I am an Assistant Professor of Computer Science and Engineering at SMU. My research focuses on the economics of information security, the study of electronic crime, and the development of policy for strengthening security. I'm also interested in digital currencies, critical infrastructure protection and digital forensics. I direct the Security Economics Lab within HACNet (High Assurance Computing and Networking Labs), a research group of faculty and students working in different areas related to security. I also serve as Director of the Economics and Social Sciences program at the Darwin Deason Institute for Cyber Security. Finally, I am a Fellow in SMU's John Goodwin Tower Center for Political Studies.

Prior to joining SMU, I was a postdoctoral fellow at the Center for Research on Computation and Society (CRCS) at Harvard University. I have also been the Norma Wilentz Hess Visiting Professor of Computer Science at Wellesley College. I completed my PhD at the University of Cambridge, supervised by Prof. Ross Anderson.

From 2011-2014 I served as a Director and Vice President of the International Financial Cryptography Assocation (IFCA), which organizes the annual Financial Crypto conference. I am also Vice Chair of the IFIP 11.10 Working Group on Critical Infrastructure Protection. For a comprehensive listing of my professional activities, please see my CV.

I am always interested in supervising talented PhD students, so if you are interested in research related to the economics of information security, please contact me. I am also interested in working with outstanding undergraduates on research projects. For information on my current students and their research interests, visit the teaching page.

Together with Prof. David Pym, I am Editor in Chief of the Journal of Cybersecurity (JCS). JCS is a new open-access publication from Oxford University Press, developed specifically to deliver a venue that bridges the many different disciplines and specialties involving information security.

Use the menu above to find out more about my research and teaching. On this page you will find the following:

Selected Publications

Here are a few selected publications. For a comprehensive list, see the publications page. You can also view my pages on Google Scholar and DBLP.

- Ross Anderson and Tyler Moore. The economics of information security. Science, 314(5799):610-613, 2006. [ bib | DOI | paper | publisher ]
- Tyler Moore, Richard Clayton, and Ross Anderson. The economics of online crime. Journal of Economic Perspectives, 23(3):3-20, Summer 2009. [ bib | paper | publisher | Italian translation ]
- Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. A nearly four-year longitudinal study of search-engine poisoning. In Proceedings of the 2014 ACM Conference on Computer and Communications Security, CCS '14, pages 930-941, New York, NY, USA, 2014. ACM. [ bib | DOI | paper | publisher ]
- Marie Vasek and Tyler Moore. Identifying risk factors for webserver compromise. In Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 326-345. Springer, March 2014. [ bib | data | paper | publisher ]
- Tyler Moore, Nektarios Leontiadis, and Nicolas Christin. Fashion crimes: trending-term exploitation on the web. In Yan Chen, George Danezis, and Vitaly Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 455-466. ACM, 2011. [ bib | paper | publisher | presentation | blog post ]
- Tyler Moore and Benjamin Edelman. Measuring the perpetrators and funders of typosquatting. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 175-191. Springer, 2010. [ bib | paper | publisher | presentation | web appendix | press: New Scientist, The Register, ZDNet]
- Tyler Moore and Richard Clayton. Examining the impact of website take-down on phishing. In Lorrie Faith Cranor, editor, APWG eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, pages 1-13. ACM, 2007. [ bib | paper | publisher | presentation | press: PC World, Infosecurity Magazine]
- Tyler Moore, Jolyon Clulow, Shishir Nagaraja, and Ross Anderson. New strategies for revocation in ad-hoc networks. In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, ESAS, volume 4572 of Lecture Notes in Computer Science, pages 232-246. Springer, 2007. [ bib | paper | publisher | presentation | press: New Scientist, Techworld ]

Curriculum Vitae

For a comprehensive listing of appointments, publications, presentations, funding, teaching experience, and academic service, please view my CV.

