Doctor of Arts, Mathematics, Adelphi University
Master of Science, Mathematics, Adelphi University
Bachelor of Science, Computer Science and Mathematics, Adelphi University
Sven Dietrich is an associate professor in the mathematics and computer science department at the John Jay College of Criminal Justice of the City University of New York in New York City. Prior to joining John Jay in August 2014, he was an assistant professor in the computer science department at Stevens Institute of Technology. Prior to joining Stevens in 2007, he was a Senior Member of the Technical Staff at CERT Research at Carnegie Mellon University and also held an appointment at the Carnegie Mellon University CyLab, a university-wide cybersecurity research and education initiative. He taught cryptography in the Mathematics and Computer Science Department at Duquesne University in Spring 2007. From 1997 to 2001, he was a senior security architect at the NASA Goddard Space Flight Center, where he observed and analyzed the first distributed denial-of-service attacks against theUniversity of Minnesota in 1999. He taught Mathematics and Computer Science as adjunct faculty at Adelphi University, his alma mater, from 1991 to 1997. His teaching and research interests include computer and network security, anonymity, cryptographic protocols, and cryptography. His previous work has included a formal analysis of the secure sockets layer protocol (SSL), intrusion detection, analysis of distributed denial-of-service tools, and the security of IPcommunications in space. His publications include the book Internet Denial of Service: Attack and Defense Mechanisms (Prentice Hall, 2004), as well as articles on secure whistleblowing, botnets and some on ethics in the context ofcomputer security research and data sharing.
Sven Dietrich has a Bachelor of Science degree in Computer Science and Mathematics, a Master of Science degree in Mathematics, and a Doctor of Arts degree in Mathematics, all from Adelphi University. He is a senior member of the IEEE, a Golden Core member of the IEEE Computer Society, a member of the ACM, a former Chair of the IEEE Computer Society Technical Committee on Security and Privacy, a former Chair of the Technical Activities Committee in the IEEE Computer Society, and a former member of the IEEE Computer Society Board of Governors. He is the recipient of the Outstanding Community Service Award from the IEEE Computer Society Technical Committee on Security and Privacy. He has been Program Chair for the 11th conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014, London, United Kingdom), and a co-organizer for a Dagstuhl seminar on Network Attacks and Defenses in Software-Defined Networks in 2016.
- Internet Denial of Service: Attack and Defense Mechanisms, Jelena Mirkovic, Sven Dietrich, David Dittrich, and Peter Reiher, Prentice Hall, 2004.
- Ethics of data sharing: a model for best practice, by Sven Dietrich, Jeroen van der Ham, Aiko Pras, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, and Lenore Zuck, in Proceedings of the 2014 Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS), IEEE CS Security & Privacy Workshops, San Jose, CA, May 2014.
- A Secure Submission System for Online Whistleblowing Platforms, by Volker Roth, Benjamin Gueldenring, Eleanor Rieffel, Sven Dietrich and Lars Ries, in Proceedings of Financial Cryptography and Data Security 2013, 8 pp, Springer LNCS 7859, April 2013. Extended version available at arXiv.org.
- Experiments in P2P botnet detection, by Lionel Riviere, Sven Dietrich, in IT Oldenbourg Journal, Special Issue on Reactive Security, it - Information Technology Vol. 54, No. 2, pp. 90-95, 04/2012.
- SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster, by Theodore Reed, Joseph Geis, and Sven Dietrich, in Proceedings of the 5th Usenix Workshop on Offensive Technologies (WOOT 2011), August 2011.
- Building An Active Computer Security Ethics Community, by David Dittrich, Michael Bailey, and Sven Dietrich, IEEE Security and Privacy Magazine, July/August 2011.
- Friends of an Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts, with Baris Coskun, Nasir Memon, published in Proceedings of ACSAC 2010, December 2010.
- A Formal Analysis of the Secure Sockets Layer Protocol.
Applied cryptography, systems security, distributed denial of service, botnets, malware, privacy.