Sean Peisert

Home Page

Publications

Research Projects

Software

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

News

Bio

Life

Links


Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).


Activities and upcoming events that I'm involved with:

IEEE Security & Privacy (ongoing)

NSA SoS Best Paper (winners announced Fall 2020)

IEEE S&P (Oakland) 2021 (May 23–27, 2021)

CSET 2021 (August 2021)

NSPW 2021 (October 2021)

NSF Cybersecurity Summit (2021)

 
 
Image of Sean Peisert  
Staff Scientist,
Data Science and Technology Dept., Lawrence Berkeley National Laboratory

Associate Adjunct Professor,
Dept. of Computer Science, University of California, Davis

Associate Adjunct Professor,
Div. of Health Informatics, University of California, Davis School of Medicine

Chief Cybersecurity Strategist,
Corporation for Education Network Initiatives in California (CENIC)


Dr. Sean Peisert leads applied research and development in computer security at the Berkeley Lab and UC Davis. He is also chief cybersecurity strategist for CENIC, associate editor-in-chief and editor-in-chief designate of IEEE Security & Privacy, past chair of the IEEE Technical Committee on Security & Privacy, and past general chair of the 36th IEEE Symposium on Security and Privacy ("Oakland").

His current focus is research and development of techniques that enable secure and privacy-preserving analysis of scientific data and secure deep learning and artificial intelligence. His current projects focus on improving security in high-performance computing (HPC), and other scientific computing environments, and power grid control systems. In the past, he has worked in areas including intrusion detection, computer forensics, insider threats, fault tolerance, vulnerability analysis and elections and electronic voting.

At CENIC, he is responsible for cybersecurity strategy and implementation for CENIC's enterprise as well as for the CalREN network backbone.

He also teaches and advises graduate students. He occasionally consults.

He received his Ph.D., Masters and Bachelors degrees in Computer Science from the University of California, San Diego (UCSD).

A full professional bio is here and a slightly outdated one is in the Berkeley Lab Expert's Guide.

Selected News and Press Coverage:

Oct. 21, 2020: Summer Students Tackle COVID-19

Sept. 10, 2020: Data Confidentiality Issues and Solutions in Academic Research Computing (Trusted CI Blog)

Jul. 10, 2020: Sean Peisert named editor-in-chief of IEEE Security and Privacy (IEEE CS | LBNL | UC Davis)

Jun. 23, 2020: Fantastic Bits and Why They Flip (Trusted CI Blog)

Oct. 24, 2019: Using Physics to Keep Our Electrical Grid Safe

Sept. 29, 2019: Impact of AI in DOE National Laboratories (YouTube video) (security discussion at 1'07")

April 30, 2019: Cyberattacks threaten smart inverters, but scientists have solutions (Solar Power World)

December 4, 2018: Berkeley Lab Cybersecurity Specialist Highlights Data Sharing Benefits, Challenges at NAS Meeting

October 26, 2018: Expert Q&A Safeguarding the Nation's Energy Infrastructure (TABL)

September 21, 2018 Electric grid protection through low-cost sensors, machine learning (GCN)

March 27, 2018: Cyber Defense Tool Is an Early Warning System for Grid Attacks (IEEE Spectrum Blog)

August 24, 2017: Berkeley Lab's cybersecurity expert Sean Peisert discusses challenges & opportunities of securing HPC

HPC security article in Communications of the ACM

Video accompanying HPC security article on Vimeo

FULL NEWS LISTING

PAST STUDENT NEWS

Selected Publications:

Security for High-Performance Computing / High-Throughput Networking

"Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments," Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, and Sean Peisert,)," arXiv preprint arXiv:2010.13216, 25 Oct 2020.

"The Medical Science DMZ: An Network Design Pattern for Data-Intensive Medical Science," Sean Peisert, Eli Dart, William K. Barnett, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, and Brian Tierney, Journal of the American Medical Informatics Association (JAMIA), 25(3), pp. 267–274, March 2018.

"Security in High-Performance Computing Environments," Sean Peisert, Communications of the ACM (CACM), 60(9) 72–80, September 2017.

ASCR Cybersecurity for Scientific Computing Integrity — Research Pathways and Ideas, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-191105, September, 2015.

ASCR Cybersecurity for Scientific Computing Integrity, Sean Peisert, et al., U.S. Department of Energy Office of Science report, LBNL-6953E, February, 2015.

"Multiclass Classification of Distributed Memory Parallel Computations," Sean Whalen, Sean Peisert, and Matt Bishop, Pattern Recognition Letters (PRL), 34(3), pp. 322–329, February 2013.

Control System / Power Grid Cybersecurity

"Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization," Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran Roberts, Anna Scaglione, and Sean Peisert, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Communications and Data Analytics in Smart Grid, 38(1), pp. 180–192, November 6, 2019.

Detecting Manipulation of Power Distribution System Control Devices,” Ciaran Roberts, Daniel Arnold, Mahdi Jamei, Anna Scaglione, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, and Alex McEachern, IEEE Transactions on Smart Grid, 11(1), pp. 749–761, 19 August, 2019.

Detecting Programmable Logic Controller Code Using Machine Learning,” Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert, International Journal of Critical Infrastructure Protection, vol. 26, 100306, September 2019.

Anomaly Detection Using μPMU Measurements in Distribution Grids,” Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern, IEEE Transactions on Power Systems, October 25, 2017.

"Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security," Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex McEachern, IEEE Internet Computing, 20(5):18–27, Sept./Oct. 2016.

"Monitoring Security of Networked Control Systems: It's the Physics," Chuck McParland, Sean Peisert, and Anna Scaglione, IEEE Security and Privacy,12(6):32–39, November/December 2014.

Assured System Design

A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing," Sean Peisert, Matt Bishop, and Ed Talbot, Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2–4, 2017.

"Principles of Authentication," Sean Peisert, Ed Talbot, and Tom Kroeger, Proceedings of the 2013 New Security Paradigms Workshop (NSPW), pp. 47–56, September 9–12, 2013.

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," Sean Peisert, Ed Talbot, and Matt Bishop, Proceedings of the 2012 New Security Paradigms Workshop (NSPW), pp. 15–26, September 19–21, 2012.

Fault Tolerance

"BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration," Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang, Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), pp. 91–106, December 15–19, 2014.

Security Experimentation / Science of Computer Security

"How to Design Computer Security Experiments," Sean Peisert and Matt Bishop, Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141–148, June 2007.

Computer Forensics

"Computer Forensics In Forensis", Sean Peisert, Matt Bishop, and Keith Marzullo, Proceedings of the Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008), pp. 102–122, May 2008.

"Analysis of Computer Intrusions Using Sequences of Function Calls," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137–150, April-June 2007.

"Toward Models for Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 3–15, April 2007.

"Principles-Driven Forensic Analysis," Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pp. 85–93, September 2005.

ORCID iD iconhttps://orcid.org/0000-0003-3566-9719

FULL PUBLICATION LIST

Contact Info

Mail:
Dept. of Computer Science
University of California, Davis
One Shields Ave.
Davis, CA 95616-8562

Email: speisert@ucdavis.edu (PGP/GPG Key)

Phone: (530) 746-8717

Office Location: 2089 Academic Surge (directions)


Last modified: Thursday, 12-Nov-2020 09:38:27 PST