photoSven Dietrich

Professor
Computer Science Department
Hunter College, City University of New York (CUNY)
North Building, 10th floor, Room HN-1009
695 Park Ave
New York, NY 10065
Email: spock AT ieee DOT org / spock AT hunter DOT cuny DOT edu
Phone: +1-212-772-4939





CUNY Affiliations: CUNY Graduate Center (Doctoral Faculty, Computer Science Department), CUNY John Jay Center for Cybercrime Studies

Program Chair: SADFE 2020.
Program Committees: SecureComm 2021, DIMVA 2021, CSS 2021, CBT 2021, FC 2021, SADFE 2021, IEEE BigData 2020, IEEE WIFS 2020.
Steering Committees: IEEE Cybersecurity Initiative, DIMVA, SADFE, IEEE SPW (Security & Privacy Workshops).
Organizing Committees: IEEE Computer Society Board of Governors (2018), IEEE CS Conference Activities Committee.

Past Program Chair: DIMVA 2014 (London, UK, July 2014), 3rd Workshop on Ethics in Computer Security Research (WECSR 2012).
Past General Chair: Security and Privacy Workshops 2012.
Past Workshop Organizer: Network Attack Detection and Defense - Security Challenges and Opportunities of Software-Defined Networking, Ethics in Data Sharing.
Recent Program Committees: AsiaUSEC 2020 (at FC 2020), DIMVA 2019, CSET 2019, IEEE SPW SADFE 2018, DIMVA 2018, ESSoS 2018, Usenix CSET 2018, IEEE WIFS 2017, DIMVA 2017, Usenix CSET 2017, TRUST 2016, IEEE BigData 2016, WaTeR 2016, IEEE WIFS 2016, DIMVA 2016, ACSAC 2015, DIMVA 2015, FLAIRS-2015, WATeR 2014, IEEE BigData 2014, IEEE Big Data 2014, CSET 2014, DIMVA 2013, Kaspersky North American Round 2013TRUST 2012, ACSAC 2012, ESORICS 2012.
Recent Organizing Committees: IEEE CS Technical Activities Committee (Chair), IEEE CS Technical Committee on Security and Privacy (Chair Emeritus), International Financial Cryptography Association, 20th Anniversary Co-Chair for Financial Crypto 2016.

Brief Bio:

I joined the faculty in the Computer Science Department at Hunter College (CUNY) as Professor in August 2020. Prior to joining Hunter College, I was in the Mathematics and Computer Science department at CUNY John Jay as Associate Professor from 2014 to 2020, and in the Computer Science Department at the Stevens Institute of Technology as Assistant Professor from 2007 to 2014. I previously worked at CERT, located at Carnegie Mellon University, as a Senior Member of the Technical Staff from 2001 to 2007. I was also adjunct faculty at Carnegie Mellon's CyLab (2003-2007) and briefly in the Mathematics and Computer Science Department at Duquesne University in Spring 2007. I was also member of the CMU CyLab Usable Privacy & Security Laboratory (2006-2007). Prior to that, I was a Senior Security Architect at the NASA Goddard Space Flight Center (1997-2001).

Education:

          Doctor of Arts, Mathematics (with some significant work in Computer Science), Adelphi University
          MS, Mathematics, Adelphi University
          BS, Computer Science and Mathematics, Adelphi University

Research Interests:

My interests are in computer and network security, cryptography, anonymity, and privacy. In network security, my areas are in denial of service and malware (DDoS, botnets), and I have some interests in anti-phishing (I contributed to the technology in the anti-phishing startup Wombat Security Technologies). For cryptography, I look at cryptographic aspects of malware, and have interests in verification of cryptographic protocols.

Teaching:

          Fall 2021: CSCI 493/CSCI 795 Introduction to Computer Security (combined BS/MS-level) (Hunter College)
          Spring 2021: CSCI 335 Software Design and Analysis 3 (Hunter College)
          Fall 2020: CSc 81300 Software Security (CUNY Graduate Center)
          Spring 2020: CSc 80010 Research Survey (CUNY Graduate Center)
          Fall 2018 CSc 87100 Advanced Network Security and Malware (CUNY Graduate Center)
          Fall 2015: CSc 87100 Advanced Network Security and Malware (CUNY Graduate Center)
          Recent undergraduate courses taught: Cybersecurity Capstone I/II, Cryptography and Cryptanalysis, Advanced Data Structures
          Recent masters courses taught: Network Forensics, Architecture of Secure Operating Systems

Select publications:


Google Scholar page ; Researchgate page ; dblp page ; CSauthors page (my Erdős number is 4)

