Tyler Moore, PhD

Bio
Tyler Moore is the Tandy Professor of Cyber Security and Information Assurance in the Tandy School of Computer Science at the University of Tulsa (TU). His research focuses on security economics, cybercrime measurement, and cybersecurity policy. He is a founding Editor in Chief of the Journal of Cybersecurity, a new interdisciplinary journal published by Oxford University Press. He was a 2016-17 New America Cybersecurity Fellow. Prior to joining TU, he was a postdoctoral fellow at the Center for Research on Computation and Society (CRCS) at Harvard University, the Hess Visiting Assistant Professor of Computer Science at Wellesley College, and an assistant professor at Southern Methodist University. A British Marshall Scholar, Prof. Moore completed his PhD at the University of Cambridge, while he holds BS degrees in Computer Science and Applied Mathematics from the University of Tulsa.
Research Interests
Security Economics, Cybercrime Measurement, Critical Infrastructure Protection, Digital Currencies, Cybersecurity Policy, Wireless Network Security
Teaching Interests
All core undergraduate and graduate computer science courses, and advanced courses in my research specialties. Courses of special interest include Secure Electronic Commerce, Security Economics, Data Structures and Algorithms, Introduction to Cyber Security, Foundations of Cyber Security.
Publications
Journal Articles
-
[1]Woods D. and Moore T., “Does insurance have a future in governing cybersecurity?”, vol. 18, 2020.
-
[1]Moore T., Christin N., and Szurdi J., “Revisiting the Risks of Bitcoin Currency Exchange Closure”, vol. 18, p. 50:1-, 2018.
-
[1]Gandal N., Hamrick J., Moore T., and Obermann T., “Price Manipulation in the Bitcoin Ecosystem”, vol. 95, p. 86-96, 2018.
-
M. Jhaveri, O. Cetin, C. Ganán, T. Moore, and M. Eeten, “Abuse Reporting and the Fight Against Cybercrime,” ACM Computing Surveys (CSUR), vol. 49, no. 4, p. 68, 2017.
-
[1]Rovner J. and Moore T., “Does the Internet Need a Hegemon?”, vol. 2, pp. 184-203, 2017.
-
[1]Drew J., Hahsler M., and Moore T., “Polymorphic malware detection using sequence classification methods and ensembles”, vol. 2017, p. 2, 2017.
-
M. Vasek, J. Wadleigh, and T. Moore, “Hacking is not random: a case-control study of webserver-compromise risk,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 206–219, 2016.
-
M. Riek, R. Böhme, and T. Moore, “Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 261–273, 2016.
-
O. Cetin, M. Jhaveri, C. Ganán, M. van Eeten, and T. Moore, “Understanding the role of sender reputation in abuse reporting and cleanup,” Journal of Cybersecurity, vol. 2, no. 1, pp. 83–98, 2016.
-
[1]Böhme R. and Moore T., “The ‘Iterated Weakest Link’ Model of Adaptive Security Investment”, vol. 7, pp. 81–102, 2016.
-
[1]Cetin O., Jhaveri M., Ganan C., van Eeten M., and Moore T., “Understanding the role of sender reputation in abuse reporting and cleanup”, in Workshop on the Economics of Information Security, 2015.
-
[1]Böhme R., Christin N., Edelman B., and Moore T., “Bitcoin: Economics, Technology, and Governance”, vol. 29, pp. 213-38, 2015.
-
[1]Drew J. and Moore T., “Optimized Combined Clustering Methods for Finding Replicated Criminal Websites”, vol. 2014, 2014.
-
[1]Papa S., Casper W., and Moore T., “Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis”, vol. 6, pp. 96-106, 2013.
-
[1]Moore T., “The promise and perils of digital currencies”, vol. 6, pp. 147–149, 2013.
-
[1]Landau S. and Moore T., “Economic tussles in federated identity management”, vol. 17, 2012.
-
[1]Landau S. and Moore T., “Economic tussles in federated identity management”, in 10th Annual Workshop on the Economics of Information Security (WEIS), 2011.
-
[1]Moore T. and Clayton R., “The Impact of Public Information on Phishing Attack and Defense”, vol. 1, pp. 45-68, 2011.
-
[1]Moore T., “Investigating the abuse of search engines to promote illicit online pharmacies”, 2011.
-
[1]Moore T., “The economics of cybersecurity: Principles and policy options”, vol. 3, pp. 103 – 117, 2010.
-
[1]Böhme R. and Moore T., “The Iterated Weakest Link”, vol. 8, pp. 53-55, 2010.
-
[1]Moran T. and Moore T., “The Phish-Market Protocol: Secure Sharing Between Competitors”, vol. 8, pp. 40-45, 2010.
