-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathresume.html
247 lines (240 loc) · 12.8 KB
/
resume.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
<html>
<head>
<title>Resume</title>
</head>
<body bgcolor=White text=Black>
<center>
<table align=center width=100%>
<tr>
<td align=left>
<b>Home Address</b> <br>
112 Hancock Street <br>
Somerville, MA 02144 <br>
</td>
<td align=center>
<h3>Christopher T. Lesniewski-Laas</h3>
<tt><a href="http://lesniewski.org/">http://lesniewski.org/</a></tt><br />
<tt>ctl at mit dot edu </tt>
<h5>Updated March 2010.</h5>
</td>
<td align=right>
<b>Work Address</b> <br>
32 Vassar Street 32-G996 <br>
Cambridge, MA 02139 <br>
+1 617 253 0004 <br>
</td>
</tr>
</table>
</center>
<hr>
<table width=100%>
<tr><td colspan=4><font size=+1><b><i>Experience</i></b></font></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://pdos.csail.mit.edu/"> MIT CSAIL, Parallel and Distributed Operating Systems</a></b></td>
<td align=right><i>Cambridge, MA</i></td>
<td align=right><b>2001 - 2010</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Research focus: computer systems, especially security of
large-scale decentralized Internet systems.</li>
<li>Thesis: <a href="http://pdos.csail.mit.edu/whanau/">Whanau</a>, a structured overlay routing protocol
(DHT) which uses a social network to provide robustness
against powerful pseudonym (Sybil) attacks.
Advisor: <a href="http://pdos.csail.mit.edu/~kaashoek/">M. Frans Kaashoek</a>.</li>
<li><a href="http://pdos.csail.mit.edu/uia/">UIA</a> & <a href="http://pdos.csail.mit.edu/eyo/">Eyo</a>: decentralized routing, naming, & storage in a
zero-configuration, secure, ad-hoc network.</li>
<li><a href="http://pdos.csail.mit.edu/alpaca/">Alpaca</a>: secure and flexible PKI based on a higher-order
logical framework.</li>
<li>Other work: distributed and dynamic compact routing for the
Internet; coroutine-based asynchronous I/O programming framework;
game theory, economics, mechanism design, and reputation in
decentralized systems; distributed Web caching; RSA acceleration
using a commodity GPU.</li>
<li>Master's thesis: <a href="http://pdos.csail.mit.edu/papers/ssl-splitting-ctl-meng-abstract.html">SSL Splitting and Barnraising: Cooperative
Caching with Authenticity Guarantees</a>.</li>
<li>Instructor, 6.033 Computer Systems Engineering, 2003-2005.</li>
<li>Visiting scholar, Cambridge University Computer Lab, 2004.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://www.permabit.com/"> Permabit</a></b></td>
<td align=right><i>Cambridge, MA</i></td>
<td align=right><b>2001</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Developed highly available, robust, secure, scalable data storage
system based on commodity hardware.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://research.microsoft.com/"> Microsoft Research</a></b></td>
<td align=right><i>Redmond, WA</i></td>
<td align=right><b>2000</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>I-Campus <i>Secure Successor to the MIT Card</i> project:
cryptographic protocol design.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://www.sensable.com/"> SensAble Technologies, Inc.</a></b></td>
<td align=right><i>Cambridge, MA</i></td>
<td align=right><b>1999</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>R&D: hardware and software development for the PHANToM haptic
interface.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://www-swiss.ai.mit.edu/"> MIT AI Lab, Mathematics and Computation</a></b></td>
<td align=right><i>Cambridge, MA</i></td>
<td align=right><b>1998</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Programmed randomly generated amorphous computers.
Advisors: Hal Abelson, Gerry Sussman.</li>
</ul></td></tr>
<tr><td colspan=4><font size=+1><b><i>Education</i></b></font></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://mit.edu/"> Massachusetts Institute of Technology</a></b></td>
<td align=right><i>Cambridge, MA</i></td>
<td align=right><b>1997 - Present</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Doctoral candidate, Computer Science, 2003 - present. (GPA 5.0)</li>
<li>M.Eng. and B.S. Electrical Engineering and Computer Science,
June 2003. (GPA 5.0)</li>
<li>B.S. Mathematics (Minor in Physics), June 2001. (GPA 4.9)</li>
<li>Topics: algorithms, complexity, compilers, software design,
modeling, cryptography, architecture, digital design, signal
processing, probability, algebra, quantum+stat physics, general
relativity, economics.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://www.cohassetk12.org/"> Cohasset High School</a></b></td>
<td align=right><i>Cohasset, MA</i></td>
<td align=right><b>1992 - 1997</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Valedictorian, early graduation, Harvard Extension School,
Center for Talented Youth (CTY).</li>
</ul></td></tr>
<tr><td colspan=4><font size=+1><b><i>Societies</i></b></font></td></tr>
<tr><td></td><td colspan=3><ul>
<li>MIT <a href="http://stuff.mit.edu/sipb/">Student Information Processing Board</a> (Chair, 2003-2004)</li>
<li><a href="http://hkn.mit.edu/">Eta Kappa Nu</a> (editor of <a href="http://hkn.mit.edu/ug_sel.php">UG6</a>, 2000-2001)</li>
<li><a href="http://www.pbk.org/">Phi Beta Kappa</a></li>
</ul></td></tr>
<tr><td colspan=4><font size=+1><b><i>Skills</i></b></font></td></tr>
<tr><td></td><td colspan=3><ul>
<li>Languages: Python, Haskell, C, C++ STL/Boost, Java, Perl,
Javascript, LISP, Matlab, VHDL, Postscript, various assembly,
SQL, XML, HTML, CSS, LaTeX, GLSL, LF, Intercal, French, Chinese</li>
<li>Network/system programming: TCP/IP, sockets, SSL/TLS, Kerberos,
asynchronous, threads, load balancing, scheduling, consistency,
