Sean Peisert

Home Page

Publications

Research Projects

Software

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

Bio

Links


Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).


Upcoming events that I'm involved with:

S&P 2017 (May 22–24, 2017)

CSET 2017 (Aug. 2017)

NSPW 2017 (Sept. 2017)

 
 

Publications

Jump to: Refereed Papers   Invited Papers   Dissertation   Tech Reports   Edited

Also see my papers at DBLP, Google Scholar, and Microsoft Academic Search.

Refereed Papers

"Automated Anomaly Detection in Distribution Grids Using µPMU Measurements"
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern,
Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS), Electric Energy Systems Track, Resilient Networks Minitrack, Jan. 2017. [BibTeX] [CDL]

"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security"
Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern,
IEEE Internet Computing, 20(5), pp. 18–27, Sept./Oct. 2016. [BibTeX] [DOI] [CDL]

"The Medical Science DMZ"
Sean Peisert, William Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney,
Journal of the American Medical Informatics Association (JAMIA), 23(6), Nov. 1, 2016. [BibTeX] [DOI] [CDL]

"A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid"
Georgia Koutsandria, Reinhard Gentz, Mahdi Jamei, Anna Scaglione, Sean Peisert, and Chuck McParland,
Proceedings of the First ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), pp. 67–78, Denver, CO, October 16, 2015. [BibTeX] [DOI] [CDL]

"Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe Systems"
Sisi Duan, Jingtao Sun, and Sean Peisert,
Proceedings of the 8th International Conference on Internet and Distributed Computing Systems (IDCS), pp. 157–168, Windsor, Berkshire, United Kingdom, September 2–4, 2015. [BibTeX] [LNCS Book] [LNCS Chapter] [CDL]

"hBFT: Speculative Byzantine Fault Tolerance With Minimum Cost"
Sisi Duan, Sean Peisert, and Karl Levitt,
IEEE Transactions on Dependable and Secure Computing (TDSC), 12(1), pp. 58–70, Jan./Feb. 2015. (published online March 19, 2014) [BibTeX] [DOI] [CDL]

"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration"
Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang,
Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, Cortina, Italy, December 15–19, 2014. [BibTeX] [DOI] [LNCS Book] [LNCS Chapter] [CDL]

"Monitoring Security of Networked Control Systems: It's the Physics"
Chuck McParland, Sean Peisert, and Anna Scaglione,
IEEE Security and Privacy,12(6), pp. 32–39, November/December 2014. [BibTeX] [DOI] [CDL]

"A Hybrid Network IDS for Protective Digital Relays in the Power Transmission Grid"
Georgia Koutsandria, Vishak Muthukumar, Masood Parvania, Sean Peisert, Chuck McParland, and Anna Scaglione,
Proceedings of the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 908–913, Venice, Italy, November 3–6, 2014. [BibTeX] [DOI] [CDL]

"Byzantine Fault Tolerance from Intrusion Detection"
Sisi Duan, Karl Levitt, Hein Meling, Sean Peisert, and Haibin Zhang,
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems (SRDS), pp. 253–264, Nara, Japan, October 6–9, 2014. [BibTeX] [DOI] [CDL] (Best Paper Candidate Award)

"Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems"
Masood Parvania, Georgia Koutsandria, Vishak Muthukumar, Sean Peisert, Chuck McParland, and Anna Scaglione,
Proceedings of the 1st International Workshop on Trustworthiness of Smart Grids (ToSG), pp. 774–779, Atlanta, GA, June 23, 2014. [BibTeX] [DOI] [CDL]

"P2S: A Fault-Tolerant Publish/Subscribe Infrastructure"
Tiancheng Chang, Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang
Proceedings of the 8th ACM International Conference on Distributed Event Based Systems (DEBS), pp. 189–197, Mumbai, India, May 26–29, 2014. [BibTeX] [DOI] [CDL]