-
[1]Moore T., Clayton R., and Anderson R., “The Economics of Online Crime”, vol. 23, pp. 3–20, 2009.
-
[1]Moore T., “How wise are crowds when assessing phishing websites?”, 2008.
-
[1]Moore T., “Phishing and the Economics of E-crime”, vol. 4, pp. 34–37, 2007.
-
[1]Clulow J. and Moore T., “Suicide for the common good: a new strategy for credential revocation in self-organizing systems”, vol. 40, pp. 18-21, 2006.
-
[1]Anderson R. and Moore T., “The Economics of Information Security”, vol. 314, pp. 610-613, 2006.
-
[1]Moore T. and Anderson R., “Trends in Security Economics”, vol. 1, pp. 6–7, 2005.
Conference Proceedings
-
[1]Anderson R., “Measuring the Changing Cost of Cybercrime”, in 18th Workshop on the Economics of Information Security (WEIS), 2019.
-
[1]Woods D., Moore T., and Simpson A., “The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices”, in 18th Workshop on the Economics of Information Security (WEIS), 2019.
-
[1]Hamrick J., “The economics of cryptocurrency pump and dump schemes”, in 18th Workshop on the Economics of Information Security (WEIS), 2019.
-
[1]Moore T., Kenneally E., Collett M., and Thapa P., “Valuing cybersecurity research datasets”, in 18th Workshop on the Economics of Information Security (WEIS), 2019.
-
[1]Vasek M. and Moore T., “Analyzing the Bitcoin Ponzi Scheme Ecosystem”, in Fifth Workshop on Bitcoin and Blockchain Research, 2018.
-
[1]Zheng M., Robbins H., Chai Z., Thapa P., and Moore T., “Cybersecurity Research Datasets: Taxonomy and Empirical Analysis”, in 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18), 2018.
-
[1]Feder A., Gandal N., Hamrick J., Moore T., and Vasek M., “The rise and fall of cryptocurrencies”, in 17th Workshop on the Economics of Information Security (WEIS), 2018.
-
[1]Tajalizadehkhoob S., van Goethem T., Noroozian A., Moore T., Joosen W., and van Eeten M., “Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting”, in ACM SIGSAC Conference on Computer and Communications Security, 2017.
-
[1]Spring J., Moore T., and Pym D., “Practicing a Science of Security: A Philosophy of Science Perspective”, in New Security Paradigms Workshop (NSPW), 2017.
-
T. Moore, S. Dynes, and F. Chang, “Identifying how firms manage cybersecurity investment,” in 15th Workshop on the Economics of Information Security (WEIS), 2016.
-
M. Vasek, M. Weeden, and T. Moore, “Measuring the Impact of Sharing Abuse Data with Web Hosting Providers,” in ACM Workshop on Information Sharing and Collaborative Security, 2016, pp. 71–80.
-
[1]Vasek M., Bonneau J., Castellucci R., Keith C., and Moore T., “The Bitcoin brain drain: Examining the Use and Abuse of Bitcoin Brain Wallets”, in Financial Cryptography and Data Security, 2016.
-
A. Feder, N. Gandal, J. T. Hamrick, and T. Moore, “The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox,” in 15th Workshop on the Economics of Information Security (WEIS), 2016.
-
[1]Drew J., Hahsler M., and Moore T., “Polymorphic Malware Detection Using Sequence Classification Methods”, in Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW), 2016, pp. 81–87.
-
[1]Cetin O., Jhaveri M., Ganan C., van Eeten M., and Moore T., “Understanding the role of sender reputation in abuse reporting and cleanup”, in Workshop on the Economics of Information Security, 2015.
-
[1]Clayton R., Moore T., and Christin N., “Concentrating Correctly on Cybercrime Concentration”, in Workshop on the Economics of Information Security, 2015.
-
[1]Moore F. and Sullivan R., “The Economics of Retail Payments Security”, in Fifth International Payments Policy Conference: The Puzzle of Payments Security, Federal Reserve Bank of Kansas City, 2015.
-
[1]Moore T. and Clayton R., “Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm”, in APWG Symposium on Electronic Crime Research, 2015.
-
[1]Wadleigh J., Drew J., and Moore T., “The E-Commerce Market for ‘Lemons’: Identification and Analysis of Websites Selling Counterfeit Goods”, in International World Wide Web Conference (Security and Privacy Track), 2015, pp. 1188-1197.
-
[1]Vasek M. and Moore T., “There’s no free lunch, even using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams”, in Financial Cryptography and Data Security, 2015, vol. 8975, pp. 44-61.
-
[1]Leontiadis N., Moore T., and Christin N., “A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning”, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014, pp. 930–941.
