Steve Lipner

Cybersecurity

Publications, Committee Service, Professional Activities, Patents

Publications

Books

Cryptography and the Intelligence Community: The Future of Encryption, Committee on the Future of Encryption (Steven B. Lipner, chair),  National Academies Press, 2022

The Security Development Lifecycle, with Michael Howard, Microsoft Press, 2006

Journals and Periodicals

Updates, Threats, and Risk Management, with John Pescatore, Communications of the ACM, May 2023

Inside the Windows Security Push: a Twenty-Year Retrospective, with Michael Howard, IEEE Security and Privacy, March-April 2023

Security Assurance: How can customers tell they are getting it?, Communications of the ACM, November 2015

The Birth and Death of the Orange Book, IEEE Annals of the History of Computing, April-June 2015

Crossing the Great Divide: Transferring Security Technology from Research to the Market, with Terry V. Benzel, IEEE Security and Privacy, March-April 2013

Lessons from VAX SVS for High Assurance VM Systems, with Trent Jaeger and Mary Ellen Zurko, IEEE Security and Privacy, November-December 2012

Prescriptive versus Descriptive Security, with David C. Ladd, Datenschutz und Datensicherheit DuD, September 2012

In Memoriam: Paul Karger, with R. R. Schell, M. E. Zurko, E. R. Palmer, D. Safford, C. C. Palmer, and C. E. Landwehr, IEEE Security and Privacy, November-December 2010

Information Assurance Technology Forecast 2005, with Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, and John D. McLean, IEEE Security and Privacy, January-February 2006

Inside the Windows Security Push, with Michael Howard, IEEE Security and Privacy, January-February 2003

Commercial Key Recovery, with Stephen T. Walker, Carl M. Ellison, and David M. Balenson, Communications of the ACM, March 1996

A Comment on the Confinement Problem, ACM SIGOPS Operating Systems Review and ACM Symposium on Operating System Principles, November 1975

Conference Papers

Assurance and Evaluation: What Next?, Keynote, Fourteenth ACM Conference on Computer and Communications Security, 2007

The Trustworthy Computing Security Development Lifecycle, Twentieth Annual Computer Security Applications Conference, 2004

Twenty years of evaluation criteria and commercial technology, IEEE Symposium on Security and Privacy, 1999

Criteria, Evaluation, and the International Environment: Where have we been, where are we going?, Proceedings IFIP-SEC, 91; also published in RISKS-FORUM Digest 12.46, October 1991 and presented at the Symposium on Security and Privacy, Industrial Partners Program, Brown University Department of Computer Science, 1991

SE/VMS: Implementing Mandatory Security in VAX/VMS, with S. Blotcky and K. Lynch, Ninth National Computer Security Conference, 1986

Secure System Development at Digital Equipment: Targeting the Needs of a Commercial and Government Customer Base, Eighth National Computer Security Conference, 1985

Provably Secure Operating Systems, with Roger Schell, Security and Privacy, Proceedings of the Joint IBM/University of Newcastle upon Tyne Seminar held in the University Computing Laboratory, 4th - 7th September 1984, Edited by B. Randell, University of Newcastle upon Tyne Computing Laboratory, 1984

Non-Discretionary Controls for Commercial Applications, IEEE Symposium on Security and Privacy, and Fifth Seminar on the DoD Computer Security Initiative, 1982

A Minicomputer Security Control System, CompCon74, Eighth IEEE Computer Society International Conference, 1974

Computer Security Research and Development Requirements, ADP Security and Privacy: Proceedings of the Conference on Secure Data Sharing, Naval Ship Research and Development Center Report 4130, 1973 and MITRE Paper MTP-142

Lectures, Presentations, and Panels

Is a Secure Software Supply Chain Supply Chain Even Possible, Let Alone Feasible, with Tony Sager, RSA Conference 2022

Lessons Learned: Fifty Years of Mistakes in Cybersecurity, RSA Conference 2020

Secure Software Development Framework: An Industry & Public Sector Approach, RSA Conference 2020

Getting Started with SDL, (ISC)2 Security Congress, 2019

Lessons Learned About Building Secure Software: It's About the Developers!, Usenix Security '19, 2019

SDL That Won't Break the Bank, Black Hat Conference, 2018

Panel: Cyber/Physical Security and the IoT, with Dan Caprio, Donald Davidson, Michael McGrath, and Robert Metzger, RSA Conference, 2017

Panel: Evaluating the Security of Purchased Software: Can We Find Common Ground, with Howard Schmidt, Chris Wysopal, Eric Baize and Nadya Bartol, RSA Conference, 2014

