Sean Peisert

Home Page

Publications

Research Projects

Software

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

News

Bio

Links


Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).


Upcoming events that I'm involved with:

S&P 2018 (May 20–24, 2018)

CSET 2018 (Aug. 13, 2018)

NSPW 2018 (Aug 28–31 2018)

S&P 2019 (May 19–23, 2019)

 
 
Image of Sean Peisert  
Staff Scientist,
Computational Research Division, Lawrence Berkeley National Laboratory

Associate Adjunct Professor,
Dept. of Computer Science, University of California, Davis

Associate Adjunct Professor,
Dept. of Public Health Sciences, University of California, Davis School of Medicine

Chief Cybersecurity Strategist,
Corporation for Education Network Initiatives in California (CENIC)


I lead applied research and development for computer security projects at the Berkeley Lab and UC Davis. I am also chief cybersecurity strategist for CENIC and director of the CENIC/ESnet Joint Cybersecurity Initiative.

These days, my current focus is research and development of security and privacy techniques that improve and enable the secure use of distributed, high-performance and cloud computing resources to conduct scientific research, and improve the secure functioning of power grid control systems.

In the past, I have worked on areas including intrusion detection, computer forensics, insider threats, vulnerability analysis, elections, and security metrics. I also teach and advise grad students. I occasionally do some consulting.

I am the chair of the IEEE Technical Committee on Security & Privacy. I was the General Chair of the 36th IEEE Symposium on Security and Privacy ("Oakland").

I received my Ph.D., Masters and Bachelors degrees in Computer Science from the University of California, San Diego (UCSD).

A longer bio is here and a slightly outdated one is in the Berkeley Lab Expert's Guide.

Press / What's new:

March 15, 2018: Lab Researchers Awarded Funds for Climate Science, Cybersecurity Research

March 7, 2018: Combination of Old and New Yields Novel Power Grid Cybersecurity Tool

January 30, 2018: Berkeley Lab Researchers Contribute to Making Blockchains Even More Robust

October 16, 2017: ESnet's Science DMZ Design Could Help Transfer, Protect Medical Research Data

September 26, 2017: Berkeley Lab Aims to Strengthen the Cybersecurity of the Grid

September 20, 2017: Helping Scientists Understand Research Cyber Risks (UC IT Blog)

August 24, 2017: Berkeley Lab's cybersecurity expert Sean Peisert discusses challenges & opportunities of securing HPC

HPC security article in Communications of the ACM

Video accompanying HPC security article on Vimeo

August 24, 2017: Open-Source Software Won't Ensure Election Security (Lawfare)

May 26, 2017: Cybersecurity: New Directions for Research and Education Networks

May 5, 2017: CENIC's Community Approach for Bringing Increased Security to Its Network and Constituent Institutions (p.7)

March 15, 2017: CENIC's Network Security Initiative

February 10, 2017: Mind the gap: Speaking like a cybersecurity pro

January 11, 2017: Building a CENIC Security Strategy

PAST NEWS

Recent Student News:

May 2017: Congratulations to Dr. Bogdan Copos on finishing his dissertation, and his new position as a research scientist at SRI International!

May 2017: Congratulations to Dr. Jonathan Ganz on finishing his dissertation, and his new position at Cloudflare!

April 2017: Congratulations to Dr. Sisi Duan on her new position as an Assistant Professor at University of Maryland, Baltimore County!

April 2017: Congratulations to Dr. Sophie Engle on her promotion to Associate Professor with Tenure at University of San Francisco!

PAST STUDENT NEWS

Selected Publications:

Security for High-Performance Computing / High-Throughput Networking

"The Medical Science DMZ: An Network Design Pattern for Data-Intensive Medical Science," Sean Peisert, Eli Dart, William K. Barnett, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), published 06 October 2017.

"Security in High-Performance Computing Environments," Sean Peisert, Communications of the ACM (CACM), 60(9) 72–80, September 2017.

"The Medical Science DMZ," Sean Peisert, William Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), 23(6), Nov. 1, 2016.

ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.

ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.

Control System / Power Grid Cybersecurity

"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.

"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.

Assured System Design

A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing," Sean Peisert, Matt Bishop, and Ed Talbot, Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2–4, 2017.

"Principles of Authentication," Sean Peisert, Ed Talbot, and Tom Kroeger, Proceedings of the 2013 New Security Paradigms Workshop (NSPW), pp. 47–56, September 9–12, 2013.

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.

Fault Tolerance

"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration," Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang, Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, December 15–19, 2014.

Security Experimentation / Science of Computer Security

"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.

Computer Forensics

"Computer Forensics In Forensis", Sean Peisert, Matt Bishop, and Keith Marzullo, Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, May 2008.

"Analysis of Computer Intrusions Using Sequences of Function Calls," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007.

"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.

"Principles-Driven Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pp. 85–93, September 2005.

FULL PUBLICATION LIST

Contact Info

Mail:
Dept. of Computer Science
University of California, Davis
One Shields Ave.
Davis, CA 95616-8562

Email: speisert@ucdavis.edu (PGP/GPG Key)

Phone: (530) 746-8717

Office Location: 2069 Academic Surge (directions)


Last modified: Monday, 09-Apr-2018 22:37:52 PDT