-
[1]Drew J. and Moore T., “Automatic Identification of Replicated Criminal Websites Using Combined Clustering”, in International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops, 2014.
-
[1]“Financial Cryptography and Data Security – 18th International Conference, FC 2014, Revised Selected Papers”, in Financial Cryptography and Data Security, 2014, vol. 8438.
-
[1]Riek M., Böhme R., and Moore T., “Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users”, in 13th Annual Workshop on the Economics of Information Security (WEIS), 2014.
-
[1]Vasek M., Thornton M., and Moore T., “Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem”, in 1st Workshop on Bitcoin Research, 2014, vol. 8438, pp. 57–71.
-
[1]Johnson B., Laszka A., Grossklags J., Vasek M., and Moore T., “Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools”, in 1st Workshop on Bitcoin Research, 2014, vol. 8438, pp. 72–86.
-
[1]Vasek M. and Moore T., “Identifying Risk Factors for Webserver Compromise”, in Financial Cryptography and Data Security, 2014, vol. 8437, pp. 326–345.
-
[1]Moore T. and Clayton R., “The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites”, in Financial Cryptography and Data Security, 2014, vol. 8437, pp. 33–48.
-
[1]Vasek M. and Moore T., “Empirical Analysis of Factors Affecting Malware URL Detection”, in 8th APWG eCrime Researchers Summit (eCrime), 2013.
-
[1]Leontiadis N., Moore T., and Christin N., “Pick Your Poison: Pricing and Inventories at Unlicensed Online Pharmacies”, in ACM Conference on Electronic Commerce (EC), 2013, pp. 621-638.
-
[1]Moore T. and Christin N., “Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk”, in Financial Cryptography and Data Security, 2013, vol. 7859, pp. 25-33.
-
[1]Edwards B., Moore T., Stelle G., Hofmeyr S., and Forrest S., “Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions”, in Proceedings of the New Security Paradigms Workshop,
Bertinoro, Italy, September 19-21, 2012, 2012. -
[1]Vasek M. and Moore T., “Do malware reports expedite cleanup? An experimental study”, in Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test, 2012.
-
[1]Anderson R., “Measuring the Cost of Cybercrime”, in 11th Annual Workshop on the Economics of Information Security (WEIS), 2012.
-
[1]Moore T., Han J., and Clayton R., “The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs”, in Financial Cryptography and Data Security, 2012, vol. 7397, pp. 41-56.
-
[1]Moore T. and Clayton R., “Discovering Phishing Dropboxes Using Email Metadata”, in 7th APWG eCrime Researchers Summit (eCrime), 2012.
-
[1]Böhme R. and Moore T., “How Do Consumers React to Cybercrime?”, in APWG eCrime Researchers Summit (eCrime), 2012.
-
[1]Landau S. and Moore T., “Economic tussles in federated identity management”, in 10th Annual Workshop on the Economics of Information Security (WEIS), 2011.
-
[1]Moore T. and Clayton R., “Ethical Dilemmas in Take-Down Research”, in Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops), 2011, vol. 7126, pp. 154-168.
-
[1]Moore T., Leontiadis N., and Christin N., “Fashion crimes: trending-term exploitation on the web”, in ACM Conference on Computer and Communications Security (CCS), 2011, pp. 455-466.
-
[1]Leontiadis N., Moore T., and Christin N., “Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade”, in USENIX Security Symposium, 2011.
-
[1]Hofmeyr S., Moore T., Forrest S., Edwards B., and Stelle G., “Modeling Internet-Scale Policies for Cleaning up Malware”, in 10th Annual Workshop on the Economics of Information Security (WEIS), 2011.
-
[1]Moore T. and Edelman B., “Measuring the Perpetrators and Funders of Typosquatting”, in Financial Cryptography and Data Security, 2010, vol. 6052, pp. 175-191.
-
[1]Moran T. and Moore T., “The Phish-Market Protocol: Securely Sharing Attack Data between Competitors”, in Financial Cryptography and Data Security, 2010, vol. 6052, pp. 222-237.
-
[1]Moore T., Friedman A., and Procaccia A., “Would a ’cyber warrior’ protect us: exploring trade-offs between attack and defense of information systems”, in New Security Paradigms Workshop (NSPW), 2010, pp. 85-94.
-
[1]Moore T. and Clayton R., “Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing”, in Financial Cryptography and Data Security, 2009, vol. 5628, pp. 256-272.
-
[1]Moore T., Clayton R., and Stern H., “Temporal correlations between spam and phishing websites”, in Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, 2009.
-
[1]Böhme R. and Moore T., “The Iterated Weakest Link – A Model of Adaptive Security Investment”, in 8th Annual Workshop on the Economics of Information Security (WEIS), 2009.
