Adrian Perrig

Adrian Perrig (born 1972) is a Swiss computer science researcher and professor at ETH Zurich, leading the Network Security research group. His research focuses on networking and systems security, and specifically on the design of a secure next-generation internet architecture.

Biography

Born 1972, Perrig is a Swiss computer science researcher specialising in the areas of security, networking, and applied cryptography. He received his BSc degree in Computer Engineering from EPFL in 1997, MS and PhD degrees from Carnegie Mellon University in 1998 and 2001, respectively. He spent three years during his PhD working with his advisor Doug Tygar at the University of California, Berkeley. From 2002 to 2012, he was a Professor of Electrical and Computer Engineering, Engineering and Public Policy, and Computer Science (courtesy) at Carnegie Mellon University, becoming Full Professor in 2009. From 2007 to 2012, he served as the technical director for Carnegie Mellon's Cybersecurity Laboratory (CyLab). During this time he built a research project called SCI-FI (Secure Communications Infrastructure for a Future Internet). A research project aimed at building a next-generation secure internet architecture. The project later got renamed into SCION (Scalability, Control, and Isolation On Next-generation networks). Since 2013, he is Professor at ETH Zurich, leading the Network Security Group, whose research “revolves around building secure and robust network systems—with a particular focus on the design, development, and deployment of the SCION Internet architecture.".[1]

To commercialise the SCION technology, "Adrian Perrig in 2017 founded the ETH Zurich spin-off Anapaya Systems together with David Basin and Peter Müller, fellow professors at the Department of Computer Science".[2][3][4]

Main contributions

His work on TESLA,[5] a protocol for broadcast stream authentication has been standardised by the IETF[6] and ISO/IEC JTC 1[7], and is used by industry (e.g. Galileo SATNAV[8][9])

Perrig has worked on securing routing protocols in ad-hoc networks. The Ariadne,[10] and Packet Leashes[11] have had a lasting impact on the community. This work forms the basis for the ZigBee secure sensor communication standard and has had over 5000 citations.[12][13]

Starting in 2004, Perrig's research group has been studying hardware-based approaches leveraging the newly deployed TPM chip for trustworthy computing. The Flicker and TrustVisor systems (available open-source) were important early systems that guided attestation-based trusted computing research. With Bryan Parno and Jon McCune, Perrig published the introductory book Bootstrapping Trust in Modern Computers".[14]

Starting in 2003, his group proposed software-based attestation, also known as time-based attestation, a mechanism for performing attestation without special hardware support. Although initially met with resistance by the community, the systems stood the test of time (SWATT, PIONEER, SAKE, VIPER) and the research area was pursued by several research groups.

Awards

gollark: There's no day-night cycle, which you might find unpleasant. This can be solved by having a smaller inner ring which is only half filled in and doesn't spin. You can also stick solar panels on there for free power.
gollark: You'd shove land and ecosystems and whatever onto it and then live there with several million times the land area of Earth.
gollark: However, if you spin the entire thing very fast you can generate "gravity" centrifugally.
gollark: Without anything else going on, if you stood on the inner surface you'd fall into the star.
gollark: The original ringworld concept by Niven has a really big… ring… around a star.

References

  1. "Network Security Group, ETH Zurich". netsec.ethz.ch.
  2. "A secure internet isn't science fiction". inf.ethz.ch. Retrieved 2020-02-07.
  3. Network Security Group. "Network Security Group, ETH Zurich". netsec.ethz.ch. Retrieved 2020-02-07.
  4. "Our Spin-offs". inf.ethz.ch. Retrieved 2020-02-07.
  5. Perrig, Adrian; Tygar, J. D. (2003). "TESLA Broadcast Authentication": 29–53. doi:10.1007/978-1-4615-0229-6_3. Cite journal requires |journal= (help)
  6. https://www.ietf.org/rfc/rfc4082.txt
  7. https://www.iso.org/standard/73905.html
  8. Zubizarreta, Xabier (2018). "Receiver Independent Implementation of the Galileo Open Service Navigation Message Authentication". doi:10.31701/itsnt2018.24. Cite journal requires |journal= (help)
  9. https://www.gpsworld.com/directions-2020-galileo-moves-ahead/
  10. Hu, Yih-Chun; Johnson, David B.; Perrig, Adrian (2003). "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks". Ad Hoc Networks. 1 (1): 175–192. doi:10.1016/S1570-8705(03)00019-2. ISSN 1570-8705.
  11. Hu, Y.-C.; Perrig, A.; Johnson, D.B. (2003). "Packet leashes: a defense against wormhole attacks in wireless networks". 3: 1976–1986. doi:10.1109/INFCOM.2003.1209219. Cite journal requires |journal= (help)
  12. Perrig, Adrian; Szewczyk, Robert; Tygar, J.D.; Wen, Victor; Culler, David E. (2002). "SPINS: Security Protocols for Sensor Networks". Wireless Networks. 8 (5): 521–534. doi:10.1023/A:1016598314198. ISSN 1022-0038.
  13. "Adrian Perrig - Google Scholar Citations". scholar.google.com.
  14. Bootstrapping Trust in Modern Computers. 10. 2011. doi:10.1007/978-1-4614-1460-5. ISSN 2191-5768.
  15. "Award Abstract: Secure and Resilient Sensor Network Communication Infrastructure". National Science Foundation. Retrieved 2020-02-07.
  16. "Past Fellows". sloan.org. Retrieved 2020-02-07.
  17. "ACM SIGSAC Awards". www.sigsac.org. Retrieved 2020-02-07.
  18. "Adrian Perrig - Home". dl.acm.org. Retrieved 2020-02-07.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.