Contact Information

Tyler Moore
Computer Science and Engineering Department
Bobby Lyle School of Engineering
Southern Methodist University
P.O. Box 750122
Dallas, TX 75275-0122

Office: Caruth Hall 439

Phone: (214) 768-3716 (on campus: x83716)

Email: tylerm@smu.edu

My PGP key:
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.11 (GNU/Linux) mQENBFAPHBcBCADIC7IgfYTvhj5utmBMrqn63BXwTMe4raqMoQtcVoPFxhssld5N /loqAK4WPYzBxgz0pIEembEeaIngSYSz7rqHOz650BYXyivAfDZAXt24cZ74Bbfl 3mDplV7QUxmYcvtezyaIwctlypOG4OfxxFveFSiTO6Jrzqt9Sr7X9+0Fydw6Jxte diyJsUHg3tK0ZP1zLCjMzJinz/Wog0o7mlOSN2mjBrXm88o/Jyyu3puPJgUC9WL2 gErw4BZxVgF+Pm1Bvso6v7yP/LE5utR16aoW39v3dfonI2TXq5FTS5GSYI7dcnRm 3Xh+RpcbOFkKrnHO45YHRVB3CaYXCynP/FItABEBAAG0HFR5bGVyIE1vb3JlIDx0 eWxlcm1Ac211LmVkdT6JAT4EEwECACgFAlAPHBcCGyMFCQlmAYAGCwkIBwMCBhUI AgkKCwQWAgMBAh4BAheAAAoJEL2GgpK6hvGcUVgIAI9pmDLMWFkA41//4zufKa33 GOwuYSE3Y0Y2r4r2+LECdIFMCwwzR7clAxnosv6Cdki7xTXE12I+VW9csuxN9X9s 2VyGwQ0a8biajy+jcTyWJMCfkZifhDZS4YTF23eYbk61Q/EVSZYuKlnbhZz9s8Yd BUEvvdvv5kQzfhGUVUV32kkIpr91qDTkB2MvntdOfnDg+/9PghSGaPut+VjTLgvZ MYQbfohHZiZiVw0wqWIq+/TB1HSZvP44EtyiLHLdDyPe0mzQYIxiTKQz7JZeChkX 0QYrNIxBsi3h9BaN5GXgKP7sF4zjgAvSJP9J80eJf3WGlJP8ahw3MGd74QmxNOC5 AQ0EUA8cFwEIAMvre0uTlkxBYfnOIQYSwoKuVIiP31RgVGUIBi2P1l8KWkn/q2er G1lnyYqpjPUCPhcVgLdpHJ3nV/WmD6apdE7L+jW/YvpbAzloyl7ovGN2sgZ6VOPS QdLdedPbGWZFsMJ/15now3mJ2Pdpf1r7dsfRZiAygHbAuaZrv+k5346bQvMPt/cR AwerLUPLWyXlHfwKjLU4LFAGyasYcqx5TrR3lRV6kxZ2kq6e4mB74bNOAWa/f3Ic t7WyZ/q1AFGDDJE0yOVNJkmfqIusGf/E+eHIyZq+6dLZBmDk49ysReczpaob9vUV KKPz/4IpxvvJTijTl2SOfKGrsUClLwPYM10AEQEAAYkBJQQYAQIADwUCUA8cFwIb DAUJCWYBgAAKCRC9hoKSuobxnCMBB/94gbvP7Js98rUzGLQx6/Sh2D8wTtEB7qk1 5TKj7T7wOX4P+9geBYk+GNeJ29Layvz4cHgVARVlOnunPjnVe4gMG1vQhVKfPJu1 8Dub/wnrRAc62iNkxxh9xfWYEsdv7k6j74q8mL8B3YbzlEauwia39qEMal2ANmAK vJgY0SUIm1OreHxlPB4Bqu9DnYvuaDHTCiZS6uF+tJSFnK3PyRoJj4Q9AYOTVgFb y+TwDZ/Sa099WShYxR7ZaMWPCuiuugiDQBbmbpLSFfB4J2icP7CgrKT4fBIe7g2p 5H2pY4Hkguc15G93rga14O2evKwcnfvl7lQRaxBOI5DntDeZspWO =4IVV -----END PGP PUBLIC KEY BLOCK-----
Created 1 October 2004 - Last Updated 24 December 2014