Sean Peisert

ACM Distinguished Member

Home Page

Publications

Research Projects

Software

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

News

Bio

Links


Upcoming activities:

IEEE Security & Privacy (ongoing)

NSA SoS Best Paper Competition (annually, deadlines in April)

IEEE Cybersecurity Award for Practice (annually, deadlines in July)

IEEE S&P (Oakland) 2024 (May 20–23, 2024)

CSET 2024 (Aug. 2024)

NSPW 2024 Sept. 16–18, 2024)

NSF Cybersecurity Summit (Oct. 7–10 2024)

 
 

Publications

Jump to: Papers   Editorials and Introductions   Dissertation   Tech Reports   Federal RFI Responses   Edited

Also see my papers at DBLP, Google Scholar, SemanticScholar, arXiv, CSauthors, PubMed, and eScholarship.

 

“Privacy Leakage in Graph Signal to Graph Matching Problems,”
Hang Liu, Anna Scaglione, and Sean Peisert,
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Seoul, South Korea, April 14–19, 2024.

“Network-Constrained Reinforcement Learning for Optimal EV Charging Control,”
Tong Wu, Anna Scaglione, Adrian Petru Surani, Daniel Arnold, and Sean Peisert
Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Glasgow, Scotland, October 31–November 3, 2023.

"Data Privacy for the Grid: Toward a Data Privacy Standard for Inverter-Based and Distributed Energy Resources,"
Robert Currie, Sean Peisert, Anna Scaglione, Aram Shumavon, and Nikhil Ravi,
IEEE Power & Energy Magazine, 21(5), pp. 58–57, Sept.-Oct 2023. [DOI]

“Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets,”
Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, and Aram Shumavon,
Proceedings of the 2023 IEEE International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkey, July 25–27, 2023. [DOI]

“Differential Privacy for Class-based Data: A Practical Gaussian Mechanism,”
Raksha Ramakrishna, Anna Scaglione, Tong Wu, Nikhil Ravi, and Sean Peisert,
IEEE Transactions on Information Forensics and Security, 23 June 2023. [DOI | arXiv]

"Perspectives for Self-Driving Labs in Synthetic Biology"
Hector G. Martin, Tijana Radivojevic, Jeremy Zucker, Kristofer Bouchard, Jess Sustarich, Sean Peisert, Dan Arnold, Nathan Hillson, Gyorgy Babnigg, Jose M. Marti, Christopher J. Mungall, Gregg T. Beckham, Lucas Waldburger, James Carothers, ShivShankar Sundaram, Deb Agarwal, Blake A. Simmons, Tyler Backman, Deepanwita Banerjee, Deepti Tanjore, Lavanya Ramakrishnan, and Anup Singh
Current Opinion in Biotechnology, Vol. 79, 102881, February 2023. [bib | DOI]

"Differentially Private Map Matching for Mobility Trajectories"
Ammar Haydari, Chen-Nee Chuah, Michael Zhang, Jane Macfarlane, and Sean Peisert
Proceedings of the 2022 Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 5–9, 2022. [bib | DOI]

"SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems"
Ayaz Akram, Venkatesh Akella, Sean Peisert, and Jason Lowe-Power
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), Sept. 26– 27 2022. [bib | DOI]

"SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation"
Yize Chen, Yuanyuan Shi, Daniel Arnold, and Sean Peisert
Proceedings of the 2022 IEEE Power Engineering Society (PES) General Meeting, Denver, CO. July 17-21 2022. [bib | DOI | arXiv]
"Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation"
Daniel Arnold, Sy-Toan Ngo, Ciaran Roberts, Yize Chen, Anna Scaglione, and Sean Peisert,
Proceedings of the 2022 American Control Conference (ACC), June 8–10, 2022. [bib | DOI | arXiv]

"Differentially Private K-means Clustering Applied to Meter Data Analysis and Synthesis"
Nikhil Ravi, Anna Scaglione, Sachin Kadam, Reinhard Gentz, Sean Peisert, Brent Lunghino, Emmanuel Levijarvi, Aram Shumavon
IEEE Transactions on Smart Grid, accepted 4 Jun 2022. [bib | DOI | arXiv]

“Adaptive Control of Distributed Energy Resources for Distribution Grid Voltage Stability”
Daniel Arnold, Shammya Saha, Sy-Toan Ngo, Ciaran Roberts, Anna Scaglione, Nathan Johnson, Sean Peisert, and David Pinney,
IEEE Transactions on Power Systems, accepted 21 Feb, 2022. [bib | DOI]

"A Framework for Evaluating BFT"
James R. Clavin, Yue Huang, Xin Wang, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, and Sean Peisert,
Proceedings of the IEEE International Conference on Parallel and Distributed Systems (ICPADS), December 14–16, 2021. [bib | DOI]

