google-plus
utulsa.edu

Tyler Moore PhD

Assistant Professor of Computer Science and Tandy Endowed Assistant Professor of Cyber Security and Information Assurance College of Engineering & Natural Sciences
Tandy School of Computer Science

tyler-moore@utulsa.edu
https://tylermoore.utulsa.edu
Curriculum Vitae [PDF]
faculty-photo

Biography

Tyler Moore is the Tandy Assistant Professor of Cyber Security and Information Assurance in the Tandy School of Computer Science at The University of Tulsa. His research focuses on the economics of information security, the study of electronic crime, and the development of policy for strengthening security. He is also interested in digital currencies, critical infrastructure protection and digital forensics. Tyler directs the Security Economics Lab at TU and serves as Director of StopBadware, a non-profit anti-malware organization. He is a founding Editor-in-Chief of the Journal of Cybersecurity, a new interdisciplinary journal published by Oxford University Press. Prior to joining TU, he was a postdoctoral fellow at the Center for Research on Computation and Society (CRCS) at Harvard University, the Hess Visiting Assistant Professor of Computer Science at Wellesley College, and an assistant professor at Southern Methodist University. A British Marshall Scholar, Tyler completed his PhD at the University of Cambridge, while he holds BS degrees in Computer Science and Applied Mathematics from the University of Tulsa.


Ph.D., University of Cambridge
B.S., University of Tulsa
B.S., University of Tulsa


Security Economics, Cybercrime Measurement, Critical Infrastructure Protection, Digital Currencies, Cybersecurity Policy, Wireless Network Security

All core undergraduate and graduate computer science courses, and advanced courses in my research specialties. Courses of special interest include Secure Electronic Commerce, Security Economics, Data Structures and Algorithms, Introduction to Cyber Security, Foundations of Cyber Security.


The following may be selected publications rather than a comprehensive list.

Journal Articles


M. Jhaveri, O. Cetin, C. Ganán, T. Moore, and M. Eeten, “Abuse Reporting and the Fight Against Cybercrime,” ACM Computing Surveys (CSUR), vol. 49, no. 4, p. 68, 2017.

M. Riek, R. Böhme, and T. Moore, “Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 261–273, 2016.

M. Vasek, J. Wadleigh, and T. Moore, “Hacking is not random: a case-control study of webserver-compromise risk,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 206–219, 2016.

O. Cetin, M. Jhaveri, C. Ganán, M. van Eeten, and T. Moore, “Understanding the role of sender reputation in abuse reporting and cleanup,” Journal of Cybersecurity, vol. 2, no. 1, pp. 83–98, 2016.

R. Böhme and T. Moore, “The ‘Iterated Weakest Link’ Model of Adaptive Security Investment,” Journal of Information Security, vol. 7, no. 2, pp. 81–102, 2016.

R. Böhme, N. Christin, B. Edelman, and T. Moore, “Bitcoin: Economics, Technology, and Governance,” Journal of Economic Perspectives, vol. 29, no. 2, pp. 213–38, 2015.

J. Drew and T. Moore, “Optimized Combined Clustering Methods for Finding Replicated Criminal Websites,” EURASIP Journal on Information Security, vol. 2014, no. 14, 2014.

T. Moore, “The promise and perils of digital currencies,” International Journal of Critical Infrastructure Protection, vol. 6, no. 3–4, pp. 147–149, 2013.

S. Papa, W. Casper, and T. Moore, “Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis,” International Journal of Critical Infrastructure Protection, vol. 6, no. 2, pp. 96–106, 2013.

S. Landau and T. Moore, “Economic tussles in federated identity management,” First Monday, vol. 17, no. 10, 2012.

T. Moore, “Investigating the abuse of search engines to promote illicit online pharmacies,” Virus Bulletin, 2011.

T. Moore and R. Clayton, “The Impact of Public Information on Phishing Attack and Defense,” Communications & Strategies, vol. 1, no. 81, pp. 45–68, 2011.

T. Moran and T. Moore, “The Phish-Market Protocol: Secure Sharing Between Competitors,” IEEE Security & Privacy, vol. 8, no. 4, pp. 40–45, 2010.

