|
Home Page
Publications
Research Projects
Talks and Tutorials
Professional Service
Teaching
Students & Postdocs
Bio
Links
My Life
Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).
Upcoming events that I'm involved with:
|
|
Publications
Also see my papers at Google Scholar and DBLP.
Refereed Papers
- "Multiclass Classification of Distributed Memory Parallel Computations"
- Sean Whalen, Sean Peisert, and Matt Bishop,
- Pattern Recognition Letters (PRL), 34(3), pp. 322–329, 2013. [BibTeX] [DOI]
- "Networked Loads in the Distribution Grid"
- Xiao Li, Zhifang Wang, Vishak Muthukumar, Anna Scaglione, Chuck McParland, and Sean Peisert,
- Proceedings of the 2012 APSIPA Annual Summit and Conference,
- Hollywood, CA, December 3–6, 2012. [BibTeX]
- "Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems"
- Sean Peisert, Ed Talbot, and Matt Bishop,
- Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26,
- Bertinoro, Italy, September 19–21, 2012. [BibTeX] [DOI]
- "Network-Theoretic Classification of Parallel Computation Patterns" (expanded version of CACHES paper)
- Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop,
- International Journal of High Performance Computing Applications (IJHPCA), 26(2), pp. 159–169, May 2012. [BibTeX] [DOI]
- "Network-Theoretic Classification of Parallel Computation Patterns"
- Sean Whalen, Sean Peisert, and Matt Bishop,
- Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES),
- Tucson, AZ, June 4, 2011. [BibTeX]
- "Relationships and Data Sanitization: A Study in Scarlet"
- Matt Bishop, Justin Cummins, Sean Peisert, Bhume Bhumitarana, Anhad Singh, Deborah Agarwal, Deborah Frincke, and Michael Hogarth,
- Proceedings of the 2010 New Security Paradigms Workshop (NSPW), pp. 151–164
- Concord, MA, September 21–23, 2010. [BibTeX] [DOI]
- "A Risk Management Approach to the 'Insider Threat'"
- Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, and Sean Whalen,
- Insider Threats in Cyber Security,
- "Advances in Information Security" Series, pp. 115–138,
- Springer, Berlin, September 2010. [BibTeX] [DOI]
- Order book from Springer
- "Modeling Faults to Improve Election Process Robustness"
- Borislava I. Simidchieva, Sophie J. Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, and Leon J. Osterweil,
- Proceedings of the 2010 Electronic Voting Technology Workshop/
Workshop on Trustworthy Elections (EVT/WOTE),
- Washinton, D.C., August 11–13, 2010. [BibTeX] [Authoritative]
- "Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms"
- Sean Peisert, Matt Bishop, Laura Corriss, and Steven J. Greenwald,
- Proceedings of the 2009 New Security Paradigms Workshop (NSPW), pp. 133–144
- The Queen's College, Oxford, United Kingdom, September 8–11, 2009. [BibTeX] [DOI]
- "E-Voting and Forensics: Prying Open the Black Box"
- Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson,
- Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE),
- Montreal, Canada, August 10–11, 2009. [BibTeX] [Authoritative]
- "Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines"
- Sean Peisert, Matt Bishop, and Alec Yasinsac,
- Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Decision Technologies and Service Sciences Track, Digital Forensics Pedagogy and Foundational Research Activity Minitrack,
- Waikoloa, HI, January 5–8, 2009. (Nominated for Best Paper Award) [BibTeX] [DOI]
- "Case Studies of an Insider Framework"
- Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
- Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Cyber Security and Information Intelligence Research Minitrack,
- Waikoloa, HI, January 5–8, 2009. [BibTeX] [DOI]
- "We Have Met the Enemy and He is Us"
- Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, and Carrie Gates,
- Proceedings of the 2008 New Security Paradigms Workshop (NSPW),
- Lake Tahoe, CA, September 22–25, 2008. [BibTeX] [DOI]
- "Computer Forensics In Forensis"
- Sean Peisert, Matt Bishop, and Keith Marzullo,
- ACM Operating Systems Review (OSR), Special Issue on Computer Forensics, 42(3), pp. 112–122,
- April 2008. [BibTeX] [DOI]
- "Analysis of Computer Intrusions Using Sequences of Function Calls"
- Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
- IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150,
- April-June 2007. [BibTeX] [DOI]
- "How to Design Computer Security Experiments"
- Sean Peisert and Matt Bishop,
- Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148,
- West Point, NY, June 2007. [BibTeX] [DOI]
- "Toward Models for Forensic Analysis"
- Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
- Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15,
- Seattle, WA, April 2007. [BibTeX] [DOI]
- "Principles-Driven Forensic Analysis"
- Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo,
- Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pp. 85–93,
- Lake Arrowhead, CA, September 2005. [BibTeX] [DOI]
Invited Papers and Columns
- "Security and Elections"
- Matt Bishop and Sean Peisert
- IEEE Security and Privacy Magazine,10(5), pp. 64–67,
- Sept.-Oct. 2012. [BibTeX] [DOI]
- "4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Conference Report Summary"
- Sean Peisert,
- USENIX ;login:, 36(6), pp. 97–98,
- December 2011.