"Enabling Design Space Exploration for RISC-V Secure Compute Environments"
Ayaz Akram, Venkatesh Akella, Sean Peisert, and Jason Lowe-Power,
Proceedings of the Fifth Workshop on Computer Architecture Research with RISC-V (CARRV), (co-located with ISCA 2021), June 17, 2021. [bib | Authoritative | CDL]

Trustworthy Scientific Computing"
Sean Peisert,
Communications of the ACM (CACM), 64(5):18–21, May 2021. [bib | DOI]

"Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks"
Ciaran Roberts, Sy-Toan Ngo, Alexandre Milesi, Anna Scaglione, Sean Peisert, and Daniel Arnold,
Proceedings of the 2021 American Control Conference (ACC), May 26–28, 2021. [bib | DOI]

"Performance Analysis of Scientific Computing Workloads on General Purpose TEEs"
Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, and Sean Peisert,
Proceedings of the 35th IEEE International Parallel & Distributed Processing Symposium (IPDPS), May 17–21, 2021. [bib | DOI | arXiv]

"Machine Learning for Metabolic Engineering: A Review"
Chris Lawson, Jose Manuel Martí, Tijana Radivojevic, Sai Vamshi R. Jonnalagadda, Reinhard Gentz, Nathan J. Hillson, Sean Peisert, Joonhoon Kim, Blake A. Simons, Christopher J. Petzold, Steven W. Singer, Aindrila Mukhopadhyay, Deepti Tanjore, Josh Dunn, and Héctor García Martín,
Metabolic Engineering, Vol. 63, pp. 34–60, January 2021. [bib | DOI]

"SoDa: An Irradiance-Based Synthetic Solar Data Generation Tool
Ignacio Losada Carreño, Raksha Ramakrishna, Anna Scaglione, Daniel Arnold, Ciaran Roberts, Sy-Toan Ngo, Sean Peisert, David Pinney,
Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), November 11–13, 2020. [bib | DOI | CDL]

"Deep Reinforcement Learning for DER Cyber-Attack Mitigation"
Ciaran Roberts Sy-Toan Ngo, Alexandre Milesi, Sean Peisert, Daniel Arnold, Shammya Saha, Anna Scaglione, Nathan Johnson, Anton Kocheturov, Dmitriy Fradkin,
Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), November 11–13, 2020. [bib | DOI | CDL]

"Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation"
Shammya Shananda Saha, Daniel Arnold, Anna Scaglione, Eran Schweitzer, Ciaran Roberts, Sean Peisert, and Nathan G. Johnson,
IET Renewable Power Generation, accepted 28 September 2020. [DOI | arXiv]

"Anomaly Detection for Science DMZs Using System Performance Data"
Ross Gegan, Christina Mao, Dipak Ghosal, Matt Bishop, and Sean Peisert,
Proceedings of the 2020 IEEE International Conference on Computing, Networking and Communications (ICNC 2020), Big Island, HI, February 17–20, 2020. [bib | DOI | CDL]

"A Machine Learning Approach for Packet Loss Prediction in Science Flows"
Anna Giannakou, Dipankar Dwivedi, and Sean Peisert,
Future Generation Computer Systems, vol. 102, pp. 190–197, January 2020. [bib | DOI | CDL]

"An Automated Disruption-Tolerant Key Management Framework for Critical Systems"
Thomas W. Edgar, Aditya Ashok, Garret E. Seppala, K.M. Arthur-Durrett, M. Engels, Reinhard Gentz, and Sean Peisert,
Journal of Information Warfare, 18(4), pp. 85–124, Winter, 2019. [bib | DOI | CDL]

"Blockchain as a Trusted Component in Cloud SLA Verification"
Amir Teshome Wonjiga, Louis Rilling, Christine Morin, and Sean Peisert,
Proceedings of the International Workshop on Cloud, IoT and Fog Security (CIFS), co-located with the 12th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), pp. 93–100, Auckland, New Zealand, December 2–5, 2019. [bib | DOI | CDL]

"Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization"
Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran Roberts, Anna Scaglione, and Sean Peisert
IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Communications and Data Analytics in Smart Grid, 38(1), pp. 180–192, November 6, 2019. [bib | DOI | CDL]

"Detecting Programmable Logic Controller Code Using Machine Learning"
Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, and Sean Peisert,
International Journal of Critical Infrastructure Protection, vol. 26, 100306, September 2019. (accepted July 3, 2019) [bib | DOI | CDL]

"SPARCS: Stream-Processing Architecture applied in Real-time Cyber-physical Security"
Reinhard Gentz, Sean Peisert, Joshua Boverhof, and Daniel Gunter,
Proceedings of the 15th IEEE International Conference on e-Science (eScience), San Diego, CA, September 2019. [bib | DOI | CDL]

"Workflow Automation in Liquid Chromatography Mass Spectrometry"
Reinhard Gentz, Héctor García Martin, Edward Baidoo, and Sean Peisert,
Proceedings of the 15th IEEE International Conference on e-Science (eScience), San Diego, CA, September 2019. [bib | DOI | CDL]

"Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security"
Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, Alex McEachern, and Daniel Arnold
IEEE Transactions on Smart Grid, 11(1), pp. 749–761, 19 August, 2019. [bib | DOI | CDL]

"Trusted CI Experiences in Cybersecurity and Service to Open Science,"
Andrew Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage,
Proceedings of the Conference on Practice and Experience in Advanced Research Computing (PEARC), July 28-August 1, 2019. ACM. [bib | DOI | CDL]

"Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks"
Anna Giannakou, Daniel Gunter, and Sean Peisert,
Proceedings of the IEEE/ACM Innovate the Network for Data-Intensive Science (INDIS) Workshop, Dallas, TX, November 11, 2018. [bib | DOI | CDL]

"Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection"
Mahdi Jamei, Anna Scaglione, and Sean Peisert,
Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Allborg, Denmark, October 29–31, 2018. [bib | DOI | CDL]

"A Holistic Approach to Distribution Grid Intrusion Detection Systems"
Ciaran Roberts, Anna Scaglione and Sean Peisert,
EnergyCentral, July 18, 2018. [bib]

"The Medical Science DMZ: An Network Design Pattern for Data-Intensive Medical Science"
Sean Peisert, Eli Dart, William K. Barnett, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney
Journal of the American Medical Informatics Association (JAMIA), 25(3), pp. 267–274, March 2018. [bib | DOI | CDL]

"Anomaly Detection Using μPMU Measurements in Distribution Grids"
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern
IEEE Transactions on Power Systems, 33(4), pp. 3611–3623, October 25, 2017. [bib | DOI | CDL]

"Integrated Multi-Scale Data Analytics and Machine Learning for the Distribution Grid"
Emma M. Stewart, Philip Top, Michael Chertkov, Deepjoy Deka, Scott Backhaus, Anthony Florita, Ciaran Roberts, Val Hendrix, Sean Peisert, Thomas J. King Jr., and Matthew Reno,
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, Oct. 23–27, 2017. [DOI | CDL]

"A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing"
Sean Peisert, Matt Bishop, and Ed Talbot,
Proceedings of the 2017 New Security Paradigms Workshop (NSPW), pp. 80–89, Santa Cruz, CA, October 2–4, 2017. [bib | DOI | CDL]

"The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity"
Sean Peisert and Von Welch,
IEEE Security & Privacy, 15(5), pp. 94–95, Sept./Oct. 2017. [bib | DOI | CDL]

"Security in High-Performance Computing Environments"
Sean Peisert
Communications of the ACM (CACM), 60(9), pp. 72–80, September 2017. [bib | DOI | Video | CDL]

"ASLR: How Robust is the Randomness"
Jonathan Ganz and Sean Peisert
Proceedings of the IEEE Secure Development Conference (SecDev), Cambridge, MA, September 24–26, 2017. [bib | DOI | CDL]

"Online Thevenin Parameter Tracking Using Synchrophasor Data"
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Alex McEachern, Emma Stewart, Sean Peisert, and Chuck McParland
Proceedings of the 2017 IEEE Power Engineering Society (PES) General Meeting (GM), Chicago, IL, July 16–20, 2017. [bib | DOI | CDL]

"Big Data and Analysis of Data Transfers for International Research Networks Using NetSage"
Alberto Gonzalez, Jason Leigh, Sean Peisert, Brian Tierney, Edward Balas, Predrag Radulovic, and Jennifer M. Schopf
Proceedings of IEEE BigData Congress 2017, Honolulu, Hawaii, June 25–30, 2017. [bib | DOI | CDL]

"A Comprehensive Framework for Using Iterative Analysis to Improve Human-Intensive Process Security: An Election Example"
Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, and Sean Peisert
ACM Transactions on Privacy and Security (TOPS), 20(2), March 2017. [bib | DOI | ACM/OA | CDL]

"Automated Anomaly Detection in Distribution Grids Using µPMU Measurements"
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern,
Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS), Electric Energy Systems Track, Resilient Networks Minitrack, Jan. 2017. [bib | DOI | CDL]

"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security"
Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern,
IEEE Internet Computing, 20(5), pp. 18–27, Sept./Oct. 2016. [bib | DOI | CDL]

"The Medical Science DMZ" (Brief Communication)
Sean Peisert, William Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney,
Journal of the American Medical Informatics Association (JAMIA), 23(6), Nov. 1, 2016. [bib | DOI | CDL]

"A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid"
Georgia Koutsandria, Reinhard Gentz, Mahdi Jamei, Anna Scaglione, Sean Peisert, and Chuck McParland,
Proceedings of the First ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), pp. 67–78, Denver, CO, October 16, 2015. [bib | DOI | CDL]

"NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service"
Alberto Gonzalez, Jason Leigh, Sean Peisert, Brian Tierney, Andrew Lee, and Jennifer M. Schopf
Proceedings of TNC16 Networking Conference, Prague, Czech Republic, June 12–16, 2016. [bib | CDL]

"Automated Mechanical Ventilator Waveform Analysis of Patient-Ventilator Asynchrony"
Jason Adams, Monica Lieng, Brooks Kuhn, Edward Guo, Edik Simonian, Sean Peisert, JP Delplanque, and Nick Anderson,
CHEST Journal, 148(4), October 2015. [bib | DOI | CDL]

"Techniques for the Dynamic Randomization of Network Attributes"
Adrian Chavez, William M.S. Stout, and Sean Peisert,
Proceedings of the 49th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, Republic of China, September 21–24, 2015. [bib | DOI | CDL]

"Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe Systems"
Sisi Duan, Jingtao Sun, and Sean Peisert,
Proceedings of the 8th International Conference on Internet and Distributed Computing Systems (IDCS), pp. 157–168, Windsor, Berkshire, United Kingdom, September 2–4, 2015. [bib | LNCS Book | LNCS Chapter | CDL]

"hBFT: Speculative Byzantine Fault Tolerance With Minimum Cost"
Sisi Duan, Sean Peisert, and Karl Levitt,
IEEE Transactions on Dependable and Secure Computing (TDSC), 12(1), pp. 58–70, Jan./Feb. 2015. (published online March 19, 2014) [bib | DOI | CDL]

"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration"
Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang,
Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, Cortina, Italy, December 15–19, 2014. [bib | DOI | LNCS Book | LNCS Chapter | CDL]

"Monitoring Security of Networked Control Systems: It's the Physics"
Chuck McParland, Sean Peisert, and Anna Scaglione,
IEEE Security & Privacy,12(6), pp. 32–39, November/December 2014. [bib | DOI | CDL]

"Control System Security from the Front Lines (Roundtable)"
Sean Peisert, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, and Zach Tudor,
IEEE Security & Privacy, 12(6), pp. 55–58, Nov./Dec. 2014. [bib | DOI | CDL]
Peisert and Margulies were the interviewers for the roundtable. Byres, Dorey, Peterson, and Tudor were the roundtable interviewees.

"A Hybrid Network IDS for Protective Digital Relays in the Power Transmission Grid"
Georgia Koutsandria, Vishak Muthukumar, Masood Parvania, Sean Peisert, Chuck McParland, and Anna Scaglione,
Proceedings of the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 908–913, Venice, Italy, November 3–6, 2014. [bib | DOI | CDL]

"Designed-in Security for Cyber-Physical Systems (Roundtable)"
Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, and Chris Sawall,
IEEE Security & Privacy, 12(5), pp. 9–12, Sept./Oct. 2014. [bib | DOI | CDL]
Peisert and Margulies were the interviewers for the roundtable. Nicol, Khurana, and Sawall were the roundtable interviewees.

"Byzantine Fault Tolerance from Intrusion Detection"
Sisi Duan, Karl Levitt, Hein Meling, Sean Peisert, and Haibin Zhang,
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems (SRDS), pp. 253–264, Nara, Japan, October 6–9, 2014. [bib | DOI | CDL] (Best Paper Candidate Award)

"Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems"
Masood Parvania, Georgia Koutsandria, Vishak Muthukumar, Sean Peisert, Chuck McParland, and Anna Scaglione,
Proceedings of the 1st International Workshop on Trustworthiness of Smart Grids (ToSG), pp. 774–779, Atlanta, GA, June 23, 2014. [bib | DOI | CDL]

"P2S: A Fault-Tolerant Publish/Subscribe Infrastructure"
Tiancheng Chang, Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang
Proceedings of the 8th ACM International Conference on Distributed Event Based Systems (DEBS), pp. 189–197, Mumbai, India, May 26–29, 2014. [bib | DOI | CDL]

"Insider Detection by Process Analysis"
Matt Bishop, Heather Conboy, Huong Phan, Borislava I. Simidchieva, George Avrunin, Lori Clarke, Lee Osterweil, and Sean Peisert,
Proceedings of the 2014 Workshop on Research for Insider Threat (WRIT), IEEE Computer Society Security and Privacy Workshops, San Jose, CA, May 18, 2014. [bib | DOI | IEEE SPW/OA | CDL]

"Principles of Authentication"
Sean Peisert, Ed Talbot, and Tom Kroeger,
Proceedings of the 2013 New Security Paradigms Workshop (NSPW), pp. 47–56, Banff, Canada, September 9–12, 2013. [bib | DOI | NSPW/OA | CDL]

"Multiclass Classification of Distributed Memory Parallel Computations"
Sean Whalen, Sean Peisert, and Matt Bishop,
Pattern Recognition Letters (PRL), 34(3), pp. 322–329, February 2013. [bib | DOI | CDL]