R. Böhme and T. Moore, “The Iterated Weakest Link,” IEEE Security & Privacy, vol. 8, no. 1, pp. 53–55, 2010.

T. Moore, “The economics of cybersecurity: Principles and policy options,” International Journal of Critical Infrastructure Protection, vol. 3, no. 3–4, pp. 103–117, 2010.

T. Moore, R. Clayton, and R. Anderson, “The Economics of Online Crime,” Journal of Economic Perspectives, vol. 23, no. 3, pp. 3–20, 2009.

T. Moore, “How wise are crowds when assessing phishing websites?,” Virus Bulletin, 2008.

T. Moore, “Phishing and the Economics of E-crime,” Elsevier Infosecurity Magazine, vol. 4, no. 6, pp. 34–37, 2007.

J. Clulow and T. Moore, “Suicide for the common good: a new strategy for credential revocation in self-organizing systems,” Operating Systems Review, vol. 40, no. 3, pp. 18–21, 2006.

R. Anderson and T. Moore, “The Economics of Information Security,” Science, vol. 314, no. 5799, pp. 610–613, 2006.

T. Moore and R. Anderson, “Trends in Security Economics,” European Network and Information Security Agency Quarterly, vol. 1, no. 3, pp. 6–7, 2005.

Book Chapters


T. Moore and R. Anderson, “Internet Security,” in The Oxford Handbook of the Digital Economy, M. Peitz and J. Waldfogel, Eds. Oxford University Press, 2012, pp. 572–599.

T. Moore, “The economics of cybersecurity: Principles and policy options,” in Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, The National Academies Press, 2010, pp. 3–23.

R. Anderson, T. Moore, S. Nagaraja, and A. Ozment, “Incentives and Information Security,” in Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Eds. Cambridge University Press, 2007, pp. 633–649.

C. Swenson, T. Moore, and S. Shenoi, “GSM Cell Site Forensics,” in Advances in Digital Forensics II, vol. 222, M. Olivier and S. Shenoi, Eds. Springer, 2006, pp. 259–272.

T. Moore, A. Meehan, G. Manes, and S. Shenoi, “Using Signaling Information in Telecom Network Forensics,” in Advances in Digital Forensics, vol. 194, M. Pollitt and S. Shenoi, Eds. Springer, 2005, pp. 177–188.

Book


Economics of Information Security and Privacy. Springer, 2010.

Conference Proceedings


J. Drew, M. Hahsler, and T. Moore, “Polymorphic Malware Detection Using Sequence Classification Methods,” in Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW), 2016, pp. 81–87.

M. Vasek, J. Bonneau, R. Castellucci, C. Keith, and T. Moore, “The Bitcoin brain drain: Examining the Use and Abuse of Bitcoin Brain Wallets,” in Financial Cryptography and Data Security, 2016.

M. Vasek, M. Weeden, and T. Moore, “Measuring the Impact of Sharing Abuse Data with Web Hosting Providers,” in ACM Workshop on Information Sharing and Collaborative Security, 2016, pp. 71–80.

T. Moore, S. Dynes, and F. Chang, “Identifying how firms manage cybersecurity investment,” in 15th Workshop on the Economics of Information Security (WEIS), 2016.

A. Feder, N. Gandal, J. T. Hamrick, and T. Moore, “The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox,” in 15th Workshop on the Economics of Information Security (WEIS), 2016.

J. Wadleigh, J. Drew, and T. Moore, “The E-Commerce Market for ‘Lemons’: Identification and Analysis of Websites Selling Counterfeit Goods,” in International World Wide Web Conference (Security and Privacy Track), 2015, pp. 1188–1197.

O. Cetin, M. Jhaveri, C. Ganan, M. van Eeten, and T. Moore, “Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup,” in Workshop on the Economics of Information Security, 2015.

F. Moore and R. Sullivan, “The Economics of Retail Payments Security,” in Fifth International Payments Policy Conference: The Puzzle of Payments Security, Federal Reserve Bank of Kansas City, 2015.

