Curriculum Vitae

I am a Ph.D. Candidate in Computer Science and Engineering at the University of Michigan where my research focuses on computer security and privacy. I am advised by Professor J. Alex Halderman. I can best be reached at benvds@umich.edu

Education

Expected Spring 2021

PhD in Computer Science and Engineering, University of Michigan

    Advisor: J. Alex Halderman

Spring 2015

B.S.E. in Computer Science, Minor in Mathematics, University of Michigan

    Summa Cum Laude

Awards and Honors

  • National Science Foundation, Graduate Research Fellowship Program, Honorable Mention 2016
  • Best Paper Award, CCS'15, Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
  • 2015 Pwnie for Most Innovative Research, Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Selected Conference Papers

Towards a Complete View of the Certificate Ecosystem

  • Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael Bailey, J. Alex Halderman
  • ACM Internet Measurement Conference (IMC'16), November 2016

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

  • David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Beguelin, and Paul Zimmermann
  • ACM Computer and Communications Security (CCS'15), October 2015
  • Best Paper Award

Other Peer-Reviewed Publications

An ISP-Scale Deployment of TapDance

  • Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, and Eric Wustrow
  • USENIX Workshop on Free and Open Communications on the Internet (FOCI'17), August 2017

A Security Analysis of Police Computer Systems

  • Benjamin VanderSloot, Stuart Wheaton, and J. Alex Halderman
  • IEEE Privacy, Security, and Trust (PST'17), December 2017

DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work

  • Benjamin VanderSloot, Eric Wustrow
  • USENIX Workshop on Offensive Technologies (WOOT'16), August 2016

A Memory Rename Table to Reduce Energy and Improve Performance

  • Joseph Pusdesris, Benjamin VanderSloot, Trevor Mudge
  • ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED'14), August 2014

Teaching

Winter 2018

Lecturer, Introduction to Computer Security

EECS 388, University of Michigan

  • Delivered one third of the lectures to a 380 student course
  • Held office hours to reinforce knowledge and assist on homeworks and projects
  • Oversaw the deployment of improvements to this long-standing course

Fall 2017

Graduate Student Instructor, Introduction to Computer Security

EECS 388, University of Michigan

  • Delivered binary exploitation and control flow integrity lectures
  • Conducted weekly discussion sections to reinforce course material
  • Held office hours to reinforce knowledge and assist on homeworks and projects
  • Released and graded multiple projects and homeworks

Fall 2016

Guest Lecturer, Introduction to Computer Security

EECS 388, University of Michigan

  • Delivered a lecture on Cyberconfilict from an international policy perspective

Fall 2016

Guest Lecturer, Computer and Network Security

EECS 588, University of Michigan

  • Delivered a lecture on Cyberconfilict from an international policy perspective

Professional Service

  • External reviewer, ACM Conference on Computer and Communications Security (CCS) 2017
  • External reviewer, Internet Society Network and Distributed System Security Symposium (NDSS) 2017

University Service

  • Vice President and Treasurer, Computer Science and Engineering Graduate student organization, University of Michigan, May 2016 – May 2017
  • Dissonance Speaker Series, Founding Committee Member
  • Chapter President, Eta Kappa Nu (IEEE Honor Society), May 2014 – December 2014

Invited Talks

  • Censored Planet: Measuring Internet Censorship Globally and Continuously at 2018 International Conference on Cyber Security (ICCS'18) on 2018-01-10

Professional Experience

June 2014 – Aug 2014

Software Development Engineer Intern

Microsoft, Windows Operating Systems Services Group

  • Designed, deployed redundant storage layer for reliablility in memcached-like service
  • Worked with other teams in the organization to promote use of designed storage stack

May 2012 – Aug 2012

Software Engineer Intern

Qualcomm Incorporated, Windows 8 Group

  • Designed a new test automation framework
  • Educated test technicians and engineers how to use the developed framework

Patents

United States Patent No. 9,471,480 for Data processing apparatus with memory rename table for mapping memory addresses to registers.