"Networked Loads in the Distribution Grid"
Xiao Li, Zhifang Wang, Vishak Muthukumar, Anna Scaglione, Sean Peisert, and Chuck McParland,
Proceedings of the 2012 Asia-Pacific Signal & Information Processing Association (APSIPA) Annual Summit and Conference, Hollywood, CA, December 3–6, 2012. [DOI | bib | CDL]

"Security and Elections"
Matt Bishop and Sean Peisert
IEEE Security & Privacy, 10(5), pp. 64–67, Sept.-Oct. 2012. [bib | DOI | CDL]

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems"
Sean Peisert, Ed Talbot, and Matt Bishop,
Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, Bertinoro, Italy, September 19–21, 2012. [bib | DOI | NSPW/OA | CDL]

"Network-Theoretic Classification of Parallel Computation Patterns" (expanded version of CACHES paper)
Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop,
International Journal of High Performance Computing Applications (IJHPCA), 26(2), pp. 159–169, May 2012. [bib | DOI | CDL]

"Network-Theoretic Classification of Parallel Computation Patterns"
Sean Whalen, Sean Peisert, and Matt Bishop,
Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES), Tucson, AZ, June 4, 2011. [bib]

"Relationships and Data Sanitization: A Study in Scarlet"
Matt Bishop, Justin Cummins, Sean Peisert, Bhume Bhumitarana, Anhad Singh, Deborah Agarwal, Deborah Frincke, and Michael Hogarth,
Proceedings of the 2010 New Security Paradigms Workshop (NSPW), pp. 151–164, Concord, MA, September 21–23, 2010. [bib | DOI | NSPW/OA | CDL]

"A Risk Management Approach to the 'Insider Threat'"
Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, and Sean Whalen,
Insider Threats in Cyber Security, "Advances in Information Security" Series, pp. 115–138, Springer, Berlin, September 2010. [bib | DOI | CDL]

"Modeling Faults to Improve Election Process Robustness"
Borislava I. Simidchieva, Sophie J. Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, and Leon J. Osterweil,
Proceedings of the 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE), Washinton, D.C., August 11–13, 2010. [bib | USENIX/OA | CDL]

"Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms"
Sean Peisert, Matt Bishop, Laura Corriss, and Steven J. Greenwald,
Proceedings of the 2009 New Security Paradigms Workshop (NSPW), pp. 133–144, The Queen's College, Oxford, United Kingdom, September 8–11, 2009. [bib | DOI | NSPW/OA | CDL]

"E-Voting and Forensics: Prying Open the Black Box"
Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson,
Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE), Montreal, Canada, August 10–11, 2009. [bib | USENIX/OA | CDL]

"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines"
Sean Peisert, Matt Bishop, and Alec Yasinsac,
Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Decision Technologies and Service Sciences Track, Digital Forensics Pedagogy and Foundational Research Activity Minitrack, Waikoloa, HI, January 5–8, 2009. (Nominated for Best Paper Award) [bib | DOI | CDL]

"Case Studies of an Insider Framework"
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Cyber Security and Information Intelligence Research Minitrack, Waikoloa, HI, January 5–8, 2009. [bib | DOI | CDL]

"We Have Met the Enemy and He is Us"
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
Proceedings of the 2008 New Security Paradigms Workshop (NSPW), pp. 1–11, Lake Tahoe, CA, September 22–25, 2008. [bib | DOI | NSPW/OA | CDL]

"Computer Forensics In Forensis" (invited paper; expanded version of ACM OSR 42(3) paper)
Sean Peisert, Matt Bishop, and Keith Marzullo,
Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, Oakland/Berkeley, CA, May 22, 2008. [bib | DOI | CDL]

"Computer Forensics In Forensis"
Sean Peisert, Matt Bishop, and Keith Marzullo,
ACM Operating Systems Review (OSR), Special Issue on Computer Forensics, 42(3), pp. 112–122, April 2008. [bib | DOI | CDL]

"I'm a Scientist, Not a Philosopher!"
Sean Peisert and Matt Bishop,
IEEE Security & Privacy,5(4), pp. 48–51, July-August 2007. [bib | DOI | CDL]

"Analysis of Computer Intrusions Using Sequences of Function Calls"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007. [bib | DOI | CDL]

"How to Design Computer Security Experiments"
Sean Peisert and Matt Bishop,
Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, West Point, NY, June 2007. [bib | DOI | CDL]

"Toward Models for Forensic Analysis"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, Seattle, WA, April 2007. [bib | DOI | CDL]

"Principles-Driven Forensic Analysis"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pp. 85–93, Lake Arrowhead, CA, September 2005. [bib | DOI | NSPW/OA | CDL]

"Forensics for System Administrators"
Sean Peisert,
USENIX ;login:, 30(4), pp. 34–42, August 2005. [bib | USENIX/OA | CDL]

