Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).
Upcoming events that I'm involved with:
I lead applied research and development for computer security projects at the Berkeley Lab and UC Davis. I am also chief cybersecurity strategist for CENIC and director of the CENIC/ESnet Joint Cybersecurity Initiative.
These days, my current focus is research and development of security and privacy techniques that improve and enable the secure use of distributed, high-performance and cloud computing resources to conduct scientific research, and improve the secure functioning of power grid control systems.
In the past, I have worked on areas including intrusion detection, computer forensics, insider threats, vulnerability analysis, elections, and security metrics. I also teach and advise grad students. I occasionally do some consulting.
I am the chair of the IEEE Technical Committee on Security & Privacy. I was the General Chair of the 36th IEEE Symposium on Security and Privacy ("Oakland").
Press / What's new:
September 26, 2017: Berkeley Lab Aims to Strengthen the Cybersecurity of the Grid
September 20, 2017: Helping Scientists Understand Research Cyber Risks (UC IT Blog)
August 24, 2017: Open-Source Software Won't Ensure Election Security (Lawfare)
March 15, 2017: CENIC's Network Security Initiative
February 10, 2017: Mind the gap: Speaking like a cybersecurity pro
January 11, 2017: Building a CENIC Security Strategy
Recent Student News:
Security for High-Performance Computing / High-Throughput Networking
"Security in High-Performance Computing Environments," Sean Peisert, Communications of the ACM (CACM), 60(9) 72–80, September 2017.
"The Medical Science DMZ," Sean Peisert, William Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), 23(6), Nov. 1, 2016.
ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.
ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.
Control System / Power Grid Cybersecurity
"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.
"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing," Sean Peisert, Matt Bishop, and Ed Talbot, Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Islamorada, Florida, October 2–4, 2017.
"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration," Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang, Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, December 15–19, 2014.
"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.
"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.
"Analysis of Computer Intrusions Using Sequences of Function Calls," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007.
"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.
Phone: (530) 746-8717
Last modified: Wednesday, 28-Feb-2018 22:00:50 PST