Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).
Upcoming events that I'm involved with:
These days, my current focus is research and development to improve the secure functioning of power grid control systems and to to develop security techniques that improve and enable the use of distributed, high-performance and cloud computing resources to conduct scientific research.
In the past, I have worked on areas including intrusion detection, computer forensics, insider threats, vulnerability analysis, elections, and security metrics. I also teach and advise grad students. I occasionally do some consulting.
I was the General Chair of the 36th IEEE Symposium on Security and Privacy ("Oakland"). I am the vice chair of the IEEE Technical Committee on Security & Privacy.
Press / What's new:
March 15, 2017: CENIC's Network Security Initiative
February 10, 2017: Mind the gap: Speaking like a cybersecurity pro
January 11, 2017: Building a CENIC Security Strategy
September 8, 2016: On the Value of Failed Experiments in Cybersecurity
Recent Student News:
May 2017: Congratulations to Dr. Jonathan Ganz on finishing his dissertation!
Security for High-Performance Computing / High-Throughput Networking
"Challenges and Opportunities for Security in High-Performance Computing Environments," Sean Peisert, to appear in Communications of the ACM (CACM), 2017.
"The Medical Science DMZ," Sean Peisert, William Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), 23(6), Nov. 1, 2016.
ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.
ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.
"Multiclass Classification of Distributed Memory Parallel Computations," Sean Whalen, Sean Peisert, and Matt Bishop, Pattern Recognition Letters (PRL), 34(3), pp. 322–329, February 2013.
"Network-Theoretic Classification of Parallel Computation Patterns," Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop, International Journal of High Performance Computing Applications (IJHPCA), 26(2):159–169, May 2012.
Control System / Power Grid Cybersecurity
"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.
"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.
"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.
"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.
"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.
Phone: (530) 746-8717
Last modified: Saturday, 24-Jun-2017 09:07:07 PDT