- V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities, by Seunghoon Woo, Dongwook Lee, Sunghan Park, Heejo Lee, Sven Dietrich. In Proceedings of the 30th USENIX Security Symposium (USENIX Security '21), August 2021. Local copy is here.
- QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection, by Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Seongbeom Park, Yoonjong Na, Jeremy Seideman, Shoufu Luo, Heejo Lee and Sven Dietrich. In Proceedings of the 36th IFIP TC-11 International Information Security and Privacy Conference (SEC 2021), pp. 66-82, Oslo, Norway, June 2021.
- Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces, by Patrick Duessel, Shoufu Luo, Ulrich Flegel, Sven Dietrich, and Michael Meier. In Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE 2020), pp. 22-31, New York, NY, May 2020.
- Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure, by Shoufu Luo, Jeremy D. Seideman and Sven Dietrich. In Proceedings of the 12th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2018), IEEE CS Security and Privacy Workshops, San Francisco, CA, May 2018.
- Cybersecurity and the Future, by Sven Dietrich, in IEEE Computer, Vol. 50 No. 4, p. 7, April 2017, ISSN: 0018:9162.
- Security Challenges and Opportunities of Software-Defined Networking, by Marc C. Dacier, Hartmut Koenig, Radoslaw Cwalinski, Frank Kargl, and Sven Dietrich, in IEEE Security and Privacy Magazine 15(2):98-102, March/April 2017, ISSN: 1540-7993.
- Who are you now? Fading to multiple personas, by Sven Dietrich, Michael Brenner, and Katharina Krombholz, in Proceedings of the WAY workshop at the 12th Symposium On Usable Privacy and Security (SOUPS) 2016, Denver, CO, June 2016.
- Detecting Zero-Day Attacks Using Context-Aware Anomaly Detection At The Application Layer, by Patrick Duessel, Christian Gehl, Ulrich Flegel, Sven Dietrich, and Michael Meier, in International Journal of Information Security 16(5):475-490, Springer Verlag, October 2017 (online July 2016). Local copy is here.
- Ethics of data sharing: a model for best practice, by Sven Dietrich, Jeroen van der Ham, Aiko Pras, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, and Lenore Zuck, in Proceedings of the 2014 Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS), IEEE CS Security & Privacy Workshops, San Jose, CA, May 2014.


- A Secure Submission System for Online Whistleblowing Platforms, by Volker Roth, Benjamin Gueldenring, Eleanor Rieffel, Sven Dietrich and Lars Ries, in Proceedings of Financial Cryptography and Data Security 2013, 8 pp, Springer LNCS 7859, April 2013. Extended version available at arXiv.org.

- Experiments in P2P botnet detection, by Lionel Riviere, Sven Dietrich, in IT Oldenbourg Journal, Special Issue on Reactive Security, it - Information Technology Vol. 54, No. 2, pp. 90-95, 04/2012. Local copy is here.

- SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster, by Theodore Reed, Joseph Geis, and Sven Dietrich, in Proceedings of the 5th Usenix Workshop on Offensive Technologies (WOOT 2011), August 2011. Project page is here.

- Building An Active Computer Security Ethics Community, by David Dittrich, Michael Bailey, and Sven Dietrich, IEEE Security and Privacy Magazine 9(4):32-40, July/August 2011, ISSN: 1540-7993.  Local copy is here.

- Friends of an Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts, with Baris Coskun, Nasir Memon, published in Proceedings of ACSAC 2010, December 2010. Acceptance rate: 17%.

- David Dittrich, Michael Bailey, Sven Dietrich. Towards Community Standards for Ethical Behavior in  Computer Security Research. Stevens CS Technical Report 2009-1, 20 April 2009. Most recent draft is here.

- David Dittrich, Sven Dietrich.  Discovery techniques for P2P botnets, Stevens CS Technical Report 2008-4, September 2008. Revised April 2009.

- David Dittrich, Sven Dietrich. P2P as botnet command and control: a deeper insight, in Proceedings of the 2008 3rd International Conference on Malicious and Unwanted Software (Malware), pp. 46-63, October 2008 ("Best Paper" award winner)

- Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher. Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, 2004.

Current students:
- Shoufu (Sean) Luo (PhD student, 2011-now)
- Jeremy Seideman (PhD student, 2016-now)

Former Visiting Scholars/Postdocs:

- Sebastian Schmerl (Fall 2010)

Former Students:

- Tadas Vilkeliskis (Technogenesis Undergraduate Summer Scholar, 2009)

- Rich Catena (Post-MS, 2008-2009)
- Ralph Mattiaccio (Summer Scholar, 2010-2011)
- Lionel Riviere (Visiting MS Student, 2011)
          - Sadia Akhter (PhD student, 2012-2014)
          - Neal Trischitta (Summer Scholar, 2012)
          - Patrick Duessel (PhD student, co-advised with Michael Meier, University of Bonn, defended July 2018)
          - Harrison Fernandez (Honors/PRISM undergraduate student, 2018-2019)

I am always looking for good undergraduate and graduate students interested in, among others, the research topics above and wanting to pursue a degree at CUNY Hunter College (undergraduate, masters) or at the CUNY Graduate Center (PhD in CS). If you think you are the right person, please send me a brief statement to that effect, your background, and what type of projects you might work on. Generic e-mails of the type "I'm interested in your research" without further explanation are unlikely to be answered. Internships are not generally offered.

More info:

- I was an affiliated professor at the Computer Science department at KAIST (2010-2013).


Last updated: August 27, 2021.