He was the Chief Scientist of RSA (The Security Division of EMC), Director of RSA Laboratories, and a Distinguished Engineer at EMC, where he worked until 2013. He received his Ph.D. in computer science from U.C. Berkeley in 1996.
His recent areas of interest include cryptocurrency and smart contracts, applied cryptography, cloud security, user authentication, and privacy, among other things. He is Co-Director of the Initiative for CryptoCurrencies and Contracts (IC3).
In 2004, MIT’s Technology Review Magazine named Dr. Juels one of the world’s top 100 technology innovators under the age of 35. Computerworld honored him in its “40 Under 40” list of young industry leaders in 2007. He has received other distinctions, but sadly no recent ones acknowledging his youth.
My interests broadly span security, privacy, and cryptography. A few of the research areas my group is now exploring are:
- Blockchains, cryptocurrency, and smart contracts: For all its promise, Bitcoin represents just one use of blockchains and just one point in a large design space of financial instruments. How might we make blockchain systems more flexible and more relevant to ordinary users, regulators, and banks?
- Cloud security: How can cloud providers best provide security for their tenants? How can tenants best protect themselves from threats in the cloud?
- Honey objects: How can we create fake resources that deceive adversaries, and how can we use counterintelligence to defend real-world systems?
- Post-privacy systems: If privacy erodes to the point of indefensibility, how can we still ensure an equitable world by enforcing fair use of data and fair decision-making?
Students / Postdocs I’m currently working with
Kyle Croman (PhD candidate)
Ethan Cecchetti (PhD candidate, co-advised with Andrew Myers)
Phil Daian (PhD candidate)
Yan Ji (Undergraduate intern)
Fan Zhang (PhD candidate)
Ittay Eyal (Postdoc, co-mentored with Elaine Shi)
Prospective Ph.D. students
I have openings in my group and am happy to talk with prospective Ph.D. students. In general, Cornell / Cornell Tech is an exceptional place to do research in security, privacy, and crypto, as shown by our roster of faculty in the area and various statistics, such as Cornell’s #1 ranking in computer security here (although this is just one metric and not a good way to measure overall quality). Note that Cornell’s computer science program spans the Ithaca and NYC campuses; students reside in whichever location their advisor does.
In order to work with me or any other faculty member in the Cornell CS as a Ph.D. student, however, you must first be accepted by the Cornell CS program. Individual faculty members cannot admit students, and Cornell CS encourages students to explore working with different potential advisors. If you believe you may wish work with me, please list me as a contract in your application to the program.