Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).
Activities and upcoming events that I'm involved with:
Dr. Sean Peisert leads applied research and development in computer security at the Berkeley Lab and UC Davis. He is also chief cybersecurity strategist for CENIC, and Senior Fellow at the Berkeley Institute for Data Science (BIDS), associate editor-in-chief and editor-in-chief designate of IEEE Security & Privacy, past chair of the IEEE Technical Committee on Security & Privacy, and past general chair of the 36th IEEE Symposium on Security and Privacy ("Oakland").
His current focus is research and development of techniques that enable secure and privacy-preserving analysis of scientific data and secure deep learning and artificial intelligence. His current projects focus on improving security in high-performance computing (HPC), and other scientific computing environments, and power grid control systems. In the past, he has worked in areas including intrusion detection, computer forensics, insider threats, fault tolerance, vulnerability analysis and elections and electronic voting.
Selected News and Press Coverage:
Jul. 10, 2020: Sean Peisert named editor-in-chief of IEEE Security and Privacy (IEEE CS | LBNL | UC Davis)
Oct. 24, 2019: Using Physics to Keep Our Electrical Grid Safe
October 26, 2018: Expert Q&A Safeguarding the Nation's Energy Infrastructure (TABL)
September 21, 2018 Electric grid protection through low-cost sensors, machine learning (GCN)
Security for High-Performance Computing / High-Throughput Networking
"Security in High-Performance Computing Environments," Sean Peisert, Communications of the ACM (CACM), 60(9) 72–80, September 2017.
ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.
ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.
"Multiclass Classification of Distributed Memory Parallel Computations," Sean Whalen, Sean Peisert, and Matt Bishop, Pattern Recognition Letters (PRL), 34(3), pp. 322–329, February 2013.
Control System / Power Grid Cybersecurity
"Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization," Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran Roberts, Anna Scaglione, and Sean Peisert, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Communications and Data Analytics in Smart Grid, 38(1), pp. 180–192, November 6, 2019.
“Detecting Manipulation of Power Distribution System Control Devices,” Ciaran Roberts, Daniel Arnold, Mahdi Jamei, Anna Scaglione, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, and Alex McEachern, IEEE Transactions on Smart Grid, 11(1), pp. 749–761, 19 August, 2019.
“Detecting Programmable Logic Controller Code Using Machine Learning,” Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert, International Journal of Critical Infrastructure Protection, vol. 26, 100306, September 2019.
“Anomaly Detection Using μPMU Measurements in Distribution Grids,” Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern, IEEE Transactions on Power Systems, October 25, 2017.
"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.
"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.
Assured System Design
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing," Sean Peisert, Matt Bishop, and Ed Talbot, Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2–4, 2017.
"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.
"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration," Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang, Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, December 15–19, 2014.
Security Experimentation / Science of Computer Security
"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.
"Computer Forensics In Forensis", Sean Peisert, Matt Bishop, and Keith Marzullo, Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, May 2008.
"Analysis of Computer Intrusions Using Sequences of Function Calls," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007.
"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.
Phone: (530) 746-8717
Last modified: Wednesday, 22-Jul-2020 10:18:00 PDT