-
[1]Moore T. and Clayton R., “Evaluating the Wisdom of Crowds in Assessing Phishing Websites”, in Financial Cryptography and Data Security, 2008, vol. 5143, pp. 16-30.
-
[1]Moore T., Raya M., Clulow J., Papadimitratos P., Anderson R., and Hubaux J.-P., “Fast Exclusion of Errant Devices from Vehicular Networks”, in Proceedings of the Fifth Annual IEEE Communications Society
Conference on Sensor, Mesh and Ad Hoc Communications and
Networks (SECON), 2008, pp. 135-143. -
[1]Anderson R., Böhme R., Clayton R., and Moore T., “Security Economics and European Policy”, in Information Security Solutions Europe (ISSE), 2008, pp. 57-76.
-
[1]Moore T. and Clayton R., “The Consequence of Non-Cooperation in the Fight Against Phishing”, in APWG eCrime Researchers Summit, 2008, pp. 1-14.
-
[1]Moore T. and Clayton R., “An Empirical Analysis of the Current State of Phishing Attack and Defence”, in 6th Annual Workshop on the Economics of Information Security (WEIS), 2007.
-
[1]Moore T. and Clayton R., “Examining the impact of website take-down on phishing”, in APWG eCrime Researchers Summit, 2007, vol. 269, pp. 1-13.
-
[1]Anderson R. and Moore T., “Information Security Economics – and Beyond”, in 27th Annual International Cryptology Conference (CRYPTO), 2007, vol. 4622, pp. 68-91.
-
[1]Moore T., Clulow J., Nagaraja S., and Anderson R., “New Strategies for Revocation in Ad-Hoc Networks”, in 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), 2007, vol. 4572, pp. 232-246.
-
[1]Moore T. and Clulow J., “Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks”, in Proceedings of the IFIP TC-11 22nd International
Information Security Conference (IFIP SEC), 2007, vol. 232, pp. 157-168. -
[1]“Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings”, 2007, vol. 4572.
-
[1]Moore T., “A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks”, in 4th IEEE Conference on Pervasive Computing and Communications Security (PerSec), 2006, pp. 251-255.
-
[1]Clulow J., Hancke G., Kuhn M., and Moore T., “So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks”, in 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), 2006, vol. 4357, pp. 83-97.
-
[1]Moore T., “The Economics of Digital Forensics”, in 5th Annual Workshop on the Economics of Information Security (WEIS), 2006.
-
[1]Moore T., “Countering Hidden-Action Attacks on Networked Systems”, in 4th Annual Workshop on the Economics of Information Security (WEIS), 2005.
-
[1]Kosloff T., Moore T., Keller J., Manes G., and Shenoi S., “Attacks on public telephone networks: technologies and challenges”, in SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, 72, 2003, pp. 72-83.
-
[1]Kosloff T., Moore T., Keller J., Manes G., and Shenoi S., “SS7 Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection”, in Workshop on the Scientific Aspects of Cyber Terrorism, 2002.
-
[1]“Securing SS7 Telecommunications Networks”, in Second IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2001.
Books
-
[1]Economics of Information Security and Privacy. Springer, 2010.
Book Chapters
-
[1]Moore T. and Anderson R., “Internet Security”, in The Oxford Handbook of the Digital Economy, Oxford University Press, 2012, pp. 572-599.
-
[1]Moore T., “The economics of cybersecurity: Principles and policy options”, in Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, The National Academies Press, 2010, pp. 3–23.
-
[1]Moore T., “The economics of cybersecurity: Principles and policy options”, vol. 3, pp. 103 – 117, 2010.
-
[1]Anderson R., Moore T., Nagaraja S., and Ozment A., “Incentives and Information Security”, in Algorithmic Game Theory, Cambridge University Press, 2007, pp. 633-649.
-
[1]Swenson C., Moore T., and Shenoi S., “GSM Cell Site Forensics”, in Advances in Digital Forensics II, vol. 222, Springer, 2006, pp. 259-272.
-
[1]Moore T., Meehan A., Manes G., and Shenoi S., “Using Signaling Information in Telecom Network Forensics”, in Advances in Digital Forensics, vol. 194, Springer, 2005, pp. 177-188.
Other
-
[1]Moore T., “Workshop Report: DIMACS Workshop on Information Security Economics”. 2007.
Courses Taught
- Research and Dissertation
- Independent Study
- Programming Languages and Structures
- Foundations of Cyber Security
- Data Structures
- Special Topics in Computer Science
- Special Topics
- Introduction to Cyber Security
- Research and Thesis
- Secure Electronic Commerce