Sean Peisert

ACM Distinguished Member

Home Page

Publications

Research Projects

Software

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

News

Bio

Links

Mastodon


Upcoming activities:

IEEE Security & Privacy (ongoing)

NSA SoS Best Paper Competition (annually, deadlines in April)

IEEE Cybersecurity Award for Practice (annually, deadlines in July)

IEEE S&P (Oakland) 2024 (May 20–23, 2024)

CSET 2024 (Aug. 2024)

NSPW 2024 Sept. 16–18, 2024)

NSF Cybersecurity Summit (Oct. 7–10 2024)

 
 

Talks and Tutorials

Jump to: Invited Talks and Paper Presentations   Invited Tutorials

Invited Talks and Paper Presentations

Usable Computer Security and Privacy to Enable Privacy-Preserving Computing on Sensitive Health Data (invited expert panelist), Legislative Staff Briefing on Secure Methods for Sharing Health Data, California Council on Science and Technology (CCST), Sacramento, CA, Dec. 7, 2023.

"Experiences from SIO (CCRV), OSU (RCRVs), OOI, and USAP in Cybersecure-by-Design Maritime and Polar Design and Construction," (panel moderator; with Tim Howard (NSF/USAP), Jon Meyer (SIO/CCRV), Craig Risien (OSU/OOI), Chris Romsos (OSU/CCRV), and Ezra Van Everbroeck (SIO/CCRV), 2023 NSF Cybersecurity Summit, Berkeley, CA, October 26, 2023.

"Trustworthy Scientific Cyberinfrastructure," NASEM Cyber Resilience Forum Summer Meeting, San Francisco, CA, August 31, 2023.

Keynote: “Usable Computer Security and Privacy to Enable Data Sharing in High-Performance Computing Environments,” 3rd High-Performance Computing Security Workshop, NIST National Cybersecurity Center of Excellence (NCCoE), Rockville, MD, March 16, 2023.

Keynote: “Usable Computer Security and Privacy Approaches to Enable Data-Driven Analytics and Learning,” Interdisciplinary Symposium on Responsible Innovation: Intersection of Privacy and Artificial Intelligence, Center for Data Science and AI Research (CeDAR), University of California, Davis, March 10, 2023.

"Responsible Innovation at the Intersection of Privacy and Artificial Intelligence (AI),” (panel; with Eric Dang, Darci Sears, moderators; Tom Kemp, and Richard Arney) Interdisciplinary Symposium on Responsible Innovation: Intersection of Privacy and Artificial Intelligence, Center for Data Science and AI Research (CeDAR), University of California, Davis, March 10, 2023.

"Trusted CI Study on the Security of Operational Technology in NSF Scientific Research," (with Emily Adams, Ryan Kiser, and Mark Krenz), 2022 NSF Cybersecurity Summit, Bloomington, IN, October 19, 2022.

"Securing Edge-to-Center Computing with Trustworthy Data Domains," Monterey Data Workshop, April 21, 2022.

"Trusted CI Evaluation, Guidance, and Programs for Assurance of Scientific Software," NITRD MAGIC Meeting, March 2, 2022.

"Presenting the Results of the Trusted CI Annual Challenge on Software Assurance," (with Elisa Heymann and Barton Miller), Trusted CI Webinar, February 28, 2022.

“Securing Edge-to-Center Computing with Trustworthy Data Domains,” 2022 AFRL/AFOSR/DOE Energy Cost of Information Workshop, February 18, 2022.

“Usable Computer Security and Privacy to Enable Data Sharing for Scientific Research,” (with Venkatesh Akella, UC Davis/LBNL), Trusted Computing Center of Excellence (TCCOE) Summit, February 1–3, 2022.

The Social Dilemma,” (panel; with Safiya Noble, UCLA; Gillian Hayes UCI; Bryan Cunningham, UCI; Pegah Parsi, UCSD; and Allison Henry, UC Berkeley), University of California Data Privacy Day, January 28, 2022.

Keynote: "Usable Computer Security and Privacy to Enable Data Sharing for Scientific Research," Second International Silicon Valley Cybersecurity Conference (SVCC), December 3, 2021.

"Tools for Experimentation with Cybersecurity for Operational Technology" (with Ciaran Roberts), Workshop on Cyber Experimentation and the Science of Security (CESoS), November 10, 2021.

"Observations on Software Assurance in Scientific Computing" (panel moderator; with Andrew Adams, PSC; Kay Avila, UIUC; Elisa Heymann, U. Wisc), 2021 NSF Cybersecurity Summit, October 13, 2021.