Editorials and Introductions

"On Software Infrastructure: Develop, Prove, Profit? [From the Editors]"
Sean Peisert
IEEE Security & Privacy, 21(4), pp.4–8, Jul./Aug. 2023. [DOI]
"The First 20 Years of IEEE Security & Privacy [From the Editors]"
Sean Peisert
IEEE Security & Privacy, 21(2), pp.4–6, Mar./Apr. 2023. [DOI]
"A 20th Anniversary Episode Chat With S&P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert"
Bob Blakley, Lorrie Cranor, George Cybenko, Carl Landwehr, Sean Peisert, and Shari Lawrence Pfleeger
IEEE Security & Privacy, 21(2), pp.9–16, Mar./Apr. 2023. [DOI]
"Unsafe at Any Clock Speed: the Insecurity of Computer System Design, Implementation, and Operation [From the Editors]"
Sean Peisert
IEEE Security & Privacy, 20(1), pp.4–9, Jan./Feb. 2022. [DOI]

"Perspectives on the SolarWinds Incident"
Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, and James Bret Michael
IEEE Security & Privacy, 19(2), pp.7–13, Mar./Apr. 2021. [DOI]

"SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?"
Fabio Massacci, Trent Jaeger, and Sean Peisert
IEEE Security & Privacy, 19(2), pp.14–19, Mar./Apr. 2021. [DOI]

"Reflections on the Past, Perspectives on the Future [From the Editors]"
Sean Peisert
IEEE Security & Privacy, 19(1), pp.4–7, Jan./Feb, 2021. [bib | DOI | CDL]

"Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19 [From the Editors]"
Sean Peisert
IEEE Security & Privacy, 18(4), pp.4–7, July./Aug. 2020. [bib | DOI | CDL]

"Some Experiences in Developing Security Technology That Actually Get Used [From the Editors]"
Sean Peisert
IEEE Security & Privacy, 17(2), pp.4–7, Mar./Apr. 2019. [bib | DOI | CDL]

"Selected Papers from the 2017 IEEE Symposium on Security and Privacy [Guest editors' introduction]"
Terry Benzel and Sean Peisert,
IEEE Security & Privacy, 16(1), pp. 10–11, Jan./Feb. 2018. [bib | IEEE Xplore DL | CDL]

"Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]"
Sean Peisert and Jonathan Margulies,
IEEE Security & Privacy, 12(6), pp. 13–14, Nov./Dec. 2014. [bib | IEEE Xplore DL | CDL]

"The IEEE Symposium on Security and Privacy, in Retrospect"
Peter G. Neumann, Sean Peisert, and Marvin Schaefer,
IEEE Security & Privacy, 12(3), pp. 15–17, May/June 2014. [bib | DOI | CDL]

"4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Conference Report Summary"
Sean Peisert,
USENIX ;login:, 36(6), pp. 97–98, December 2011.

"The Hive Mind Project -- Digital Ants for Intrusion Detection"
Sean Peisert,
DETERlab Testbed Quarterly Newsletter, Summer, 2011.

"Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy"
Peter G. Neumann, Matt Bishop, Sean Peisert, and Marv Schaefer,
Proceedings of the 31st IEEE Symposium on Security and Privacy, pp. 3–13, Oakland/Berkeley, CA, May 16–19, 2010. [bib | DOI | CDL]

Doctoral Dissertation

A Model of Forensic Analysis Using Goal-Oriented Logging
Sean P. Peisert,
Ph.D. Dissertation, Dept. of Computer Science and Engineering, University of California, San Diego, March 2007. [bib | UMI | CDL]

Committee members: Professor Emeritus Sidney Karin (chair), Professor Matt Bishop, Professor Emeritus Larry Carter, Professor Keith Marzullo, Professor Stefan Savage, and Professor Roger Bohn.


Tech Reports and Other Writings

A Vision for Securing NSF's Essential Scientific Cyberinfrastructure - Trusted CI Five-Year Strategic Plan (2024-2029)
Jim Basney, Sean Peisert, Scott Russell, Kelli Shute, Bart Miller, and Kathy Benninger
August 1, 2023. [DOI]

"Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication"
Nikhil Ravi, Anna Scaglione, Julieta Giraldez, Parth Pradhan, Chuck Moran, and Sean Peisert
arXiv preprint arXiv:2304.03749, 7 Apr 2023. [arXiv]

Roadmap for Securing Operational Technology in NSF Scientific Research
Andrew Adams, Emily K. Adams, Dan Gunter, Ryan Kiser, Mark Krenz, Sean Peisert, and John Zage
Trusted CI Report, November 16 2022. [DOI]

"The Current State of Software Assurance Tools and Techniques"
Sean Peisert
LBNL Technical Report, October 24, 2022. [eScholarship]

