Jump to content

Ross J. Anderson

From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Ross J. Anderson
Anderson in 2008
Born
Ross John Anderson

(1956-09-15)15 September 1956[4]
Died28 March 2024(2024-03-28) (aged 67)
Cambridge, England
NationalityBritish
EducationHigh School of Glasgow
Alma materUniversity of Cambridge (MA, PhD)
Known for
  • Banking security
  • Security economics
  • Information policy
  • Serpent (cipher)
  • University of Cambridge politics
  • Security Engineering book[5]
SpouseShireen Anderson
ChildrenOne
AwardsLovelace Medal (2015)
Scientific career
Fields
Institutions
ThesisRobust Computer Security (1995)
Doctoral advisorRoger Needham[3]
Doctoral students
Websitewww.cl.cam.ac.uk/~rja14/ Edit this at Wikidata

Ross John Anderson (15 September 1956 – 28 March 2024) was a British researcher, author, and industry consultant in security engineering.[5] He was Professor of Security Engineering at the Department of Computer Science and Technology, University of Cambridge[6] where he was part of the University's security group.[7][8][9]

Education

Anderson was educated at the High School of Glasgow.[4] In 1978, he graduated with a Bachelor of Arts in mathematics and natural science from the University of Cambridge where he was an undergraduate student of Trinity College, Cambridge, and subsequently received a qualification in computer engineering. Anderson worked in the avionics and banking industry before moving back to the University of Cambridge in 1992, to work on his doctorate under the supervision of Roger Needham[10] and start his career as an academic researcher.[2] He received his PhD in 1995.[10]

Research and career

Anderson on Malware (2010)

Anderson was appointed a lecturer at Cambridge in 1995.[4] In addition to teaching at the University of Cambridge, he also taught at the University of Edinburgh.[11]

Anderson's research interests[1][3][7] were in security, cryptology, dependability and technology policy.[1] In cryptography, he designed with Eli Biham the BEAR, LION and Tiger cryptographic primitives,[12][13] and co-wrote with Biham and Lars Knudsen the block cipher Serpent, one of the finalists in the Advanced Encryption Standard (AES) competition.[14] He also discovered weaknesses in the FISH cipher and designed the stream cipher Pike.[15]

Anderson always campaigned for computer security to be studied in a wider social context. Many of his writings emphasised the human, social, and political dimension of security. On online voting, for example, he wrote "When you move from voting in person to voting at home (whether by post, by phone or over the Internet) it vastly expands the scope for vote buying and coercion",[16] making the point that it's not just a question of whether the encryption can be cracked.

In 1998, Anderson founded the Foundation for Information Policy Research, a think tank and lobbying group on information-technology policy.[17]

Anderson was also a founder of the UK-Crypto mailing list and the economics of security research domain.[18]

Anderson was well-known among Cambridge academics as an outspoken defender of academic freedoms, intellectual property and other matters of university politics. He was engaged in the "Campaign for Cambridge Freedoms"[19] and had been an elected member of Cambridge University Council since 2002.[20] In January 2004, the student newspaper Varsity declared Anderson to be Cambridge University's "most powerful person".[21]

In 2002, he became an outspoken critic of trusted computing proposals, in particular Microsoft's Palladium operating system vision.[22]

Anderson's TCPA FAQ has been characterised by IBM TC researcher David R. Safford as "full of technical errors" and of "presenting speculation as fact."[23]

For years Anderson argued that by their nature large databases will never be free of abuse by breaches of security. He said that if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as Anderson's Rule.[24]

Anderson was the author of several editions of Security Engineering, which was initially published by Wiley in 2001.[5][11] He was the founder and editor of Computer and Communications Security Reviews.[2]

After the vast global surveillance disclosures leaked by Edward Snowden beginning in June 2013, Anderson suggested one way to begin stamping out the British state's unaccountable involvement in this NSA spying scandal was to entirely end the domestic secret services. Anderson: "Were I a legislator, I would simply abolish MI5". Anderson noted the only way this kind of systemic data collection was made possible was through the business models of private industry. The value of information-driven Web companies such as Facebook and Google is built around their ability to gather vast tracts of data. It was something the intelligence agencies would have struggled with alone.[25]

Anderson was a critic of smart meters, writing that there are various privacy and energy security concerns.[26]

Awards and honours

Anderson was elected a Fellow of the Royal Society (FRS) in 2009. His nomination reads:

Professor Ross Anderson, Personal Chair in Security Engineering, Computer Laboratory, University of Cambridge.

Ross Anderson was a pioneer and world leader in security engineering, and is distinguished for starting a number of new areas of research in hardware, software and systems.

He is leaning back from a table with two cups of coffee/tea on it, with an enormous wall of books piled haphazardly on shelves behind him. There is also a whiteboard shown with equations.
Ross Anderson in his office in Cambridge in 2018

His early work on how systems fail established a base of empirical evidence for building threat models for a wide range of applications from banking to healthcare.

Anderson made trailblazing contributions that helped establish a number of new research topics, including security usability, hardware tamper-resistance, information hiding, and the analysis of application programming interfaces.