"Advancing Cybersecurity as an Enabling Capability in High-Performance Computing Environments", HPC User Forum, Sept. 7–9, 2021

"Cyber Privacy and Security Risks During the Pandemic” (panel - with Bart Preneel, KU Leuven; Kritika Bhardwaj, NLU Delhi; Margaret Bourdeaux, Harvard/Berkman Klein; Susan Landau, Tufts; and Smitha Prasad, NLU Delhi), Hewlett Foundation event hosted by the Fletcher School at Tufts University and the Centre for Communication Governance (CCG) at National Law University, Delhi, December 17, 2020.

“Fragility, Interdependence, and Tradeoffs — Cybersecurity and Privacy Lessons from the Pandemic”, Federal Cybersecurity R&D Interagency Working Group (CSIA IWG), NITRD, December 3, 2020.

"Cybersecurity and Privacy" (with Tiffany Connors, LBNL, Serge Egelman, ICSI, and Talya Parker, GTRI), LBNL Next K-12 Education and Outreach Program STEM Career Talks, November 6, 2020.

“Scientific Computing and Sensitive Data”, DataLab Health Data Science and Systems Research and Learning Cluster, University of California, Davis, October 2, 2020.

"Two Community Surveys on Data Integrity Issues in Scientific Computing" (with Jim Basney, NCSA), 2020 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, September 24, 2020.

“Privacy-Preserving Data Analysis in Scientific Computing Environments”, White House Office of Science & Technology Policy Workshop, Eisenhower Administration Building, Washington, D.C., Jan. 31, 2020.

“Privacy-Preserving Data Analysis for Energy Delivery Systems and Scientific Discovery”, Western Area Power Administration (WAPA), Golden, CO, November 5, 2019.

"Security Without Moats and Walls: Zero-Trust Networking for Enhancing Security in R&E Environments" (panel moderator; with Brooks Evans, Netflix; Michael Liang, SFPL; Barclay Osborn, Google; David Rusting, UCOP; and David Thurston, SBCSS), CENIC Annual Conference, La Jolla, CA, March 19, 2019.

"Experiences in Building a Mission-Driven Security R&D Program for Science and Energy", Computer Science Colloquium Seminar, University of California, Davis, CA, February 7, 2019.

"Using Physics to Improve Cybersecurity for the Distribution Grid and Distributed Energy Resources" (with Daniel Arnold, LBNL), Naval Postgraduate School, Monterey, CA, February 5, 2019.

"Building a Mission-Driven, Applied Cybersecurity R&D Program from Scratch", VISA Research, Palo Alto, CA, January 23, 2019.

"Usable Computer Security and Privacy to Enable and Encourage Data Sharing for Scientific Research", National Academies of Sciences, Engineering, and Medicine Committee on Science, Engineering, Medicine, and Public Policy (COSEMPUP) Meeting, National Academy of Sciences Building, Washington, D.C., November 8, 2018.

"Security Concerns of an NRP", Second National Research Platform (NRP) Workshop, Montana State University, Bozeman, MT, August 6, 2018.

"Election Security: Can We Keep Our Voting Systems Safe?", League of Women Voters of Marin County, San Rafael, CA, July 9, 2018.

"Cyber Security Challenges and Opportunities in High-Performance Computing Environments", International Supercomputing Conference, Frankfurt, Germany, June 26, 2018.

"Keynote: Cybersecurity for HPC Systems: State of the Art and Looking to the Future", High-Performance Computing Security Workshop, National Institute of Standards and Technology (NIST), Gaithersburg, MD, March 28, 2018.

"Cybersecurity Workforce Development in R&E Environments" (panel moderator; with Matt Bishop, UC Davis, Cynthia Irvine, NPS, Zachary Peterson, Cal Poly SLO, David Rusting, UCOP), CENIC Annual Conference, Monterey, CA, March 6, 2018.

"Revoking Attackers' Phishing License in R&E Environments," (panel moderator; with Robert Goodwin, NPS, Ed Hudson, CSU Chancellor’s Office, Nathan Parker, Google, Aashish Sharma, LBNL), CENIC Annual Conference, Monterey, CA, March 6, 2018.

"Cyber Security of Power Distribution Systems Using Micro-Synchrophasor Measurements and Cyber-Reported SCADA" (with Ciaran Roberts, LBNL), EPRI Power Delivery & Utilization Winter 2018 Program Advisory & Sector Council Meeting, Coronado, CA, February 7, 2018.

"Cybersecurity for the Electricity Grid" (with David Hatchell, ProtectWise; Patrick Miller, Archer Security; and Michael Coleman, EPRI), Bits & Watts Annual Conference, Stanford, CA, November 6, 2017.