"Perspectives for Self-Driving Labs in Synthetic Biology"
Hector Garcia Martin, Tijana Radivojevic, Jeremy Zucker, Kristofer Bouchard, Jess Sustarich, Sean Peisert, Dan Arnold, Nathan Hillson, Gyorgy Babnigg, Jose Manuel Marti, Christopher J. Mungall, Gregg T. Beckham, Lucas Waldburger, James Carothers, ShivShankar Sundaram, Deb Agarwal, Blake A. Simmons, Tyler Backman, Deepanwita Banerjee, Deepti Tanjore, Lavanya Ramakrishnan, and Anup Singh
arXiv preprint arXiv:2210.09085, 14 Oct 2022. [arXiv]

"Findings of the 2022 Trusted CI Study on the Security of Operational Technology in NSF Scientific Research"
Emily K. Adams, Daniel Gunter, Ryan Kiser, Mark Krenz, Sean Peisert, Susan Sons, and John Zage
Trusted CI Report, July 13, 2022. [DOI]

"Guide to Securing Scientific Software"
Andrew Adams, Kay Avila, Elisa Heymann, Mark Krenz, Jason R. Lee, Barton Miller, and Sean Peisert
Trusted CI Report, December 14, 2021. [DOI]

"Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset"
Ammar Haydari, Michael Zhang, Chen-Nee Chuah, Jane Macfarlane, and Sean Peisert
arXiv preprint arXiv:2112.08487, 10 Dec 2021. [arXiv]

"Differentially Private K-means Clustering Applied to Meter Data Analysis and Synthesis"
Nikhil Ravi, Anna Scaglione, Sachin Kadam, Reinhard Gentz, Sean Peisert, Brent Lunghino, Emmanuel Levijarvi, Aram Shumavon
arXiv preprint arXiv:2112.03801, 7 Dec 2021. [arXiv]

"SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation"
Yize Chen, Yuanyuan Shi, Daniel Arnold, and Sean Peisert
arXiv preprint arXiv:2111.15152, 30 Nov 2021. [arXiv]

"Learning from Learning Machines: a New Generation of AI Technology to Meet the Needs of Science"
Luca Pion-Tonachini, Kristofer Bouchard, Hector Garcia Martin, Sean Peisert, W. Bradley Holtz, Anil Aswani, Dipankar Dwivedi, Haruko Wainwright, Ghanshyam Pilania, Benjamin Nachman, Babetta L. Marrone, Nicola Falco, Prabhat, Daniel Arnold, Alejandro Wolf-Yadlin, Sarah Powers, Sharlee Climer, Quinn Jackson, Ty Carlson, Michael Sohn, Petrus Zwart, Neeraj Kumar, Amy Justice, Claire Tomlin, Daniel Jacobson, Gos Micklem, Georgios V. Gkoutos, Peter J. Bickel, Jean-Baptiste Cazier, Juliane Müller, Bobbie-Jo Webb-Robertson, Rick Stevens, Mark Anderson, Ken Kreutz-Delgado, Michael W. Mahoney, James B. Brown,
arXiv preprint arXiv:2111.13786, 27 Nov 2021. [arXiv]

"Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets"
Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, and Aram Shumavon
arXiv preprint arXiv:2111.11661, 23 Nov 2021. [arXiv]

"Colored Noise Mechanism for Differentially Private Clustering"
Nikhil Ravi, Anna Scaglione, and Sean Peisert,
arXiv preprint arXiv:2111.07850, 15 Nov 2021. [arXiv]

"Understanding the Safety Requirements for Learning-based Power Systems Operations"
Yize Chen, Daniel Arnold, Yuanyuan Shi, and Sean Peisert
arXiv preprint arXiv:2110.04983, 11 Oct 2021. [arXiv]

"The State of the Scientific Software World: Findings of the 2021 Trusted CI Software Assurance Annual Challenge Interviews"
Andrew Adams, Kay Avila, Elisa Heymann, Mark Krenz, Jason R. Lee, Barton Miller, and Sean Peisert,"
Trusted CI Report, September 29, 2021.

"Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments"
Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, and Sean Peisert,
arXiv preprint arXiv:2010.13216, 25 Oct 2020. [bib | arXiv]

"An Examination and Survey of Data Confidentiality Issues and Solutions in Academic Research Computing"
Sean Peisert
Trusted CI Report, September 8, 2020. [bib | eScholarship]

"Catch Me If You Can: Using Power Analysis to Identify HPC Activity"
Bogdan Copos and Sean Peisert
arXiv preprint arXiv:2005.03135, May 6, 2020. [bib | arXiv]

"An Examination and Survey of Random Bit Flips and Scientific Computing"
Reinhard Gentz and Sean Peisert
Trusted CI Report, December 20, 2019 [bib].

"Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA - Final Report
Sean Peisert, Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Charles McParland, Alex McEachren, Galen Rasche, Aaron Snyder
October 15, 2018.

