Thomas Reddington

  • Industry Professor

Thomas Reddington

Summary of Activities
At NYU-Poly since 2007 and at Bell Labs since 1983, Mr. Reddington has been a researcher in networking and networking security focusing on the deficiencies in systems and protocols that lead to them being exploited.

At Bell Labs, he created and led as a director two departments in security; The Internet Research Department and the Security Research Department. As director of Security Research, his role was to define the research direction for his department as well as to define the research direction for Alcatel-Lucent and Bell Labs. He managed and contributed to research on firewalls, intrusion detection systems, application layer firewalls and cryptography. His department was comprised of people with backgrounds in cryptography and computer science whose research mission was to create technologies that can be applied to the security of products and networks.

As director of the Internet Research Department he led and contributed to research on latent vulnerabilities (with risks and impacts) and pathological deficiencies in network infrastructure, network services, and network user equipment for the Defense and Intelligence communities.

University of Pittsburgh, 1981
ABD, Physics

University of Pittsburgh, 1974
Master of Science, Physics

University of New Haven and Rensselear Polytechnic Institute, 1973
Bachelor of Science, Physics


Bell Labs
Director of Security Research, Internet Research
Created and led as a director two departments in security; The Internet Research Department and the Security Research Department. As director of Security Research, his role was to define the research direction for his department as well as to define the research direction for Alcatel-Lucent and Bell Labs. He managed and contributed to research on firewalls, intrusion detection systems, application layer firewalls and cryptography. His department was comprised of people with backgrounds in cryptography and computer science whose research mission was to create technologies that can be applied to the security of products and networks. As director of the Internet Research Department he led and contributed to research on latent vulnerabilities (with risks and impacts) and pathological deficiencies in network infrastructure, network services, and network user equipment for the Defense and Intelligence communities.
From: November 1999 to April 2012


Journal Articles

 

A Case Study on Constructing a Security Event Management (SEM) System, September 12, 2007. Vijay K. Gurbani, Debra L. Cook, Lawrence E. Menten, and Thomas B. Reddington, German Informatics 3rd International Conference on IT-Incident Management and IT-Forensics, Stuttgart, Germany.
Network Hierarchy and Multilayer Survivability, http://www.ietf.org/rfc/rfc3386.txt, W. Lai, Ed. & D. McDysan, ed. , Tom Reddington, contributing author, Nov 2002.
Network Hierarchy and Multilayer Survivability, http://tools.ietf.org/html/draft-team-tewg-restorehierarchy-00.pdf, Jim Boyle, Malin Carlzon, Rob Coltun, Tim Griffin, Ed Kern, Tom Reddington, Jan 2002
Interface Models Based on User Contexts, “A New Generation of Intelligent Interfaces”, IJCAI-89, August 22, 1989
Interactive PWB Layout: A Lost Art?, T. Reddington, 1988, IEEE Workshop on Computers in Power Electronics, MIT, August 22-23, 1988

 


Extensible Protocol Validation

Extensible Protocol Validation, L. Menten, A. Jeffrey, T. Reddington #8,356,332, January 15, 2013

Methods for selectively capturing and replicating one-time passwo, (Pending)

Methods for selectively capturing and replicating one-time password generator functionality from device to device, Debra L. Cook, Vijay K. Gurbani, Thomas B. Reddington #20090064294, August 28, 2007

Keyword Search Automatic Limiting Method

Keyword Search Automatic Limiting Method, T. Reddington #4,554,631, Nov. 19, 1985


Research Centers, Labs, and Groups