"Security in High Performance Computing Environments", Computing Sciences/NERSC Security Seminar, Lawrence Berkeley National Laboratory, Berkeley, CA, October 5, 2017.

"Security and Privacy in Data-Intensive, High-Performance Computing Contexts", Berkeley Institute for Data Science (BIDS), University of California, Berkeley, Berkeley, CA, October 2, 2017.

"The Role of the WAN and the Community to Improve Security" (panel moderator; with Mike Corn, UCSD; Dewight Kramer, UC Davis; David Rusting, UCOP; and Tye Stallard, UCOP), 2017 Information Security Symposium, University of California, Davis, Davis, CA, June 21, 2017.

"Managing Energy: Role of Data and Security" [YouTube (with Galen Rasche, EPRI, Jenna Goodward, Microsoft, Sheeraz Haji, Zipdragon Ventures, and Gabriel Paun, Arini Geographics), Prospect Silicon Valley 2017 Innovation and Impact Symposium, Microsoft Silicon Valley, Mountain View, CA, June 14, 2017.

"Cybersecurity: New Directions for Research and Education - Your own safety is at stake when your neighbor's wall is ablaze." (— Horace) (panel moderator; with Greg Bell, Corelight; Anita Nikolich, NSF; and Von Welch, IU/CACR), CENIC Annual Conference — The Right Connection ¦ CENIC 2.0, La Jolla, CA, March 22, 2017.

"Open Science Cyber Risk Profile (OSCRP)" (with Richard LeDuc, Karen Stocks, and Von Welch), National Science Foundation Cybersecurity Center of Excellence (CCoE) Webinar Series, January 23, 2017.

"Overcoming Security and Privacy Challenges in Computing and Networking in Medical Research Environments", Department of Public Health Sciences, University of California, Davis School of Medicine, Davis, CA, December 14, 2016.

"Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-synchrophasor Measurements and Cyber-Reported SCADA", 2016 DOE CEDS Peer Review , Arlington, VA, December 8, 2016.

"National Cybersecurity Panel" (panel moderator; with Jill Gemmill, Clemson, Michael Sinatra, ESnet, and Von Welch, IU), NSF Campus Cyberinfrastructure/ESCC/The Quilt Colocated Meeting, Philadelphia, PA, Oct. 20, 2016.

"HPC Monitoring" (panel; with Lee Beausoleil, NSA (moderator), David Lombard, Intel, and Angelos Keromytis, DARPA), NSCI: High-Performance Computing Security Workshop, National Institute of Standards and Technology (NIST), Gaithersburg, MD, Sept. 30, 2016.

"Security Expert on Why HPC Matters - Cybersecurity for HPC Systems: Challenges and Opportunities", NSCI: High-Performance Computing Security Workshop, National Institute of Standards and Technology (NIST), Gaithersburg, MD, Sept. 29, 2016.

"Computer Security & the Electric Power Grid", Institute for Information Infrastructure Protection (I3P) Webinar, June 17, 2016.

CENIC 2016 Conference Panel: "Security in R&E Networks and Campus Environments" (panel moderator; with Matt Bishop, UC Davis, Dewight Kramer, UC Davis, Paul Rivers, UC Berkeley, and Michael Sinatra, ESnet), 2016 CENIC Annual Conference, Davis, CA, March 22, 2016.

"Computer Security & the Electric Power Grid", 15th Annual ON*VECTOR Photonics Workshop, University of California, San Diego, La Jolla, CA, March 1, 2016.

"Security Research Using Cyber-Physical Systems" (with Nick Anderson), IT Security Symposium, University of California, Davis, Davis, CA, June 16, 2015.

"Models of Secure and Private Information Sharing", University of California, San Diego School of Medicine, Division of Biomedical Informatics Seminar Series, La Jolla, CA, April 10, 2015.

"Security for Computational Infrastructure for Financial Technology" (panel speaker), DataLead 2014: Leading the Way in Big Data, Haas School of Business, University of California, Berkeley, Sept. 30, 2014.

"Principles of Authentication" (with Ed Talbot and Matt Bishop), Who are you?! Adventures in Authentication: WAY Workshop, held in conjunction with the 2014 Symposium on Usable Privacy and Security (SOUPS) , Facebook Headquarters, Menlo Park, CA, July 9, 2014.

"Challenges in Insider Threat Research" (panel speaker), Workshop on Research for Insider Threat (WRIT), IEEE Security and Privacy Workshops (SPW), San Jose, CA, May 18, 2014.

