Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).
Upcoming events that I'm involved with:
I lead applied research and development in computer security at the Berkeley Lab and UC Davis. I am also chief cybersecurity strategist for CENIC, and Senior Fellow at the Berkeley Institute for Data Science (BIDS), chair of the IEEE Technical Committee on Security & Privacy, and associate editor-in-chief of IEEE Security & Privacy.
These days, my current focus is research and development of security and privacy techniques that improve and enable the secure use of distributed, high-performance and cloud computing resources to conduct scientific research, and improve the secure functioning of power grid control systems.
At CENIC, I am responsible for cybersecurity strategy and implementation for CENIC's enterprise as well as for the CalREN network backbone, and direct of the CENIC/ESnet Joint Cybersecurity Initiative
In the past, I have worked on areas including intrusion detection, computer forensics, insider threats, vulnerability analysis, elections, and security metrics. I also teach and advise grad students. I occasionally do some consulting.
I was the General Chair of the 36th IEEE Symposium on Security and Privacy ("Oakland").
Press / What's new:
March 23, 2018: Into the Medical Science DMZ (Science Node)
September 26, 2017: Berkeley Lab Aims to Strengthen the Cybersecurity of the Grid
September 20, 2017: Helping Scientists Understand Research Cyber Risks (UC IT Blog)
August 24, 2017: Open-Source Software Won't Ensure Election Security (Lawfare)
March 15, 2017: CENIC's Network Security Initiative
February 10, 2017: Mind the gap: Speaking like a cybersecurity pro
January 11, 2017: Building a CENIC Security Strategy
Recent Student News:
November 2017: Congratulations to Dr. Adrian Chavez on finishing his dissertation!
Security for High-Performance Computing / High-Throughput Networking
"Security in High-Performance Computing Environments," Sean Peisert, Communications of the ACM (CACM), 60(9) 72–80, September 2017.
"Open Science Cyber Risk Profile," Sean Peisert, Von Welch, Andrew Adams, Michael Dopheide, Susan Sons, RuthAnne Bevier, Rich LeDuc, Pascal Meunier, Stephen Schwab, and Karen Stocks, Ilkay Altintas, James Cuff, Reagan Moore, and Warren Raquel, February 2017.
"The Medical Science DMZ," Sean Peisert, William Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), 23(6), Nov. 1, 2016.
ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.
ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.
Control System / Power Grid Cybersecurity
"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.
"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.
Assured System Design
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing," Sean Peisert, Matt Bishop, and Ed Talbot, Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2–4, 2017.
"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.
"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration," Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang, Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, December 15–19, 2014.
Security Experimentation / Science of Computer Security
"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.
"Computer Forensics In Forensis", Sean Peisert, Matt Bishop, and Keith Marzullo, Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, May 2008.
"Analysis of Computer Intrusions Using Sequences of Function Calls," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007.
"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.
Phone: (530) 746-8717
Last modified: Thursday, 13-Sep-2018 10:46:57 PDT