Sean Peisert

Home Page

Publications

Research Projects

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

Bio

Links

My Life


Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).


Upcoming events that I'm involved with:

CLHS (Abstracts due Apr. 4, 2013)

NSPW 2013 (Papers due Apr. 5, 2013)

CSET 2013 (Papers due Apr. 25, 2013)

S&P 2013 (May 20–22, 2013)

 
 

Publications

Jump to: Refereed Papers   Invited Papers   Dissertation   Other Writings

Also see my papers at Google Scholar and DBLP.

Refereed Papers

"Multiclass Classification of Distributed Memory Parallel Computations"
Sean Whalen, Sean Peisert, and Matt Bishop,
Pattern Recognition Letters (PRL), 34(3), pp. 322–329, 2013. [BibTeX] [DOI]

"Networked Loads in the Distribution Grid"
Xiao Li, Zhifang Wang, Vishak Muthukumar, Anna Scaglione, Chuck McParland, and Sean Peisert,
Proceedings of the 2012 APSIPA Annual Summit and Conference,
Hollywood, CA, December 3–6, 2012. [BibTeX]

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems"
Sean Peisert, Ed Talbot, and Matt Bishop,
Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26,
Bertinoro, Italy, September 19–21, 2012. [BibTeX] [DOI]

"Network-Theoretic Classification of Parallel Computation Patterns" (expanded version of CACHES paper)
Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop,
International Journal of High Performance Computing Applications (IJHPCA), 26(2), pp. 159–169, May 2012. [BibTeX] [DOI]

"Network-Theoretic Classification of Parallel Computation Patterns"
Sean Whalen, Sean Peisert, and Matt Bishop,
Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES),
Tucson, AZ, June 4, 2011. [BibTeX]

"Relationships and Data Sanitization: A Study in Scarlet"
Matt Bishop, Justin Cummins, Sean Peisert, Bhume Bhumitarana, Anhad Singh, Deborah Agarwal, Deborah Frincke, and Michael Hogarth,
Proceedings of the 2010 New Security Paradigms Workshop (NSPW), pp. 151–164
Concord, MA, September 21–23, 2010. [BibTeX] [DOI]

"A Risk Management Approach to the 'Insider Threat'"
Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, and Sean Whalen,
Insider Threats in Cyber Security,
"Advances in Information Security" Series, pp. 115–138,
Springer, Berlin, September 2010. [BibTeX] [DOI]
Order book from Springer

"Modeling Faults to Improve Election Process Robustness"
Borislava I. Simidchieva, Sophie J. Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, and Leon J. Osterweil,
Proceedings of the 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE),
Washinton, D.C., August 11–13, 2010. [BibTeX] [Authoritative]

"Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms"
Sean Peisert, Matt Bishop, Laura Corriss, and Steven J. Greenwald,
Proceedings of the 2009 New Security Paradigms Workshop (NSPW), pp. 133–144
The Queen's College, Oxford, United Kingdom, September 8–11, 2009. [BibTeX] [DOI]

"E-Voting and Forensics: Prying Open the Black Box"
Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson,
Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE),
Montreal, Canada, August 10–11, 2009. [BibTeX] [Authoritative]

"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines"
Sean Peisert, Matt Bishop, and Alec Yasinsac,
Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Decision Technologies and Service Sciences Track, Digital Forensics Pedagogy and Foundational Research Activity Minitrack,
Waikoloa, HI, January 5–8, 2009. (Nominated for Best Paper Award) [BibTeX] [DOI]

"Case Studies of an Insider Framework"
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Cyber Security and Information Intelligence Research Minitrack,
Waikoloa, HI, January 5–8, 2009. [BibTeX] [DOI]

"We Have Met the Enemy and He is Us"
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
Proceedings of the 2008 New Security Paradigms Workshop (NSPW),
Lake Tahoe, CA, September 22–25, 2008. [BibTeX] [DOI]

"Computer Forensics In Forensis"
Sean Peisert, Matt Bishop, and Keith Marzullo,
ACM Operating Systems Review (OSR), Special Issue on Computer Forensics, 42(3), pp. 112–122,
April 2008. [BibTeX] [DOI]

"Analysis of Computer Intrusions Using Sequences of Function Calls"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150,
April-June 2007. [BibTeX] [DOI]