"Cyber Resilience Metrics" (with Marco Carvalho), 1st International Symposium on Resilient Cyber Systems, Resilience Week 2013, San Francisco, CA, Aug 13–15, 2013.

"Health Informatics Minute: Aligning Organizational and Employee Computer Security Goals for Health Informatics" , Seventh Annual Health Informatics Graduate Program Conference , University of California Davis School of Medicine, Sacramento, CA, March 22, 2013.

"Computer Security Issues in Precision Medicine",UCSF+LBNL Workshop: Computational Challenges for Precision Medicine, , University of California, San Francisco, November 30, 2012.

Institute for Information Infrastructure Protection (I3P) 10th Anniversary Event , The National Press Club, Washington, D.C., Oct. 10, 2012.

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems" (Paper Presentation, with Ed Talbot), 2012 New Security Paradigms Workshop (NSPW), Bertinoro, Italy, September 19–21, 2012.

Cyber Defenders Workshop on Legal, Policy, and Technical Realities for Cyber Space (Facilitator), Lawrence Livermore National Laboratory, Livermore, CA, July 12, 2012.

Insiders, Forensics, IDS, BFT, Elections, Ants, Turtles, and the Smart Grid, Lawrence Livermore National Laboratory, Livermore, CA, July 12, 2012.

"An Overview of LBNL Cybersecurity Research Capabilities" , Oak Ridge National Laboratory, Oak Ridge, TN, March 28, 2012.

"Health Informatics, Mobile Devices, and the 'Insider' Threat" , Sixth Annual Health Informatics Graduate Program Conference , University of California Davis School of Medicine, Sacramento, CA, March 23, 2012.

"Security Experiments on GENI" , 13th GENI Engineering Conference (GEC13) Los Angeles, CA, March 13, 2012.

"Computer Forensics and Cyber Crime" (Guest Lecture), Introduction to Forensic Science course, University of California, Davis Dept. of Environmental Toxicology, Davis, CA, March 5, 2012.

"Modeling & Simulation: A Path Forward" (Invited Talk, with Ed Talbot), Workshop on Future Modeling and Simulation (M & S) for Cyber-Security and Cyber-Physical Applications, Lawrence Livermore National Laboratory, Livermore, CA, March 2, 2012.

"Computer Forensics" (Guest Lecture), Scientific Evidence course, University of California, Davis School of Law (King Hall), Davis, CA, February 10, 2012.

"Quis Custodiet Ipsos Custodes? Sustainable Defenses Against Insider Threats" , Special Lecture Series in Computer Science, University of San Francisco, San Francisco, CA, January 25, 2012.

"Security in Health Informatics" , Health Informatics Program Seminar Series, University of California Davis School of Medicine, Sacramento, CA, January 11, 2012.

"Security in Health Informatics" (Guest Lecture), Introduction to Health Informatics course , University of California Davis School of Medicine, Sacramento, CA, November 21, 2011.

"Fingerprinting HPC Programs", I3P Consortium Meeting , Berkeley, CA, June 22, 2011.

"Smart Grid Security" (panel moderator), I3P Consortium Meeting , Berkeley, CA, June 22, 2011.

"Striking Back at the Privileged: Application-Based Monitoring for Deception, Policy, Specification, Forensics, and Automated Response" , Seminar on Insider Threats: Strategies for Prevention, Mitigation, and Response, Schloss Dagstuhl, Germany, August 23–26, 2010. (Abstract)

"Optimistic Access Control and Anticipatory Forensic Analysis of Insider Threats" , Seminar on Insider Threats: Strategies for Prevention, Mitigation, and Response, Schloss Dagstuhl, Germany, August 23–26, 2010. (Extended Abstract; Short Abstract in this PDF)

"Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms" (Panel/Paper Presentation), 2009 New Security Paradigms Workshop (NSPW), The Queen's College, Oxford, United Kingdom, September 8–11, 2009.

"E-Voting and Forensics: Prying Open the Black Box" (Paper Presentation), 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE), Montreal, Québec, Canada, August 10–11, 2009.

"Systematic Approaches to Forensic Analysis, the Insider Threat, Information Disclosure, and Auditing Elections", PARC (Palo Alto Research Center, Inc.), Palo Alto, CA, May 12, 2009.

"Systematic Approaches to Forensic Analysis, the Insider Threat, Information Disclosure, and Auditing Elections", Computational Research Division, Lawrence Berkeley National Laboratory, Berkeley, CA, April 28, 2009.

"Systematic Approaches to Forensic Analysis, the Insider Threat, Information Disclosure, and Auditing Elections", Computer Science Department, Naval Postgraduate School, Monterey, CA, April 23, 2009.