"Insider Detection by Process Analysis"
Matt Bishop, Heather Conboy, Huong Phan, Borislava I. Simidchieva, George Avrunin, Lori Clarke, Lee Osterweil, and Sean Peisert,
Proceedings of the 2014 Workshop on Research for Insider Threat (WRIT), IEEE Computer Society Security and Privacy Workshops, San Jose, CA, May 18, 2014. [BibTeX] [DOI] [Authoritative] [CDL]

"Principles of Authentication"
Sean Peisert, Ed Talbot, and Tom Kroeger,
Proceedings of the 2013 New Security Paradigms Workshop (NSPW), pp. 47–56, Banff, Canada, September 9–12, 2013. [BibTeX] [DOI] [OA] [CDL]

"Multiclass Classification of Distributed Memory Parallel Computations"
Sean Whalen, Sean Peisert, and Matt Bishop,
Pattern Recognition Letters (PRL), 34(3), pp. 322–329, February 2013. [BibTeX] [DOI] [CDL]

"Networked Loads in the Distribution Grid"
Xiao Li, Zhifang Wang, Vishak Muthukumar, Anna Scaglione, Sean Peisert, and Chuck McParland,
Proceedings of the 2012 Asia-Pacific Signal & Information Processing Association (APSIPA) Annual Summit and Conference, Hollywood, CA, December 3–6, 2012. [DOI] [BibTeX] [CDL]

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems"
Sean Peisert, Ed Talbot, and Matt Bishop,
Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, Bertinoro, Italy, September 19–21, 2012. [BibTeX] [DOI] [OA] [CDL]

"Network-Theoretic Classification of Parallel Computation Patterns" (expanded version of CACHES paper)
Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop,
International Journal of High Performance Computing Applications (IJHPCA), 26(2), pp. 159–169, May 2012. [BibTeX] [DOI] [CDL]

"Network-Theoretic Classification of Parallel Computation Patterns"
Sean Whalen, Sean Peisert, and Matt Bishop,
Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES), Tucson, AZ, June 4, 2011. [BibTeX]

"Relationships and Data Sanitization: A Study in Scarlet"
Matt Bishop, Justin Cummins, Sean Peisert, Bhume Bhumitarana, Anhad Singh, Deborah Agarwal, Deborah Frincke, and Michael Hogarth,
Proceedings of the 2010 New Security Paradigms Workshop (NSPW), pp. 151–164, Concord, MA, September 21–23, 2010. [BibTeX] [DOI] [OA] [CDL]

"A Risk Management Approach to the 'Insider Threat'"
Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, and Sean Whalen,
Insider Threats in Cyber Security, "Advances in Information Security" Series, pp. 115–138, Springer, Berlin, September 2010. [BibTeX] [DOI] [CDL]

"Modeling Faults to Improve Election Process Robustness"
Borislava I. Simidchieva, Sophie J. Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, and Leon J. Osterweil,
Proceedings of the 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE), Washinton, D.C., August 11–13, 2010. [BibTeX] [Authoritative] [CDL]

"Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms"
Sean Peisert, Matt Bishop, Laura Corriss, and Steven J. Greenwald,
Proceedings of the 2009 New Security Paradigms Workshop (NSPW), pp. 133–144, The Queen's College, Oxford, United Kingdom, September 8–11, 2009. [BibTeX] [DOI] [OA] [CDL]

"E-Voting and Forensics: Prying Open the Black Box"
Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson,
Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE), Montreal, Canada, August 10–11, 2009. [BibTeX] [Authoritative] [CDL]

"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines"
Sean Peisert, Matt Bishop, and Alec Yasinsac,
Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Decision Technologies and Service Sciences Track, Digital Forensics Pedagogy and Foundational Research Activity Minitrack, Waikoloa, HI, January 5–8, 2009. (Nominated for Best Paper Award) [BibTeX] [DOI] [CDL]

"Case Studies of an Insider Framework"
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Cyber Security and Information Intelligence Research Minitrack, Waikoloa, HI, January 5–8, 2009. [BibTeX] [DOI] [CDL]

"We Have Met the Enemy and He is Us"
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
Proceedings of the 2008 New Security Paradigms Workshop (NSPW), pp. 1–11, Lake Tahoe, CA, September 22–25, 2008. [BibTeX] [DOI] [OA] [CDL]