Panel: Certification of Products or Accreditation of Organizations: Which to Do?, with Daniel Reddy, David Martin, Donald Davidson, and Joshua Brickman, RSA Conference, 2013

Common Criteria and Secure Development: A New Proposal, Thirteenth International Common Criteria Conference, 2012

Panel: What Motivated My Company to Invest in a Secure Development Program?, with Brad Arkin, Gary Phillips, Gunter Bitz, and Janne Uusilehto, RSA Conference, 2012

Panel: Supply Chain Assurance, with Hans-Grad Albertson, David Grawrock, Gene Keeling, Wouter Slepers, and Andras Szakal, Twelfth International Common Criteria Conference, 2011

Common Criteria: Meeting the Needs of a Global Market?, Keynote, Eleventh International Common Criteria Conference, 2010

Common Criteria: A Community Focus on Improving Software Assurance, Keynote, Tenth International Common Criteria Conference, 2009

Protecting Critical Infrastructures: A Security Challenge for the 21st Century, Keynote, ISSE Europe, 2007

The Security Development Lifecycle, SUMIT_06 Security Symposium, University of Michigan, 2006

Lessons Learned in Market Adoption of the Common Criteria, Sixth International Common Criteria Conference, 2005

Business Value and Improving Security: the Role of Common Criteria, Keynote, Fifth Annual Common Criteria Conference and Sixth Annual Information Security Solutions Europe, 2004

The Journey Toward Secure Systems: Achieving Assurance, Eleventh IEEE Requirements Engineering Conference, 2003

Source Code and Security: Myths and Realities, RSA Conference, 2001

Panel: Collaboration: Can It Be Done Securely?, with Deborah Cooper, Bill Dawson and Jeff Ingle, Sixteenth Annual Computer Security Applications Conference, 2000

Panel: "Working on a Shoestring" - Security solutions in the shadow of limited funds, with David Jarrell, Shawn Hernan, and Kenneth Ammon, Twenty-third National Information Systems Security Conference, 2000

Panel: Security and Source Code Access: Issues and Realities, IEEE Symposium on Security and Privacy, 2000

Panel: Achieving Assurance: What will we do?, with Todd Inskeep, Peter Neumann, Roger Schell, and Clark Weissman, Twenty-second National Information Systems Security Conference, 1999

Twenty Years of Evaluation Criteria and Commercial Technology, IEEE Symposium on Security and Privacy, 1999

Security for Mission Planning Systems: Product and Technology Trends, Mission Planning Symposium - Mission Planning/Mission Success, Armed Forces Communications and Electronics Association (AFCEA), Lexington-Concord Chapter, 1991

On the Interaction of Operating System and Network Security Controls, Conference Proceedings, MILCOMP 87, Military Computers, Graphics and Software, 1987

Ethernet Security, Proceedings of the Second Annual AFCEA Intelligence Symposium, September 29-30, 1987, Johns Hopkins University Applied Physics Laboratory, 1987

Industry Perspective, Proceedings of Communications and Computer Security (COMSEC and COMPUSEC): Requirements, Opportunities, and Issues, Requirements Committee, Government Division, Electronic Industries Association, 1987

Panel: INFOSEC - A Look into the Future, with Ronald Gove, Patrick Gallagher, and Stephen Walker, Second Annual Symposium on Physical/Electronic Security, Philadelphia Chapter, Armed Forces Communications and Electronics Association, 1986

Panel: How Do You Sell Better Computer Security?, with Lester Fraim and Ted Lee, Sixth Seminar on the DoD Computer Security Initiative, 1983

Panel: Bell-LaPadula and Alternative Models, with David Bell, Carl Landwehr, Roger Schell, and Clark Weissman, IEEE Symposium on Security and Privacy, 1983

Digital's Research Activities in Computer Security, with Paul Karger, 15th Annual Electronics and Aerospace Systems Conference (EASCON 82), 1982

Panel: How Can the Government and the Computer Industry Solve the Computer Security Problem?, with Ted Lee, Jim Anderson, Marvin Schaefer and Bill Eisner, Third Seminar on the DoD Computer Security Initiative Program, 1980

Secure Computer Systems for Network Applications, Fourth Data Communications Symposium, 1975

A Panel Session - Security Kernels, with William Wulf, Roger Schell, Gerald Popek, Peter Neumann, Clark Weissman, and Theodore Linden, National Computer Conference 1974

Selected Technical Reports

Risk Management and the Cybersecurity of the U.S. Government, Input to the Commission on Enhancing National Cybersecurity, with Butler W. Lampson, September 2016

Improving the Acquisition of Software Systems, with W.S. Attridge and O.R. Kinney, MITRE Technical Report 8304, March 1981

