, Nita-Rotaru C, Stanton JR (2001).  Framework for authentication and access control of client-server group communication systems.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  2233.
  • Amir Y, Awerbuch B, Barak A, Borgstrom RS, Keren A (2000).  An opportunity cost approach for job assignment in a scalable computing cluster.  IEEE Transactions on Parallel and Distributed Systems.  11(7).
  • Amir Y, Danilov C, Stanton J (2000).  A low latency, loss tolerant architecture and protocol for wide area group communication.  Proceedings of the 2002 International Conference on Dependable Systems and Networks.
  • Amir Y, Ateniese G, Hasse D, Kim Y, Nita-Rotaru C, Schlossnagle T, Schultz J, Stanton J, Tsudik G (2000).  Secure group communication in asynchronous networks with failures: integration and experiments.  Proceedings - International Conference on Distributed Computing Systems.
  • Amir Y, Awerbuch B, Borgstrom RS (2000).  Cost-benefit framework for online management of a metacomputing system.  Decision Support Systems.  28(1).
  • Amir Y, Awerbuch B, Bergstrom RS (1998).  A cost-benefit framework for online management of a metacomputing.  Proceedings of the 1st International Conference on Information and Computation Economies, ICE 1998.
  • Amir Y, Wool A (1998).  Optimal availability quorum systems: Theory and practice.  Information Processing Letters.  65(5).
  • Amir Y, Peterson A, Shaw D (1998).  Seamlessly selecting the best copy from internet-wide replicated web servers.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  1499.
  • Amir Y, Wool A (1996).  Evaluating quorum systems over the Internet.  Proceedings - Annual International Conference on Fault-Tolerant Computing.
  • Amir Y, Wool A (1996).  Evaluating quorum systems over the internet.  Proceedings of the Annual ACM Symposium on Principles of Distributed Computing.
  • Amir Y, Breitgand D, Chockler GV, Dolev D (1996).  Group communication as an infrastructure for distributed system management.  Proceedings of the International Workshop on Services in Distributed and Networked Environments.
  • Amir Y, Moser LE, Melliar-Smith PM, Agarwal DA, Ciarfella P (1995).  The Totem Single-Ring Ordering and Membership Protocol.  ACM Transactions on Computer Systems (TOCS).  13(4).
  • Moser LE, Amir Y, Melliar-Smith PM, Agarwal DA (1994).  Extended virtual synchrony.  Proceedings - International Conference on Distributed Computing Systems.
  • Amir Y, Moser LE, Melliar-Smith PM, Agarwal DA, Ciarfella P (1993).  Fast message ordering and membership using a logical token-passing ring.  Proceedings - International Conference on Distributed Computing Systems.
  • Amir Y, Dolev D, Kramer S, Malki D (1992).  Membership algorithms for multicast communication groups.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  647 LNCS.
  • Platania M, Obenshain D, Tantillo T, Amir Y, Suri N (2015).  On Choosing Server- or Clinet-Side Solutions for BFT.  The ACM Computing Surveys (CSUR.
  • Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y (2014).  Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.  IEEE Transactions on Dependable and Secure Computing.
Conference Proceedings
  • Platania M, Obenshain D, Tantillo T, Sharma R, Amir Y (2014).  Towards a Practical Survivable Intrusion Tolerant Replication System.  International Symposium on Reliable Distributed Systems (SRDS14).  242-252.
  • Obenshain D, Tantillo T, Babay A, Schultz J, Newall A, Hoque E, Amir Y, Nita-Rotaru C (2015).  Practical Intrusion-Tolerant Networks.  IEEE International Conference on Distributed Computing Systems (ICDCS.
  • Babay A, Amir Y (2015).  Fast Total Ordering for Modern Data Centers.  IEEE International Conference on Distributed Computing Systems (ICDCS16).
Patents
  • Amir Y, Miskin-Amir M, Schultz J, Stanton J  "System and Method that Route Flows via Multicast Flow Transport for Groups", 2015.
  • Amir Y, Bunn P, Ostrovsky R  "Authenticated Adversarial Routing", 2015.
Back to top