"Computer Forensics In Forensis"
Sean Peisert, Matt Bishop, and Keith Marzullo,
ACM Operating Systems Review (OSR), Special Issue on Computer Forensics, 42(3), pp. 112–122, April 2008. [BibTeX] [DOI] [CDL]

"Analysis of Computer Intrusions Using Sequences of Function Calls"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007. [BibTeX] [DOI] [CDL]

"How to Design Computer Security Experiments"
Sean Peisert and Matt Bishop,
Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, West Point, NY, June 2007. [BibTeX] [DOI] [CDL]

"Toward Models for Forensic Analysis"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, Seattle, WA, April 2007. [BibTeX] [DOI] [CDL]

"Principles-Driven Forensic Analysis"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pp. 85–93, Lake Arrowhead, CA, September 2005. [BibTeX] [DOI] [OA] [CDL]

Invited Papers and Columns

"Techniques for the Dynamic Randomization of Network Attributes"
Adrian Chavez, William M.S. Stout, and Sean Peisert,
Proceedings of the 49th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, Republic of China, September 21–24, 2015. [BibTeX] [DOI] [CDL]

"Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]"
Sean Peisert and Jonathan Margulies,
IEEE Security and Privacy,12(6), pp. 13–14, Nov./Dec. 2014. [IEEE Xplore DL] [CDL]

"Control System Security from the Front Lines (Roundtable)"
Sean Peisert, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, and Zach Tudor,
IEEE Security and Privacy,12(6), pp. 55–58, Nov./Dec. 2014. [DOI] [CDL]
Peisert and Margulies were the interviewers for the roundtable. Byres, Dorey, Peterson, and Tudor were the roundtable interviewees.

"Designed-in Security for Cyber-Physical Systems (Roundtable)"
Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, and Chris Sawall,
IEEE Security and Privacy,12(5), pp. 9–12, Sept./Oct. 2014. [DOI] [CDL]
Peisert and Margulies were the interviewers for the roundtable. Nicol, Khurana, and Sawall were the roundtable interviewees.

"The IEEE Symposium on Security and Privacy, in Retrospect"
Peter G. Neumann, Sean Peisert, and Marvin Schaefer,
IEEE Security and Privacy,12(3), pp. 15–17, May/June 2014. [BibTeX] [DOI] [CDL]

"Security and Elections"
Matt Bishop and Sean Peisert
IEEE Security and Privacy,10(5), pp. 64–67, Sept.-Oct. 2012. [BibTeX] [DOI] [CDL]

"4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Conference Report Summary"
Sean Peisert,
USENIX ;login:, 36(6), pp. 97–98, December 2011.

"The Hive Mind Project -- Digital Ants for Intrusion Detection"
Sean Peisert,
DETERlab Testbed Quarterly Newsletter, Summer, 2011.

"Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy"
Peter G. Neumann, Matt Bishop, Sean Peisert, and Marv Schaefer,
Proceedings of the 31st IEEE Symposium on Security and Privacy, pp. 3–13, Oakland/Berkeley, CA, May 16–19, 2010. [BibTeX] [DOI] [CDL]

"Computer Forensics In Forensis" (invited paper; expanded version of ACM OSR 42(3) paper)
Sean Peisert, Matt Bishop, and Keith Marzullo,
Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, Oakland/Berkeley, CA, May 22, 2008. [BibTeX] [DOI] [CDL]

"I'm a Scientist, Not a Philosopher!"
Sean Peisert and Matt Bishop,
IEEE Security and Privacy,5(4), pp. 48–51, July-August 2007. [BibTeX] [DOI] [CDL]

"Forensics for System Administrators"
Sean Peisert,
USENIX ;login:, 30(4), pp. 34–42, August 2005. [BibTeX] [Authoritative] [CDL]

Doctoral Dissertation

A Model of Forensic Analysis Using Goal-Oriented Logging
Sean P. Peisert,
Ph.D. Dissertation, Dept. of Computer Science and Engineering, University of California, San Diego, March 2007. [BibTeX] [UMI] [CDL]

Committee members: Professor Emeritus Sidney Karin (chair), Professor Matt Bishop, Professor Emeritus Larry Carter, Professor Keith Marzullo, Professor Stefan Savage, and Professor Roger Bohn.


