Sean Peisert

Home Page

Publications

Research Projects

Software

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

News

Bio

Links


Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).


Upcoming events that I'm involved with:

S&P 2017 (May 22–24, 2017)

CSET 2017 (Aug. 2017)

NSPW 2017 (Sept. 2017)

 
 

Talks and Tutorials

Jump to: Invited Talks and Paper Presentations   Invited Tutorials

Invited Talks and Paper Presentations

"Cybersecurity: New Directions for Research and Education - Your own safety is at stake when your neighbor's wall is ablaze." (— Horace)
(panel moderator; with Greg Bell, Corelight; Anita Nikolich, NSF; and Von Welch, IU/CACR)
CENIC Annual Conference — The Right Connection ¦ CENIC 2.0
La Jolla, CA, March 22, 2017.

"Open Science Cyber Risk Profile (OSCRP)" (with Richard LeDuc, Karen Stocks, and Von Welch)
National Science Foundation Cybersecurity Center of Excellence (CCoE) Webinar Series
January 23, 2017.

"Overcoming Security and Privacy Challenges in Computing and Networking in Medical Research Environments"
Department of Public Health Sciences, University of California, Davis School of Medicine,
Davis, CA, December 14, 2016.

"Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-synchrophasor Measurements and Cyber-Reported SCADA"
2016 DOE CEDS Peer Review ,
Arlington, VA, December 8, 2016.

"National Cybersecurity Panel" (panel moderator; with Jill Gemmill, Clemson, Michael Sinatra, ESnet, and Von Welch, IU)
NSF Campus Cyberinfrastructure/ESCC/The Quilt Colocated Meeting,
Philadelphia, PA, Oct. 20, 2016

"HPC Monitoring" (panel; with Lee Beausoleil, NSA (moderator), David Lombard, Intel, and Angelos Keromytis, DARPA)
NSCI: High-Performance Computing Security Workshop,
National Institute of Standards and Technology (NIST),
Gaithersburg, MD, Sept. 30, 2016

"Security Expert on Why HPC Matters - Cybersecurity for HPC Systems: Challenges and Opportunities"
NSCI: High-Performance Computing Security Workshop,
National Institute of Standards and Technology (NIST),
Gaithersburg, MD, Sept. 29, 2016

"Computer Security & the Electric Power Grid"
Institute for Information Infrastructure Protection (I3P) Webinar,
June 17, 2016.

CENIC 2016 Conference Panel: "Security in R&E Networks and Campus Environments" (panel moderator; with Matt Bishop, UC Davis, Dewight Kramer, UC Davis, Paul Rivers, UC Berkeley, and Michael Sinatra, ESnet)
2016 CENIC Annual Conference,
Davis, CA, March 22, 2016.

"Computer Security & the Electric Power Grid"
15th Annual ON*VECTOR Photonics Workshop,
University of California, San Diego,
La Jolla, CA, March 1, 2016.

"Security Research Using Cyber-Physical Systems" (with Nick Anderson)
IT Security Symposium,
University of California, Davis,
Davis, CA, June 16, 2015.

"Models of Secure and Private Information Sharing"
University of California, San Diego School of Medicine,
Division of Biomedical Informatics Seminar Series,
La Jolla, CA, April 10, 2015.

"Security for Computational Infrastructure for Financial Technology" (panel speaker)
DataLead 2014: Leading the Way in Big Data, Haas School of Business,
University of California, Berkeley, Sept. 30, 2014.

"Principles of Authentication" (with Ed Talbot and Matt Bishop)
Who are you?! Adventures in Authentication: WAY Workshop, held in conjunction with the 2014 Symposium on Usable Privacy and Security (SOUPS) ,
Facebook Headquarters, Menlo Park, CA, July 9, 2014.

"Challenges in Insider Threat Research" (panel speaker)
Workshop on Research for Insider Threat (WRIT),
IEEE Security and Privacy Workshops (SPW),
San Jose, CA, May 18, 2014.

"Cyber Resilience Metrics" (with Marco Carvalho)
1st International Symposium on Resilient Cyber Systems,
Resilience Week 2013,
San Francisco, CA, Aug 13–15, 2013.

"Health Informatics Minute: Aligning Organizational and Employee Computer Security Goals for Health Informatics"
Seventh Annual Health Informatics Graduate Program Conference
University of California Davis School of Medicine, Sacramento, CA, March 22, 2013.