"How to Design Computer Security Experiments"
Sean Peisert and Matt Bishop,
Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148,
West Point, NY, June 2007. [BibTeX] [DOI]

"Toward Models for Forensic Analysis"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15,
Seattle, WA, April 2007. [BibTeX] [DOI]

"Principles-Driven Forensic Analysis"
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pp. 85–93,
Lake Arrowhead, CA, September 2005. [BibTeX] [DOI]

Invited Papers and Columns

"Security and Elections"
Matt Bishop and Sean Peisert
IEEE Security and Privacy Magazine,10(5), pp. 64–67,
Sept.-Oct. 2012. [BibTeX] [DOI]

"4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Conference Report Summary"
Sean Peisert,
USENIX ;login:, 36(6), pp. 97–98,
December 2011.

"The Hive Mind Project -- Digital Ants for Intrusion Detection"
Sean Peisert,
DETERlab Testbed Quarterly Newsletter, Summer, 2011.

"Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy"
Peter G. Neumann, Matt Bishop, Sean Peisert, and Marv Schaefer,
Proceedings of the 31st IEEE Symposium on Security and Privacy, pp. 3–13,
Oakland/Berkeley, CA, May 16–19, 2010. [BibTeX] [DOI]

"Computer Forensics In Forensis" (invited paper; expanded version of ACM OSR 42(3) paper)
Sean Peisert, Matt Bishop, and Keith Marzullo,
Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122,
Oakland/Berkeley, CA, May 22, 2008. [BibTeX] [DOI]

"I'm a Scientist, Not a Philosopher!"
Sean Peisert and Matt Bishop,
IEEE Security and Privacy Magazine,5(4), pp. 48–51,
July-August 2007. [BibTeX] [DOI]

"Forensics for System Administrators"
Sean Peisert,
USENIX ;login:, 30(4), pp. 34–42,
August 2005. [BibTeX] [Authoritative]
Reprinted in Cyber Forensics: Tools and Practices, ICFAI University Press, ISBN 81-314-0438-2, 2007.

Doctoral Dissertation

A Model of Forensic Analysis Using Goal-Oriented Logging
Sean P. Peisert,
Ph.D. Dissertation, Dept. of Computer Science and Engineering, University of California, San Diego,
March 2007. [BibTeX]

Committee members: Professor Emeritus Sidney Karin (chair), Professor Matt Bishop, Professor Emeritus Larry Carter, Professor Keith Marzullo, Professor Stefan Savage, and Professor Roger Bohn.


Tech Reports and Other Writings

"Fingerprinting Communication and Computation on HPC Machines"
Sean Peisert,
Lawrence Berkeley National Laboratory Technical Report LBNL-3483E,
June 2010. [BibTeX] [Authoritative]

"What Do Firewalls Protect? An Empirical Study of Firewalls, Vulnerabilities, and Attacks"
Sean Peisert, Matt Bishop, and Keith Marzullo,
UC Davis CS Technical Report CSE-2010-8,
March 2010. [BibTeX] [Authoritative]

"Resolving the Unexpected in Elections: Election Officials' Options"
Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert
October 8, 2008. [BibTeX]
Distributed by the Center For Election Excellence and the American Bar Association.

"Your Security Policy is What???"
Matt Bishop and Sean Peisert,
UC Davis CS Technical Report CSE-2006-20,
March 2006. [BibTeX] [Authoritative]

"World Infrastructure Security Environment (WISE): Conceptual Overview, Feasibility, and Research"
Sean Peisert and Sid Karin,
Technical Report,
July 2003.

"A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors"
Sean P. Peisert and Scott B. Baden,
UCSD CSE Technical Report,
February 2001. [Authoritative]
A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors
Sean P. Peisert,
Masters Thesis, Dept. of Computer Science and Engineering, University of California, San Diego,
March 2000. [BibTeX]

The definitive versions of the papers posted on this page were first published in the venues indicated. In accordance with publisher copyright policies, these papers are pre-prints or post-prints, and are not the pubilsher's version.

Personal use of the material posted on this page is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the original publishers.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


"I believe that this nation should commit itself to achieving the goal, before this decade is out, of landing a man on the moon and returning him safely to the earth. ... We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too."
 
-President John F. Kennedy, Message to Congress on Urgent National Needs, May 25, 1961


Last modified: Tuesday, 29-Jan-2013 12:07:38 PST