R. Clayton, T. Moore, and N. Christin, “Concentrating Correctly on Cybercrime Concentration,” in Workshop on the Economics of Information Security, 2015.

T. Moore and R. Clayton, “Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm,” in APWG Symposium on Electronic Crime Research, 2015.

M. Vasek and T. Moore, “There’s no free lunch, even using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams,” in Financial Cryptography and Data Security, 2015, vol. 8975, pp. 44–61.

M. Vasek, M. Thornton, and T. Moore, “Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem,” in 1st Workshop on Bitcoin Research, 2014, vol. 8438, pp. 57–71.

B. Johnson, A. Laszka, J. Grossklags, M. Vasek, and T. Moore, “Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools,” in 1st Workshop on Bitcoin Research, 2014, vol. 8438, pp. 72–86.

T. Moore and R. Clayton, “The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites,” in Financial Cryptography and Data Security, 2014, vol. 8437, pp. 33–48.

M. Vasek and T. Moore, “Identifying Risk Factors for Webserver Compromise,” in Financial Cryptography and Data Security, 2014, vol. 8437, pp. 326–345.

M. Riek, R. Böhme, and T. Moore, “Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users,” in 13th Annual Workshop on the Economics of Information Security (WEIS), 2014.

N. Leontiadis, T. Moore, and N. Christin, “A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014, pp. 930–941.

J. Drew and T. Moore, “Automatic Identification of Replicated Criminal Websites Using Combined Clustering,” in International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops, 2014.

“Financial Cryptography and Data Security – 18th International Conference, FC 2014, Revised Selected Papers,” in Financial Cryptography and Data Security, 2014, vol. 8438.

M. Vasek and T. Moore, “Empirical Analysis of Factors Affecting Malware URL Detection,” in 8th APWG eCrime Researchers Summit (eCrime), 2013.

N. Leontiadis, T. Moore, and N. Christin, “Pick Your Poison: Pricing and Inventories at Unlicensed Online Pharmacies,” in ACM Conference on Electronic Commerce (EC), 2013, pp. 621–638.

T. Moore and N. Christin, “Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk,” in Financial Cryptography and Data Security, 2013, vol. 7859, pp. 25–33.

T. Moore and R. Clayton, “Discovering Phishing Dropboxes Using Email Metadata,” in 7th APWG eCrime Researchers Summit (eCrime), 2012.

R. Böhme and T. Moore, “How Do Consumers React to Cybercrime?,” in APWG eCrime Researchers Summit (eCrime), 2012.

R. Anderson, C. Barton, R. Böhme, R. Clayton, M. van Eeten, M. Levi, T. Moore, and S. Savage, “Measuring the Cost of Cybercrime,” in 11th Annual Workshop on the Economics of Information Security (WEIS), 2012.

T. Moore, J. Han, and R. Clayton, “The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs,” in Financial Cryptography and Data Security, 2012, vol. 7397, pp. 41–56.

B. Edwards, T. Moore, G. Stelle, S. Hofmeyr, and S. Forrest, “Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions,” in Proceedings of the New Security Paradigms Workshop, Bertinoro, Italy, September 19-21, 2012, 2012.

M. Vasek and T. Moore, “Do malware reports expedite cleanup? An experimental study,” in Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test, 2012.

N. Leontiadis, T. Moore, and N. Christin, “Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade,” in USENIX Security Symposium, 2011.

S. Hofmeyr, T. Moore, S. Forrest, B. Edwards, and G. Stelle, “Modeling Internet-Scale Policies for Cleaning up Malware,” in 10th Annual Workshop on the Economics of Information Security (WEIS), 2011.

T. Moore, N. Leontiadis, and N. Christin, “Fashion crimes: trending-term exploitation on the web,” in ACM Conference on Computer and Communications Security (CCS), 2011, pp. 455–466.

S. Landau and T. Moore, “Economic Tussles in Federated Identity Management,” in 10th Annual Workshop on the Economics of Information Security (WEIS), 2011.

T. Moore and R. Clayton, “Ethical Dilemmas in Take-Down Research,” in Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops), 2011, vol. 7126, pp. 154–168.