"Computer Security Issues in Precision Medicine"
UCSF+LBNL Workshop: Computational Challenges for Precision Medicine,
University of California, San Francisco, November 30, 2012.

Institute for Information Infrastructure Protection (I3P) 10th Anniversary Event ,
The National Press Club, Washington, D.C., Oct. 10, 2012.

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems" (Paper Presentation, with Ed Talbot)
2012 New Security Paradigms Workshop (NSPW),
Bertinoro, Italy, September 19–21, 2012.

Cyber Defenders Workshop on Legal, Policy, and Technical Realities for Cyber Space (Facilitator)
Lawrence Livermore National Laboratory, Livermore, CA, July 12, 2012.

Insiders, Forensics, IDS, BFT, Elections, Ants, Turtles, and the Smart Grid
Lawrence Livermore National Laboratory, Livermore, CA, July 12, 2012.

"An Overview of LBNL Cybersecurity Research Capabilities"
Oak Ridge National Laboratory, Oak Ridge, TN, March 28, 2012.

"Health Informatics, Mobile Devices, and the 'Insider' Threat"
Sixth Annual Health Informatics Graduate Program Conference
University of California Davis School of Medicine, Sacramento, CA, March 23, 2012.

"Security Experiments on GENI"
13th GENI Engineering Conference (GEC13) Los Angeles, CA, March 13, 2012.

"Computer Forensics and Cyber Crime" (Guest Lecture)
Introduction to Forensic Science course
University of California, Davis Dept. of Environmental Toxicology, Davis, CA, March 5, 2012.

"Modeling & Simulation: A Path Forward" (Invited Talk, with Ed Talbot)
Workshop on Future Modeling and Simulation (M & S) for Cyber-Security and Cyber-Physical Applications
Lawrence Livermore National Laboratory, Livermore, CA, March 2, 2012.

"Computer Forensics" (Guest Lecture)
Scientific Evidence course
University of California, Davis School of Law (King Hall), Davis, CA, February 10, 2012.

"Quis Custodiet Ipsos Custodes? Sustainable Defenses Against Insider Threats"
Special Lecture Series in Computer Science,
University of San Francisco, San Francisco, CA, January 25, 2012.

"Security in Health Informatics"
Health Informatics Program Seminar Series,
University of California Davis School of Medicine, Sacramento, CA, January 11, 2012.

"Security in Health Informatics" (Guest Lecture)
Introduction to Health Informatics course
University of California Davis School of Medicine, Sacramento, CA, November 21, 2011.

"Fingerprinting HPC Programs"
I3P Consortium Meeting
Berkeley, CA, June 22, 2011.

"Smart Grid Security" (panel moderator)
I3P Consortium Meeting
Berkeley, CA, June 22, 2011.

"Striking Back at the Privileged: Application-Based Monitoring for Deception, Policy, Specification, Forensics, and Automated Response"
Seminar on Insider Threats: Strategies for Prevention, Mitigation, and Response,
Schloss Dagstuhl, Germany, August 23–26, 2010. (Abstract in this PDF)

"Optimistic Access Control and Anticipatory Forensic Analysis of Insider Threats"
Seminar on Insider Threats: Strategies for Prevention, Mitigation, and Response,
Schloss Dagstuhl, Germany, August 23–26, 2010. (Extended Abstract; Short Abstract in this PDF)

"Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms" (Panel/Paper Presentation)
2009 New Security Paradigms Workshop (NSPW),
The Queen's College, Oxford, United Kingdom, September 8–11, 2009.

"E-Voting and Forensics: Prying Open the Black Box" (Paper Presentation)
2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE),
Montreal, Qu├ębec, Canada, August 10–11, 2009.

"Systematic Approaches to Forensic Analysis, the Insider Threat, Information Disclosure, and Auditing Elections"
PARC (Palo Alto Research Center, Inc.),
Palo Alto, CA, May 12, 2009.

"Systematic Approaches to Forensic Analysis, the Insider Threat, Information Disclosure, and Auditing Elections"
Computational Research Division,
Lawrence Berkeley National Laboratory,
Berkeley, CA, April 28, 2009.

"Systematic Approaches to Forensic Analysis, the Insider Threat, Information Disclosure, and Auditing Elections"
Computer Science Department,
Naval Postgraduate School, Monterey, CA, April 23, 2009.

"A Systematic Approach to Forensic Analysis"
SRI International, Menlo Park, CA, March 11, 2009.

