Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).
Activities and upcoming events that I'm involved with:
Dr. Sean Peisert leads applied research and development in computer security at the Berkeley Lab and UC Davis. He is also chief cybersecurity strategist for CENIC, editor-in-chief of IEEE Security & Privacy, a member of the Distinguished Expert Review Panel for the NSA Annual Best Scientific Cybersecurity Paper Competition, past chair of the IEEE Technical Committee on Security & Privacy, and is a steering committee member and past general chair of the IEEE Symposium on Security and Privacy ("Oakland").
His current focus is research and development of techniques that enable secure and privacy-preserving analysis of scientific data and secure deep learning and artificial intelligence. His current projects focus on improving security in high-performance computing (HPC), and other scientific computing environments, and power grid control systems. He is also a co-lead of Trusted CI, the NSF Cybersecurity Center of Excellence.
Selected News and Press Coverage:
Oct. 21, 2020: Summer Students Tackle COVID-19
Jul. 10, 2020: Sean Peisert named editor-in-chief of IEEE Security and Privacy (IEEE CS | LBNL | UC Davis)
Jun. 23, 2020: Fantastic Bits and Why They Flip (Trusted CI Blog)
Oct. 24, 2019: Using Physics to Keep Our Electrical Grid Safe
October 26, 2018: Expert Q&A Safeguarding the Nation's Energy Infrastructure (TABL)
September 21, 2018 Electric grid protection through low-cost sensors, machine learning (GCN)
Security for High-Performance Computing / High-Throughput Networking
"Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments," Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, and Sean Peisert,)," arXiv preprint arXiv:2010.13216, 25 Oct 2020.
"The Medical Science DMZ: An Network Design Pattern for Data-Intensive Medical Science," Sean Peisert, Eli Dart, William K. Barnett, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), 25(3), pp. 267–274, March 2018.
"Security in High-Performance Computing Environments," Sean Peisert, Communications of the ACM (CACM), 60(9) 72–80, September 2017.
ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.
ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.
"Multiclass Classification of Distributed Memory Parallel Computations," Sean Whalen, Sean Peisert, and Matt Bishop, Pattern Recognition Letters (PRL), 34(3), pp. 322–329, February 2013.
Control System / Power Grid Cybersecurity
"Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization," Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran Roberts, Anna Scaglione, and Sean Peisert, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Communications and Data Analytics in Smart Grid, 38(1), pp. 180–192, November 6, 2019.
“Detecting Manipulation of Power Distribution System Control Devices,” Ciaran Roberts, Daniel Arnold, Mahdi Jamei, Anna Scaglione, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, and Alex McEachern, IEEE Transactions on Smart Grid, 11(1), pp. 749–761, 19 August, 2019.
“Detecting Programmable Logic Controller Code Using Machine Learning,” Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert, International Journal of Critical Infrastructure Protection, vol. 26, 100306, September 2019.
“Anomaly Detection Using μPMU Measurements in Distribution Grids,” Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern, IEEE Transactions on Power Systems, October 25, 2017.
"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.
"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.
Assured System Design
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing," Sean Peisert, Matt Bishop, and Ed Talbot, Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2–4, 2017.
"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.
Elections and Voting
"A Comprehensive Framework for Using Iterative Analysis to Improve Human-Intensive Process Security: An Election Example," Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, and Sean Peisert, ACM Transactions on Privacy and Security (TOPS), 20(2), March 2017.
"E-Voting and Forensics: Prying Open the Black Box," Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson, Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE), Montreal, Canada, August 10–11, 2009.
"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines," Sean Peisert, Matt Bishop, and Alec Yasinsac, Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), January 5–8, 2009.
"Resolving the Unexpected in Elections: Election Officials' Options," Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert, October 8, 2008.
"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration," Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang, Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, December 15–19, 2014.
Security Experimentation / Science of Computer Security
"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.
"Computer Forensics In Forensis", Sean Peisert, Matt Bishop, and Keith Marzullo, Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, May 2008.
"Analysis of Computer Intrusions Using Sequences of Function Calls," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007.
"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.
Phone: (530) 746-8717
Last modified: Wednesday, 06-Jan-2021 10:31:51 PST