"A Systematic Approach to Forensic Analysis", SRI International, Menlo Park, CA, March 11, 2009.

"Systematic Approaches to Forensic Analysis, Information Disclosure, and Auditing Elections", Google Tech Talk, Google, Inc., Mountain View, CA, February 26, 2009.

"A Systematic Approach to Forensic Analysis", Sandia National Laboratories, Livermore, CA, February 4, 2009.

"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines" (Paper Presentation), Sean Peisert, Matt Bishop, and Alec Yasinsac, 42nd Hawaii International Conference on System Sciences (HICSS), Waikoloa, HI, January 5–8, 2009.

"Computer Science in Society: Electronic Voting, Computer Forensics, Law, and Regulation", 3rd Annual Basic and Advanced Science and Technology Academies of Research Symposium, Sacramento State University, Sacramento, CA, Septmeber 20, 2008.

"A Systematic Approach to Forensic Analysis", Pacific Northwest National Labs, Richland, WA, Septmeber 12, 2008.

"Improving the State of the Research Art in Analytics with Science", Pacific Northwest National Labs, Richland, WA, September 11, 2008.

"Security and Forensic Data and Analysis: Current and Future Challenges", UW-PNNL Cyber Analytics Workshop, Center for Information Assurance & Cybersecurity, University of Washington, Seattle, WA, September 9, 2008.

"A Model of Computer Forensic Logging and Analysis", Computer Science Department Seminar, Naval Postgraduate School, Monterey, CA, August 28, 2008. (Abstract; Video)

"Making Attack Analysis as Simple as Possible But No Simpler", Seminar on "Countering Insider Threats," Schloss Dagstuhl, Germany, July 20–25, 2008.

"A Systematic Approach to Security & Forensics", I3P Consortium Meeting , Seattle, WA, July 10, 2008.

Keynote Address: "Computer Forensics In Forensis", Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008) (held in conjunction with the 2008 IEEE Symposium on Security and Privacy), Oakland/Berkeley, CA, May 22, 2008.

"Toward Models for Forensic Analysis" (Paper Presentation), Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), Seattle, WA, April 2007.

"Forensic Analysis Through Goal-Oriented Logging", Computer Science Department Colloquium, University of California, Davis, Davis, CA, November 9, 2006.

"Practical Computer Forensics", Graduate Seminar on "Language-Based Security", School of Information and Computer Sciences, University of California, Irvine, Irvine, CA, February 22, 2006

"Principles-Driven Forensic Analysis" (Paper Presentation), Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, 2005 New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, September 2005.

"Computer Forensics and the Insider Problem" (Paper Presentation), San Diego Regional Internet Watch (SDRIW), San Diego, CA, October 19, 2004.

"Improving Forensic Analysis Through Transaction-Based Security", Orincon Corporation, San Diego, CA, September 4, 2003.

"Entrepreneurial Opportunities in Security Software" (Panel Speaker), San Diego Software Industry Council/CalNGI "Entrepreneur's Forum," San Diego Supercomputer Center, San Diego, CA, July 10, 2003.

"Security: Myths, Reality, Effectiveness, and ROI" (Invited Talk, with Abe Singer), San Diego Software Industry Council/CalNGI "Main Event," San Diego, CA, January 2003.

"A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors" , Lawrence Livermore National Laboratory CASC Division, Livermore, CA, June 2000.

Invited Tutorials

"Network Security: Myths, Reality, Tradeoffs and the Zen Art of Designing Secure Software and Networks" (Tutorial, with Abe Singer), 2003 NPACI All-Hands Meeting, San Diego, CA, March 2003.

"Performance Measuring on the IBM Blue Horizon and Sun HPC Systems" (Tutorial), NPACI Parallel Computing Institute 2000, San Diego, CA August 2000. , Sample source demonstrating assembly output on the Power3 with the xlc compiler: [tar], Example demonstrating getting cycles per second: [HTML]

"Performance Programming" (Two-Day Tutorial, with Larry Carter), Lawrence Livermore National Laboratory CASC Division, Livermore, CA, May 2000., Slides about Performance Tuning: [PDF], Slides about Timing: [PDF], Portions of these slides previously Copyright © 1998 by Alpern and Carter

"Then we learned about 'bullets' — little black circles in front of phrases that were supposed to summarize things.
There was one after another of these little goddamn bullets in our briefing books and on slides."
 
-Professor Richard P. Feynman, What Do You Care What Other People Think? (1988).


Last modified: Friday, 08-Dec-2023 11:36:56 PST