Anderson was also one of the founders of the study of information security economics, which not only illuminates where the most effective attacks and defences may be found, but is also of fundamental importance to making policy for the information society.[27]

Anderson was also elected a Fellow of the Royal Academy of Engineering (FREng) in 2009.[28][29][4][2] He was a Fellow of Churchill College, Cambridge[30] and awarded the BCS Lovelace Medal in 2015.[11] Anderson was elected to the Royal Society of Edinburgh in 2023.[31]

Personal life and death

Anderson met his wife, Shireen, while he was working in Johannesburg and they were married in Cambridge in 1992. Shireen Anderson is the coordinator of the Christina Kelly Association, of Churchill College, Cambridge.[32] They have one daughter, Bavani, and four grandchildren.

Anderson died unexpectedly at home with his family in Cambridge on 28 March 2024, at the age of 67.[33][11]

Security Engineering

By agreement with the publisher [1], the third edition of Ross Anderson's book Security Engineering was made available for download at the Cambridge University archive in November 2024. [2]

References

  1. ^ a b c Ross J. Anderson publications indexed by Google Scholar Edit this at Wikidata
  2. ^ a b c d Curriculum Vitae – Ross Anderson, May 2007
  3. ^ a b c Ross J. Anderson at the Mathematics Genealogy Project
  4. ^ a b c d Anon (2014). "Anderson, Prof. Ross John". Who's Who (online edition via Oxford University Press ed.). A & C Black. doi:10.1093/ww/9780199540884.013.U70837. (Subscription or UK public library membership required.)
  5. ^ a b c Anderson, Ross (2008). Security engineering: a guide to building dependable distributed systems. New York: John Wiley. ISBN 978-0-470-06852-6.
  6. ^ The Blue Book – "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, August 2007 Archived 5 August 2012 at the Wayback Machine
  7. ^ a b Ross J. Anderson's publications indexed by the Scopus bibliographic database. (subscription required)
  8. ^ Ross J. Anderson author profile page at the ACM Digital Library
  9. ^ Anderson, R. J. (1999). "Information technology in medical practice: Safety and privacy lessons from the United Kingdom". The Medical Journal of Australia. 170 (4): 181–4. doi:10.5694/j.1326-5377.1999.tb127721.x. PMID 10078187. S2CID 16255335.
  10. ^ a b Anderson, Ross John (2014). Robust Computer Security. cam.ac.uk (PhD thesis). University of Cambridge. OCLC 53659223. EThOS uk.bl.ethos.338198.
  11. ^ a b c d "Ross Anderson, professor and famed author of 'Security Engineering,' passes away". The Record. 29 March 2024. Retrieved 29 March 2024.
  12. ^ Ross Anderson and Eli Biham. "Two Practical and Provably Secure Block Ciphers: BEAR and LION" (PDF).
  13. ^ Anderson, Ross; Biham, Eli (1996). "Tiger: A Fast New Hash Function". In Gollmann, Dieter (ed.). Fast Software Encryption. Cambridge: Springer-Verlag Berlin Heidelberg. pp. 89–97. doi:10.1007/3-540-60865-6_46. ISBN 978-3-540-60865-3.
  14. ^ "Serpent: A Candidate Block Cipher for the Advanced Encryption Standard".
  15. ^ Anderson, Ross J. (1995), "On Fibonacci keystream generators", Fast Software Encryption, Lecture Notes in Computer Science, vol. 1008, Springer-Verlag, pp. 346–352, doi:10.1007/3-540-60590-8_26, ISBN 978-3-540-60590-4
  16. ^ Nicole Kobie (30 March 2015). "Why electronic voting isn't secure – but may be safe enough".
  17. ^ Beresford, Alastair (3 April 2024). "Ross Anderson, 1956–2024". Department of Computer Science and Technology. cam.ac.uk. University of Cambridge.
  18. ^ Ross Anderson: Why information security is hard – an economic perspective Archived 11 October 2006 at the Wayback Machine, ACSAC 2001.
  19. ^ Campaign for Cambridge Freedoms
  20. ^ Election to the Council: Notices 2 December 2002 and 7 November 2006, Cambridge University Reporter
  21. ^ Cambridge Power 100, Varsity, Issue 591, 16 January 2004
  22. ^ Ross Anderson: 'Trusted Computing' Frequently Asked Questions, August 2003
  23. ^ http://domino.research.ibm.com/comm/research_projects.nsf/pages/gsal.TCG.html/$FILE/tcpa_rebuttal.pdf[permanent dead link]
  24. ^ Porter, Henry (2009). "Nine sacked for breaching core ID card database". theguardian.com. London: The Guardian. Anderson's Rule means you cannot construct a database with scale, functionality and security because if you design a large system for ease of access it becomes insecure, while if you make it watertight it becomes impossible to use
  25. ^ Cambridge's Head of Cryptography: I Would Abolish MI5, Forbes, 3 January 2013
  26. ^ The Foundation for Information Policy Research Consultation response on Smart Meters Archived 13 March 2016 at the Wayback Machine
  27. ^ "EC/2009/02: Anderson, Ross". London: The Royal Society. Archived from the original on 7 July 2019.
  28. ^ "The Royal Academy of Engineering Annual Report 2009/2010".
  29. ^ "List of Fellows".
  30. ^ "Professor Ross Anderson FRS, FREng". Churchill College, Cambridge. Retrieved 14 May 2021.[permanent dead link]
  31. ^ https://rse.org.uk/fellowship/professor-ross-anderson/
  32. ^ "Professor Ross Anderson". Churchill College, Cambridge. Archived from the original on 8 May 2024. Retrieved 16 April 2024.
  33. ^ Beresford, Alastair (2024). "Ross Anderson, 1956 - 2024".