Thomas Reddington

Industry Professor

Education
M.S. Physics, University of Pittsburgh, 1974
ABD Physics, University of Pittsburgh, 1981
BS Physics, University of New Haven and Rensselear Polytechnic Institute, 1973
Graduate courses in Computer Science and Psychology at Carnegie-Mellon and Rutgers
University.
Summary of Activities
At NYU-Poly since 2007 and at Bell Labs since 1983, Mr. Reddington has been a
researcher in networking and networking security focusing on the deficiencies in systems
and protocols that lead to them being exploited.
At Bell Labs, he created and led as a director two departments in security; The Internet
Research Department and the Security Research Department. As director of Security
Research, his role was to define the research direction for his department as well as to
define the research direction for Alcatel-Lucent and Bell Labs. He managed and
contributed to research on firewalls, intrusion detection systems, application layer
firewalls and cryptography. His department was comprised of people with backgrounds
in cryptography and computer science whose research mission was to create technologies
that can be applied to the security of products and networks.
As director of the Internet Research Department he led and contributed to research on
latent vulnerabilities (with risks and impacts) and pathological deficiencies in network
infrastructure, network services, and network user equipment for the Defense and
Intelligence communities.

University of Pittsburgh1974

Master of Science, Physics


Bell Labs

Director of Security Research, Internet Research

Created and led as a director two departments in security; The Internet Research Department and the Security Research Department. As director of Security Research, his role was to define the research direction for his department as well as to define the research direction for Alcatel-Lucent and Bell Labs. He managed and contributed to research on firewalls, intrusion detection systems, application layer firewalls and cryptography. His department was comprised of people with backgrounds in cryptography and computer science whose research mission was to create technologies that can be applied to the security of products and networks. As director of the Internet Research Department he led and contributed to research on latent vulnerabilities (with risks and impacts) and pathological deficiencies in network infrastructure, network services, and network user equipment for the Defense and Intelligence communities.


Journal Articles


A Case Study on Constructing a Security Event Management (SEM) System, September 12, 2007. Vijay K. Gurbani, Debra L. Cook, Lawrence E. Menten, and Thomas B. Reddington, German Informatics 3rd International Conference on IT-Incident Management and IT-Forensics, Stuttgart, Germany.
Network Hierarchy and Multilayer Survivability, http://www.ietf.org/rfc/rfc3386.txt, W. Lai, Ed. & D. McDysan, ed. , Tom Reddington, contributing author, Nov 2002.
Network Hierarchy and Multilayer Survivability, http://tools.ietf.org/html/draft-team-tewg-restorehierarchy-00.pdf, Jim Boyle, Malin Carlzon, Rob Coltun, Tim Griffin, Ed Kern, Tom Reddington, Jan 2002
Interface Models Based on User Contexts, “A New Generation of Intelligent Interfaces”, IJCAI-89, August 22, 1989
Interactive PWB Layout: A Lost Art?, T. Reddington, 1988, IEEE Workshop on Computers in Power Electronics, MIT, August 22-23, 1988



Extensible Protocol Validation

Extensible Protocol Validation, L. Menten, A. Jeffrey, T. Reddington #8,356,332, January 15, 2013

Methods for selectively capturing and replicating one-time passwo, (Pending)

Methods for selectively capturing and replicating one-time password generator functionality from device to device, Debra L. Cook, Vijay K. Gurbani, Thomas B. Reddington #20090064294, August 28, 2007

Keyword Search Automatic Limiting Method

Keyword Search Automatic Limiting Method, T. Reddington #4,554,631, Nov. 19, 1985