"Systematic Approaches to Forensic Analysis, Information Disclosure, and Auditing Elections"
Google Tech Talk,
Google, Inc., Mountain View, CA, February 26, 2009.

"A Systematic Approach to Forensic Analysis"
Sandia National Laboratories, Livermore, CA, February 4, 2009.

"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines" (Paper Presentation)
Sean Peisert, Matt Bishop, and Alec Yasinsac,
42nd Hawaii International Conference on System Sciences (HICSS)
Waikoloa, HI, January 5–8, 2009.

"Computer Science in Society: Electronic Voting, Computer Forensics, Law, and Regulation"
3rd Annual Basic and Advanced Science and Technology Academies of Research Symposium,
Sacramento State University, Sacramento, CA, Septmeber 20, 2008.

"A Systematic Approach to Forensic Analysis"
Pacific Northwest National Labs, Richland, WA, Septmeber 12, 2008.

"Improving the State of the Research Art in Analytics with Science"
Pacific Northwest National Labs, Richland, WA, September 11, 2008.

"Security and Forensic Data and Analysis: Current and Future Challenges"
UW-PNNL Cyber Analytics Workshop,
Center for Information Assurance & Cybersecurity, University of Washington,
Seattle, WA, September 9, 2008.

"A Model of Computer Forensic Logging and Analysis"
Computer Science Department Seminar,
Naval Postgraduate School, Monterey, CA, August 28, 2008. (Abstract; Video)

"Making Attack Analysis as Simple as Possible But No Simpler"
Seminar on "Countering Insider Threats",
Schloss Dagstuhl, Germany, July 20–25, 2008.

"A Systematic Approach to Security & Forensics"
I3P Consortium Meeting
Seattle, WA, July 10, 2008.

Keynote Address: "Computer Forensics In Forensis"
Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008) (held in conjunction with the 2008 IEEE Symposium on Security and Privacy),
Oakland/Berkeley, CA, May 22, 2008.

"Toward Models for Forensic Analysis" (Paper Presentation)
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)
Seattle, WA, April 2007.

"Forensic Analysis Through Goal-Oriented Logging"
Computer Science Department Colloquium,
University of California, Davis, Davis, CA, November 9, 2006.

"Practical Computer Forensics"
Graduate Seminar on "Language-Based Security" ,
School of Information and Computer Sciences,
University of California, Irvine, Irvine, CA, February 22, 2006

"Principles-Driven Forensic Analysis" (Paper Presentation)
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
2005 New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, September 2005.

"Computer Forensics and the Insider Problem" (Paper Presentation)
San Diego Regional Internet Watch (SDRIW), San Diego, CA, October 19, 2004.

"Improving Forensic Analysis Through Transaction-Based Security"
Orincon Corporation, San Diego, CA, September 4, 2003.

"Entrepreneurial Opportunities in Security Software" (Panel Speaker)
San Diego Software Industry Council/CalNGI "Entrepreneur's Forum",
San Diego Supercomputer Center, San Diego, CA, July 10, 2003.

"Security: Myths, Reality, Effectiveness, and ROI" (Invited Talk, with Abe Singer)
San Diego Software Industry Council/CalNGI "Main Event", San Diego, CA, January 2003.

"A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors"
Lawrence Livermore National Laboratory CASC Division, Livermore, CA, June 2000.

Invited Tutorials

"Network Security: Myths, Reality, Tradeoffs and the Zen Art of Designing Secure Software and Networks" (Tutorial, with Abe Singer)
2003 NPACI All-Hands Meeting, San Diego, CA, March 2003.

"Performance Measuring on the IBM Blue Horizon and Sun HPC Systems" (Tutorial)
NPACI Parallel Computing Institute 2000, San Diego, CA August 2000.
Sample source demonstrating assembly output on the Power3 with the xlc compiler: [tar]
Example demonstrating getting cycles per second: [HTML]

"Performance Programming" (Two-Day Tutorial, with Larry Carter)
Lawrence Livermore National Laboratory CASC Division, Livermore, CA, May 2000.
Slides about Performance Tuning: [PDF]
Slides about Timing: [PDF]
Portions of these slides previously Copyright © 1998 by Alpern and Carter

"Then we learned about 'bullets' — little black circles in front of phrases that were supposed to summarize things.
There was one after another of these little goddamn bullets in our briefing books and on slides."
 
-Professor Richard P. Feynman, What Do You Care What Other People Think? (1988).


Last modified: Thursday, 26-Jan-2017 12:43:49 PST