- "The Hive Mind Project -- Digital Ants for Intrusion Detection"
- Sean Peisert,
- DETERlab Testbed Quarterly Newsletter, Summer, 2011.
- "Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy"
- Peter G. Neumann, Matt Bishop, Sean Peisert, and Marv Schaefer,
- Proceedings of the 31st IEEE Symposium on Security and Privacy, pp. 3–13,
- Oakland/Berkeley, CA, May 16–19, 2010. [BibTeX] [DOI]
- "Computer Forensics In Forensis" (invited paper; expanded version of ACM OSR 42(3) paper)
- Sean Peisert, Matt Bishop, and Keith Marzullo,
- Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122,
- Oakland/Berkeley, CA, May 22, 2008. [BibTeX] [DOI]
- "I'm a Scientist, Not a Philosopher!"
- Sean Peisert and Matt Bishop,
- IEEE Security and Privacy Magazine,5(4), pp. 48–51,
- July-August 2007. [BibTeX] [DOI]
- "Forensics for System Administrators"
- Sean Peisert,
- USENIX ;login:, 30(4), pp. 34–42,
- August 2005. [BibTeX] [Authoritative]
- Reprinted in Cyber Forensics: Tools and Practices, ICFAI University Press, ISBN 81-314-0438-2, 2007.
Doctoral Dissertation
- A Model of Forensic Analysis Using Goal-Oriented Logging
- Sean P. Peisert,
- Ph.D. Dissertation, Dept. of Computer Science and Engineering, University of California, San Diego,
- March 2007. [BibTeX]
Committee members:
Professor Emeritus Sidney Karin (chair), Professor Matt Bishop,
Professor Emeritus Larry Carter, Professor Keith Marzullo, Professor Stefan Savage, and
Professor Roger Bohn.
Tech Reports and Other Writings
- "Fingerprinting Communication and Computation on HPC Machines"
- Sean Peisert,
- Lawrence Berkeley National Laboratory Technical Report LBNL-3483E,
- June 2010. [BibTeX] [Authoritative]
- "What Do Firewalls Protect? An Empirical Study of Firewalls, Vulnerabilities, and Attacks"
- Sean Peisert, Matt Bishop, and Keith Marzullo,
- UC Davis CS Technical Report CSE-2010-8,
- March 2010. [BibTeX] [Authoritative]
- "Resolving the Unexpected in Elections: Election Officials' Options"
- Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert
- October 8, 2008. [BibTeX]
- Distributed by the Center For Election Excellence and the American Bar Association.
- "Your Security Policy is What???"
- Matt Bishop and Sean Peisert,
- UC Davis CS Technical Report CSE-2006-20,
- March 2006. [BibTeX] [Authoritative]
- "World Infrastructure Security Environment (WISE): Conceptual Overview, Feasibility, and Research"
- Sean Peisert and Sid Karin,
- Technical Report,
- July 2003.
- "A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors"
- Sean P. Peisert and Scott B. Baden,
- UCSD CSE Technical Report,
- February 2001. [Authoritative]
- A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors
- Sean P. Peisert,
- Masters Thesis, Dept. of Computer Science and Engineering, University of California, San Diego,
- March 2000. [BibTeX]
The definitive versions of the papers posted on this page were first published in the venues indicated. In accordance with publisher copyright policies, these papers are pre-prints or post-prints, and are not the pubilsher's version.
Personal use of the material posted on this page is permitted. However,
permission to reprint/republish this material for advertising or promotional
purposes or for creating new collective works for resale or redistribution to
servers or lists, or to reuse any copyrighted component of this work in other
works must be obtained from the original publishers.
This material is presented to ensure timely dissemination of scholarly and
technical work. Copyright and all rights therein are retained by authors or by
other copyright holders. All persons copying this information are expected to
adhere to the terms and constraints invoked by each author's copyright. In
most cases, these works may not be reposted without the explicit permission of
the copyright holder.
"I believe that this nation should commit itself to achieving the goal, before this decade is out, of landing a man on the moon and returning him safely to the earth. ... We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too."
-President John F. Kennedy, Message to Congress on Urgent National Needs, May 25, 1961 |
|