Tech Reports and Other Writings

"Security Analysis of Scantegrity, an Electronic Voting System"
Jonathan Ganz, Matt Bishop, and Sean Peisert
UC Davis CS Technical Report,
June, 2016. [CDL]

"Distributed Helios - Mitigating Denial of Service Attacks in Online Voting"
Daniel Chung, Matt Bishop, and Sean Peisert
UC Davis CS Technical Report,
March, 2016. [CDL]

"ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas"
Sean Peisert, et al.
U.S. Department of Energy Office of Science report, LBNL Technical Report number LBNL-191105,
September, 2015. [BibTeX] [DOI]

"ASCR Cybersecurity for Scientific Computing Integrity"
Sean Peisert, et al.
U.S. Department of Energy Office of Science report, LBNL Technical Report number LBNL-6953E,
February, 2015. [BibTeX] [DOI]

"The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report"
Sean Peisert and Steven Templeton
UC Davis CS Technical Report,
Sept. 4, 2013. [BibTeX] [CDL]

"Dynamic, Flexible, and Optimistic Access Control"
Sean Peisert and Matt Bishop
UC Davis CS Technical Report CSE-2013-76,
July 2013. [BibTeX] [CDL]

"Fingerprinting Communication and Computation on HPC Machines"
Sean Peisert,
Lawrence Berkeley National Laboratory Technical Report LBNL-3483E,
June 2010. [BibTeX] [Authoritative/CDL]

"What Do Firewalls Protect? An Empirical Study of Firewalls, Vulnerabilities, and Attacks"
Sean Peisert, Matt Bishop, and Keith Marzullo,
UC Davis CS Technical Report CSE-2010-8,
March 2010. [BibTeX] [CDL]

"Resolving the Unexpected in Elections: Election Officials' Options"
Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert
October 8, 2008. [BibTeX] [CDL]
Distributed by the Center For Election Excellence and the American Bar Association.

"Your Security Policy is What???"
Matt Bishop and Sean Peisert,
UC Davis CS Technical Report CSE-2006-20, March 2006. [BibTeX] [CDL]

"World Infrastructure Security Environment (WISE): Conceptual Overview, Feasibility, and Research"
Sean Peisert and Sid Karin,
Technical Report, July 2003.

"A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors"
Sean P. Peisert and Scott B. Baden,
UCSD CSE Technical Report, February 2001. [Authoritative]
A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors
Sean P. Peisert,
Masters Thesis, Dept. of Computer Science and Engineering, University of California, San Diego, March 2000. [BibTeX]

Edited Volumes

"Organizational Processes for Supporting Sustainable Security"
Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, and Christian Probst, editors
Report from Dagstuhl Seminar 120501, December 9–12, 2012, Dagstuhl Reports, Volume 2, Issue 12, pp. 37–48, November 4, 2013. [BibTeX] [DOI]

Proceedings of the 2011 New Security Paradigms Workshop
Sean Peisert, Richard Ford, Carrie Gates, and Cormac Herley, editors, Marin County, CA, Sept. 12–15, 2011. Copyright 2011, Association for Computing Machinery. ISBN 978-1-4503-1078-9
Front Matter and Letters from Chairs

The definitive versions of the papers posted on this page were first published in the venues indicated. In accordance with publisher copyright policies, these papers are pre-prints or post-prints, and are not the pubilsher's version.

Personal use of the material posted on this page is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the original publishers.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


"I believe that this nation should commit itself to achieving the goal, before this decade is out, of landing a man on the moon and returning him safely to the earth. ... We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too."
 
-President John F. Kennedy, Message to Congress on Urgent National Needs, May 25, 1961


Last modified: Thursday, 01-Dec-2016 11:37:26 PST