kernels, compilers, JIT, virtualization, RDBMS, web apps, etc.</li>
<li>Unix development: Make, GCC, git, Subversion, svk, VIM, X11,
test suites, Ubuntu, Solaris, etc.</li>
<li>Digital design: Xilinx FPGA development tools, use of
oscilloscope, logic analyzer, datasheets, etc.</li>
<li>Hobbies: coding, cycling, photography, cooking, SCUBA, travel,
hiking, karate, economics</li>
</ul></td></tr>
<tr><td colspan=4><font size=+1><b><i>Software systems developed at MIT</i></b></font></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://pdos.csail.mit.edu/whanau/"> Whanau</a></b></td>
<td></td>
<td align=right><b>2010</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Designed and implemented a secure distributed hash table (DHT),
a decentralized structured overlay network which can quickly
look up the node responsible for a given key. (Existing DHT
applications include distributed databases, filesystems,
caching, rendezvous, and streaming multicast.)</li>
<li>Novelty: Whanau uses an online social network to bootstrap a
robust overlay network. It is secure against powerful denial of
service (DoS) attacks, including the pseudonym-based "Sybil
attack."</li>
<li>Implementation: high-performance in-memory simulator
(C++/Boost), asynchronous network daemon (Python) deployed on
PlanetLab testbed. Solo.</li>
<li>Supervised Master's thesis implementing secure SIP rendezvous
over Whanau (Java).</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://pdos.csail.mit.edu/uia/"> UIA</a></b></td>
<td></td>
<td align=right><b>2006</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Designed, implemented, debugged, and demoed a routing and naming
system which ties together users' many personal devices (e.g.,
laptops, phones, cameras, media players) into a coherent
cluster. After devices are named and introduced to each other,
UIA ensures that they can communicate whenever physically
possible. Users can refer to each others' devices by recursive
names such as <i>phone.dad.bob</i>.</li>
<li>Novelty: UIA maintains a shared, concurrently-modified namespace
across intermittently-connected devices, and securely propagates
peer-to-peer updates without relying on a master server.</li>
<li>Implementation: routing module and kernel hooks (C++/Boost), UI
(C++/QT), name database and resolver (Python).
Team: 4 core developers, 2 PIs.
Also incorporated into a Nokia product demo.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://pdos.csail.mit.edu/eyo/"> Eyo</a></b></td>
<td></td>
<td align=right><b>2009</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Continues the UIA project. Eyo is a data storage system and API
which provides a consistent view of a user's data objects (e.g.,
photos, music, email) across all of her devices. Eyo tracks
object updates, forwards changes to running applications,
handles network partitions and concurrent updates, and
proactively partitions and replicates data across heterogeneous
devices.</li>
<li>Novelty: Eyo separates objects' metadata from their content and
distributes all metadata to all devices, while partially
replicating content to some devices.</li>
<li>Implementation: storage system (Python), C API (C/D-Bus),
example applications (Python and C).
Team: 3 core developers, 1 collaborator, 2 PIs.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://pdos.csail.mit.edu/alpaca/"> Alpaca</a></b></td>
<td></td>
<td align=right><b>2007</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Invented and implemented a logic-based proof-carrying
authorization protocol. Alpaca provides an API enabling network
applications to state and prove logical assertions such as "the
principal Alice says to delete the file X" using cryptographic
operations specified in the accompanying proof.</li>
<li>Novelty: verifiers don't care how the proof is structured, as
long as it is valid. Thus, Alpaca permits provers to use
different cryptographic techniques (e.g., new hash functions or
data transport mechanisms) without breaking compatibility with
existing verifiers. Alpaca's flexibility is more "future-proof"
than crypto protocols such as Kerberos and TLS, which can only
be updated by installing new software.</li>
<li>Implementation: logic language, logic engine, cryptography, test
suites, demos (Python). Solo.</li>
</ul></td></tr>
<tr><td width=3%></td><td align=left ><b> <a href="http://pdos.csail.mit.edu/barnraising/"> Barnraising</a></b></td>
<td></td>
<td align=right><b>2003</b></td>
</tr>
<tr><td></td><td colspan=3><ul>
<li>Designed and implemented a peer-to-peer content distribution
network (CDN). Barnraising enables Web sites to delegate some
of their load to a distributed network of cooperating cache
hosts.</li>
<li>Novelty: Barnraising uses a new technique called SSL Splitting
to securely serve data using untrusted caches. Because a
malicious cache cannot send clients bogus data, Barnraising can
safely permit any Internet host to contribute cache space. Other
systems are limited to centrally-controlled cache servers.</li>
<li>Implementation: SSL Splitting library (drop-in replacement for
popular OpenSSL library, C), caching Web proxy, tracker, and DNS
server (Perl). Solo.</li>
</ul></td></tr>
<tr><td colspan=4><font size=+1><b><i>See also</i></b></font></td></tr>
<tr><td></td><td colspan=3><ul>
<li>CV: <a href="http://lesniewski.org/cv.pdf">http://lesniewski.org/cv.pdf</a></li>
<li>Twitter: <a href="http://twitter.com/lesniewski">http://twitter.com/lesniewski</a></li>
<li>LinkedIn: <a href="http://www.linkedin.com/in/chrislesniewski">http://www.linkedin.com/in/chrislesniewski</a></li>
<li>Facebook: <a href="http://www.facebook.com/lesniewski">http://www.facebook.com/lesniewski</a></li>
</ul></td></tr>
</table>
</body>
</html>