T. Moore, A. Friedman, and A. Procaccia, “Would a ’cyber warrior’ protect us: exploring trade-offs between attack and defense of information systems,” in New Security Paradigms Workshop (NSPW), 2010, pp. 85–94.

T. Moran and T. Moore, “The Phish-Market Protocol: Securely Sharing Attack Data between Competitors,” in Financial Cryptography and Data Security, 2010, vol. 6052, pp. 222–237.

T. Moore and B. Edelman, “Measuring the Perpetrators and Funders of Typosquatting,” in Financial Cryptography and Data Security, 2010, vol. 6052, pp. 175–191.

“Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers,” 2010, vol. 342.

T. Moore, R. Clayton, and H. Stern, “Temporal correlations between spam and phishing websites,” in Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, 2009.

R. Böhme and T. Moore, “The Iterated Weakest Link - A Model of Adaptive Security Investment,” in 8th Annual Workshop on the Economics of Information Security (WEIS), 2009.

T. Moore and R. Clayton, “Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing,” in Financial Cryptography and Data Security, 2009, vol. 5628, pp. 256–272.

T. Moore and R. Clayton, “The Consequence of Non-Cooperation in the Fight Against Phishing,” in APWG eCrime Researchers Summit, 2008, pp. 1–14.

T. Moore and R. Clayton, “Evaluating the Wisdom of Crowds in Assessing Phishing Websites,” in Financial Cryptography and Data Security, 2008, vol. 5143, pp. 16–30.

R. Anderson, R. Böhme, R. Clayton, and T. Moore, “Security Economics and European Policy,” in Information Security Solutions Europe (ISSE), 2008, pp. 57–76.

T. Moore, M. Raya, J. Clulow, P. Papadimitratos, R. Anderson, and J.-P. Hubaux, “Fast Exclusion of Errant Devices from Vehicular Networks,” in Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, pp. 135–143.

“Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings,” 2007, vol. 4572.

T. Moore and R. Clayton, “An Empirical Analysis of the Current State of Phishing Attack and Defence,” in 6th Annual Workshop on the Economics of Information Security (WEIS), 2007.

R. Anderson and T. Moore, “Information Security Economics - and Beyond,” in 27th Annual International Cryptology Conference (CRYPTO), 2007, vol. 4622, pp. 68–91.

T. Moore, J. Clulow, S. Nagaraja, and R. Anderson, “New Strategies for Revocation in Ad-Hoc Networks,” in 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), 2007, vol. 4572, pp. 232–246.

T. Moore and J. Clulow, “Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks,” in Proceedings of the IFIP TC-11 22nd International Information Security Conference (IFIP SEC), 2007, vol. 232, pp. 157–168.

T. Moore and R. Clayton, “Examining the impact of website take-down on phishing,” in APWG eCrime Researchers Summit, 2007, vol. 269, pp. 1–13.

T. Moore, “The Economics of Digital Forensics,” in 5th Annual Workshop on the Economics of Information Security (WEIS), 2006.

T. Moore, “A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks,” in 4th IEEE Conference on Pervasive Computing and Communications Security (PerSec), 2006, pp. 251–255.

J. Clulow, G. Hancke, M. Kuhn, and T. Moore, “So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks,” in 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), 2006, vol. 4357, pp. 83–97.

T. Moore, “Countering Hidden-Action Attacks on Networked Systems,” in 4th Annual Workshop on the Economics of Information Security (WEIS), 2005.

T. Kosloff, T. Moore, J. Keller, G. Manes, and S. Shenoi, “Attacks on public telephone networks: technologies and challenges,” in SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, 72, 2003, pp. 72–83.

T. Kosloff, T. Moore, J. Keller, G. Manes, and S. Shenoi, “SS7 Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection,” in Workshop on the Scientific Aspects of Cyber Terrorism, 2002.

G. Lorenz, T. Moore, G. Manes, J. Hale, and S. Shenoi, “Securing SS7 Telecommunications Networks,” in Second IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2001.

Other


T. Moore, “Workshop Report: DIMACS Workshop on Information Security Economics,” 2007.


CS 7863 Special Topics in Computer Science
CS 9989 Research and Dissertation