Sean Peisert

Home Page


Research Projects


Talks and Tutorials

Professional Service


Students & Postdocs





Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).

Activities and upcoming events that I'm involved with:

IEEE Security & Privacy (ongoing)

NSA SoS Best Paper Competition (annually)

IEEE Cybersecurity Award for Practice (nominations due Sep. 10, 2021)

NSF Cybersecurity Summit (Oct. 12–13, 2021)

NSPW 2021 (October 25–28, 2021)

IEEE S&P (Oakland) 2022 (May 22–26, 2022)

CSET 2022 (August 2022)

Image of Sean Peisert  
Staff Scientist,
Computational Research Division, Lawrence Berkeley National Laboratory

Adjunct Professor,
Dept. of Computer Science, University of California, Davis

Adjunct Professor,
Div. of Health Informatics, University of California, Davis School of Medicine

Dr. Sean Peisert leads applied research and development in computer security at the Berkeley Lab and UC Davis. He is also chief cybersecurity strategist for CENIC; co-lead of Trusted CI, the NSF Cybersecurity Center of Excellence; editor-in-chief of IEEE Security & Privacy; a member of the Distinguished Expert Review Panel for the NSA Annual Best Scientific Cybersecurity Paper Competition; a member of the DARPA Information Science and Technology (ISAT) Study Group; an ACSA Fellow; past chair of the IEEE Technical Committee on Security & Privacy' and is a steering committee member and past general chair of the IEEE Symposium on Security and Privacy ("Oakland").

His current focus is research and development of techniques that enable secure and privacy-preserving analysis of scientific data. His current projects focus on improving security in high-performance computing (HPC), and other scientific computing environments, and power grid control systems.

In the past, he has worked in areas including intrusion detection, computer forensics, insider threats, fault tolerance, vulnerability analysis and elections and electronic voting.

He also teaches and advises graduate students. He occasionally consults.

He received his Ph.D., Masters and Bachelors degrees in Computer Science from the University of California, San Diego (UCSD).

A full professional bio is here and a slightly outdated one is in the Berkeley Lab Expert's Guide.

Selected News and Press Coverage:

Aug. 3, 2021: Trusted CI new co-PIs: Peisert and Shute (Trusted CI Blog)

Aug. 3, 2021: Initial Findings of the 2021 Trusted CI Annual Challenge on Software Assurance (Trusted CI Blog)

Jun. 16, 2021: Sean Peisert Named to DARPA ISAT Study Group

Jun. 7, 2021: CIGAR 'Smokes Out' Attacks on Solar Electrical Power Equipment

Mar. 30, 2021: Announcing the 2021 Trusted CI Annual Challenge on Software Assurance (Trusted CI Blog)

Oct. 21, 2020: Summer Students Tackle COVID-19

Sept. 10, 2020: Data Confidentiality Issues and Solutions in Academic Research Computing (Trusted CI Blog)

Jul. 10, 2020: Sean Peisert named editor-in-chief of IEEE Security and Privacy (IEEE CS | LBNL | UC Davis)

Jun. 23, 2020: Fantastic Bits and Why They Flip (Trusted CI Blog)

Oct. 24, 2019: Using Physics to Keep Our Electrical Grid Safe

Sept. 29, 2019: Impact of AI in DOE National Laboratories (YouTube video) (security discussion at 1'07")

April 30, 2019: Cyberattacks threaten smart inverters, but scientists have solutions (Solar Power World)

December 4, 2018: Berkeley Lab Cybersecurity Specialist Highlights Data Sharing Benefits, Challenges at NAS Meeting

October 26, 2018: Expert Q&A; Safeguarding the Nation's Energy Infrastructure (TABL)

September 21, 2018 Electric grid protection through low-cost sensors, machine learning (GCN)

March 27, 2018: Cyber Defense Tool Is an Early Warning System for Grid Attacks (IEEE Spectrum Blog)

August 24, 2017: Berkeley Lab's cybersecurity expert Sean Peisert discusses challenges & opportunities of securing HPC

HPC security article in Communications of the ACM

Video accompanying HPC security article on Vimeo



Selected Publications:

Security for High-Performance Computing / High-Throughput Networking

Trustworthy Scientific Computing," Sean Peisert, Communications of the ACM (CACM), 64(5):18–21, May 2021.

"Performance Analysis of Scientific Computing Workloads on General Purpose TEEs," Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, and Sean Peisert, Proceedings of the 35th IEEE International Parallel & Distributed Processing Symposium (IPDPS), May 17–21, 2021. [arXiv version]

"The Medical Science DMZ: An Network Design Pattern for Data-Intensive Medical Science," Sean Peisert, Eli Dart, William K. Barnett, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), 25(3), pp. 267–274, March 2018.

"Security in High-Performance Computing Environments," Sean Peisert, Communications of the ACM (CACM), 60(9):72–80, September 2017.

ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.

ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.

"Multiclass Classification of Distributed Memory Parallel Computations," Sean Whalen, Sean Peisert, and Matt Bishop, Pattern Recognition Letters (PRL), 34(3), pp. 322–329, February 2013.

Control System / Power Grid Cybersecurity

"Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization," Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran Roberts, Anna Scaglione, and Sean Peisert, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Communications and Data Analytics in Smart Grid, 38(1), pp. 180–192, November 6, 2019.

Detecting Manipulation of Power Distribution System Control Devices,” Ciaran Roberts, Daniel Arnold, Mahdi Jamei, Anna Scaglione, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, and Alex McEachern, IEEE Transactions on Smart Grid, 11(1), pp. 749–761, 19 August, 2019.

Detecting Programmable Logic Controller Code Using Machine Learning,” Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert, International Journal of Critical Infrastructure Protection, vol. 26, 100306, September 2019.

Anomaly Detection Using μPMU Measurements in Distribution Grids,” Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern, IEEE Transactions on Power Systems, October 25, 2017.

"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.

"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.

Assured System Design

A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing," Sean Peisert, Matt Bishop, and Ed Talbot, Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2–4, 2017.

"Principles of Authentication," Sean Peisert, Ed Talbot, and Tom Kroeger, Proceedings of the 2013 New Security Paradigms Workshop (NSPW), pp. 47–56, September 9–12, 2013.

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.

Elections and Voting

"A Comprehensive Framework for Using Iterative Analysis to Improve Human-Intensive Process Security: An Election Example," Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, and Sean Peisert, ACM Transactions on Privacy and Security (TOPS), 20(2), March 2017.

"Security and Elections," Matt Bishop and Sean Peisert, IEEE Security and Privacy,10(5), pp. 64–67, Sept.-Oct. 2012.

"E-Voting and Forensics: Prying Open the Black Box," Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson, Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE), Montreal, Canada, August 10–11, 2009.

"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines," Sean Peisert, Matt Bishop, and Alec Yasinsac, Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), January 5–8, 2009.

"Resolving the Unexpected in Elections: Election Officials' Options," Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert, October 8, 2008.

Fault Tolerance

"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration," Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang, Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, December 15–19, 2014.

Security Experimentation / Science of Computer Security

"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.

Computer Forensics

"Computer Forensics In Forensis", Sean Peisert, Matt Bishop, and Keith Marzullo, Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, May 2008.

"Analysis of Computer Intrusions Using Sequences of Function Calls," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007.

"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.

"Principles-Driven Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pp. 85–93, September 2005.

ORCID iD icon


Contact Info

Dept. of Computer Science
University of California, Davis
One Shields Ave.
Davis, CA 95616-8562

Email: (PGP/GPG Key)

Phone: (530) 746-8717

Last modified: Friday, 06-Aug-2021 15:09:36 PDT