"Open-Source Software Won't Ensure Election Security"
Matt Bishop, Philip Stark, Josh Benaloh, Joseph Kiniry, Ron Rivest, Sean Peisert, Joseph Hall, and Vanessa Teague
Lawfare, August 24, 2017. [bib]

"Open Science Cyber Risk Profile"
Sean Peisert, Von Welch, Andrew Adams, Michael Dopheide, Susan Sons, RuthAnne Bevier, Rich LeDuc, Pascal Meunier, Stephen Schwab, Karen Stocks, Ilkay Altintas, James Cuff, Reagan Moore, and Warren Raquel
February 2017. [bib | DOI]

"Security Analysis of Scantegrity, an Electronic Voting System"
Jonathan Ganz, Matt Bishop, and Sean Peisert
UC Davis CS Technical Report, June, 2016. [CDL]

"Distributed Helios - Mitigating Denial of Service Attacks in Online Voting"
Daniel Chung, Matt Bishop, and Sean Peisert
UC Davis CS Technical Report, March, 2016. [CDL]

"ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas"
Sean Peisert, et al.
U.S. Department of Energy Office of Science report, LBNL Technical Report number LBNL-191105, September, 2015. [bib | DOI]

"ASCR Cybersecurity for Scientific Computing Integrity"
Sean Peisert, et al.
U.S. Department of Energy Office of Science report, LBNL Technical Report number LBNL-6953E, February, 2015. [bib | DOI]

"The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report"
Sean Peisert and Steven Templeton
UC Davis CS Technical Report, Sept. 4, 2013. [bib | CDL]

"Dynamic, Flexible, and Optimistic Access Control"
Sean Peisert and Matt Bishop
UC Davis CS Technical Report CSE-2013-76, July 2013. [bib] [CDL]

"Fingerprinting Communication and Computation on HPC Machines"
Sean Peisert,
Lawrence Berkeley National Laboratory Technical Report LBNL-3483E, June 2010. [bib | CDL]

"What Do Firewalls Protect? An Empirical Study of Firewalls, Vulnerabilities, and Attacks"
Sean Peisert, Matt Bishop, and Keith Marzullo,
UC Davis CS Technical Report CSE-2010-8, March 2010. [bib] [CDL]

"Resolving the Unexpected in Elections: Election Officials' Options"
Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert
October 8, 2008. [bib | CDL]
Distributed by the Center For Election Excellence and the American Bar Association.

"Your Security Policy is What???"
Matt Bishop and Sean Peisert,
UC Davis CS Technical Report CSE-2006-20, March 2006. [bib] [CDL]

"World Infrastructure Security Environment (WISE): Conceptual Overview, Feasibility, and Research"
Sean Peisert and Sid Karin,
Technical Report, July 2003.

"A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors"
Sean P. Peisert and Scott B. Baden,
UCSD CSE Technical Report, February 2001. [UCSD]
A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors
Sean P. Peisert,
Masters Thesis, Dept. of Computer Science and Engineering, University of California, San Diego, March 2000. [bib]

Federal RFI Responses

"Privacy-Preserving Data Sharing for Science and Public Policy," Sean Peisert, July 14, 2022. (OSTP RFI on Privacy-Enhancing Technologies)

"RFI Response: National AI Research Resource,", Deb Agarwal, Katie Antypas, Wahid Bhimji, Jonathan Carter, Sean Peisert, Charuleka Varadharajan, Peter Zwart, October 1, 2021. (OSTP Request for Information (RFI) on an Implementation Plan for a National Artificial Intelligence Research Resource (NAIRR))

Response, Sean Peisert, Venkatesh Akella, and Jason Lowe-Power, Dec. 12, 2019. (NSF Dear Colleague Letter: Request for Information on Data-Focused Cyberinfrastructure Needed to Support Future Data-Intensive Science and Engineering Research)

Edited Volumes

"Organizational Processes for Supporting Sustainable Security"
Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, and Christian Probst, editors
Report from Dagstuhl Seminar 120501, December 9–12, 2012, Dagstuhl Reports, Volume 2, Issue 12, pp. 37–48, November 4, 2013. [bib | DOI]

Proceedings of the 2011 New Security Paradigms Workshop
Sean Peisert, Richard Ford, Carrie Gates, and Cormac Herley, editors, Marin County, CA, Sept. 12–15, 2011. Copyright 2011, Association for Computing Machinery. ISBN 978-1-4503-1078-9
Front Matter and Letters from Chairs

The definitive versions of the papers posted on this page were first published in the venues indicated. In accordance with publisher copyright policies, these papers are pre-prints or post-prints, and are not the pubilsher's version.

Personal use of the material posted on this page is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the original publishers.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


"I believe that this nation should commit itself to achieving the goal, before this decade is out, of landing a man on the moon and returning him safely to the earth. ... We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too."
 
-President John F. Kennedy, Message to Congress on Urgent National Needs, May 25, 1961


Last modified: Monday, 29-Jan-2024 10:42:49 PST