Multics Security Evaluation: Results and Recommendations, MITRE Technical Report 3267, Volume 1, October 1978

ESD 1974 Computer Security Dev elopments Summary, with Richard D. Rhode, Air Force Electronic Systems Division Interim Report MCI 75-1, DTIC Report ADA542660

SATIN Computer Security, Air Force Electronic Systems Division document MCI-75-2, September 1972

MACIMS Security Configurations, MITRE Working Paper 3697, January 1971

Oral History

Oral history interview by Jeffrey R. Yost, 15 August 2012, Redmond Washington, University of Minnesota, Charles Babbage Institute, Minneapolis MN

Committee Service

Committee on Enhancing the Assurance and Nimbleness of Large-Scale Integrated Software-Based Systems, member and co-chair, 2023 - present

Intelligence Community Studies Board, National Academies of Sciences, Engineering, and Medicine, 2022 - present

United States Information Security and Privacy Advisory Board (ISPAB, member, 2000 - 2006; member and chair, 2018 - present

Naval Studies Board, National Academies of Sciences, Engineering, and Medicine, 2020 - 2023

Committee on the Future of Encryption of the National Academies of Sciences, Engineering, and Medicine, member and chair, 2020 - 2022

Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine, 2015 - 2021

Panel on Law Enforcement and Intelligence Access to Plaintext Information in an Era of Widespread Strong Encryption: Options and Tradeoffs, Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, 2016 - 2018

Panel on Assessment and Analysis of the Army Research Laboratory, National Academies of Sciences, Engineering, and Medicine, 2016, 2018

Defense Science Board Task Force on Cyber Supply Chain, 2015 - 2016

Committee of Vistors to provide the NIST Visiting Committee on Advanced Technology with technical advice on NIST cryptographic standards and guidelines development processes, 2014

Committee for a Review of U.S. Navy Cyber Defense Capabilities, Naval Studies Board, National Research Council, 2013 - 2015

Committee on Future Research Goals and Directions for Foundational Science in Cybersecurity, Computer Science and Telecommunications Board, National Research Council, 2012 - 2017

Panel on Information Technology of the Laboratory Assessment Board, National Academies of Sciences, Engineering, and Medicine, 2007 - 2011, 2018

Committee on Certifiably Dependable Software Systems, Computer Science and Telecommunications Board, National Research Council, 2003 - 2007

Committee on R&D Strategies to Improve Surface Transportation Security, National Materials Advisory Board, Computer Science and Telecommunications Board, Transportation Research Board, National Research Council, 1998 - 1989

United States Computer Systems Security and Privacy Advisory Board, 1989 - 1993

Committee on Computer Security in the Department of Energy Laboratories, Energy Engineering Board, National Research Council, 1987 - 1988

Summer Study on Multilevel Data Management Security, Air Force Studies Board, National Research Council, 1982

Computer Security Planning Study Panel (Anderson Panel), Air Force Electronic Systems Division and James P. Anderson and Company, 1972 - 1973

Professional Activities

Member, Association for Computing Machinery

Affiliate Member, IEEE Computer Society

Life Member, Information Systems Security Association

Member, International Information Systems Security Certification Consortium (ISC2);  and Member, ISC2 Americas Advisory Board, 2003 - 2006

Chair, IEEE Computer Society Technical Committee on Security and Privacy, 1984 - 1985

Program Co-chair, IEEE Symposium on Security and Privacy (Oakland Conference), 1987, 1988

Patents

Verification of trusted-path commands, with Mary Ellen Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, and Leslie Kendall, U.S. patent 7036022, 2006

Processing trusted commands in trusted and untrusted environments, with Mary Ellen Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, and Leslie Kendall, U.S. patent 6871283, 2005

Method for executing trusted-path commands, with Mary Ellen Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, and Leslie Kendall, U.S. patent 6507909, 2003

System and method for data recovery, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5991406, 1999

System and method for access field verification, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5956403, 1999

System and method for controlling access to a user secret, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5745573, 1998

System and method for access field verification, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5640454, 1997

System and method for data recovery, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5557765, 1996

System and method for key escrow encryption, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5557346, 1996

Secure user authentication from personal computer, with Morrie Gasser and Butler Lampson, U.S. patent 5210795, 1993

Apparatus and method for secure transmission of data over an unsecure transmission channel, with B.J. Herbison, Carter Lyman, Paul Karger, Bruce Mann, and Arnold Miller, U.S. patent 4924513, 1990

Apparatus and method for secure transmission of data over an unsecure transmission channel, with B.J. Herbison, Carter Lyman, Paul Karger, Bruce Mann, and Arnold Miller, U.S. patent 4881263, 1989