Adrian Perrig (born 1972) is a Swiss computer science researcher and professor at ETH Zurich, leading the Network Security research group. His research focuses on networking and systems security, and specifically on the design of a secure next-generation internet architecture.
Biography
Born 1972, Perrig is a Swiss computer science researcher specialising in the areas of security, networking, and applied cryptography. He received his BSc degree in Computer Engineering from EPFL in 1997, MS and PhD degrees from Carnegie Mellon University in 1998 and 2001, respectively. He spent three years during his PhD working with his advisor Doug Tygar at the University of California, Berkeley. From 2002 to 2012, he was a Professor of Electrical and Computer Engineering, Engineering and Public Policy, and Computer Science (courtesy) at Carnegie Mellon University, becoming Full Professor in 2009. From 2007 to 2012, he served as the technical director for Carnegie Mellon's Cybersecurity Laboratory (CyLab). During this time he built a research project called SCI-FI (Secure Communications Infrastructure for a Future Internet). A research project aimed at building a next-generation secure internet architecture. The project later got renamed into SCION (Scalability, Control, and Isolation On Next-generation networks). Since 2013, he is Professor at ETH Zurich, leading the Network Security Group, whose research “revolves around building secure and robust network systems—with a particular focus on the design, development, and deployment of the SCION Internet architecture.".[1]
To commercialise the SCION technology, Adrian Perrig in 2017 founded the ETH Zurich spin-off Anapaya Systems together with Samuel Hitz and fellow professors at the Department of Computer Science David Basin and Peter Müller".[2][3][4]
Main contributions
His work on TESLA,[5] a protocol for broadcast stream authentication has been standardised by the IETF[6] and ISO/IEC JTC 1,[7] and is used by industry (e.g. Galileo SATNAV[8][9])
Perrig has worked on securing routing protocols in ad hoc networks. The Ariadne,[10] and Packet Leashes[11] have had a lasting impact on the community. This work forms the basis for the Zigbee secure sensor communication standard and has had over 5000 citations.[12][13]
Starting in 2004, Perrig's research group has been studying hardware-based approaches leveraging the newly deployed TPM chip for trustworthy computing. The Flicker and TrustVisor systems (available open-source) were important early systems that guided attestation-based trusted computing research. With Bryan Parno and Jon McCune, Perrig published the introductory book Bootstrapping Trust in Modern Computers".[14]
Starting in 2003, his group proposed software-based attestation, also known as time-based attestation, a mechanism for performing attestation without special hardware support. Although initially met with resistance by the community, the systems stood the test of time (SWATT, PIONEER, SAKE, VIPER) and the research area was pursued by several research groups.
Since 2013, Perrig and his Network Security group at ETH Zürich further develop and introduce new components to the SCION architecture.
Awards
- 2004: NSF CAREER Award[15]
- 2006: Sloan Research Fellowship[16]
- 2011: Benjamin Richard Teare teaching award
- 2013: ACM SIGSAC Outstanding Innovation Award[17]
- 2017: ACM Fellow[18]
- 2020: IEEE Symposium on Security and Privacy, won 4 test of time awards[19]
References
- ↑ "Network Security Group, ETH Zurich". netsec.ethz.ch.
- ↑ "A secure internet isn't science fiction". inf.ethz.ch. Retrieved 2020-02-07.
- ↑ Network Security Group. "Network Security Group, ETH Zurich". netsec.ethz.ch. Retrieved 2020-02-07.
- ↑ "Our Spin-offs". inf.ethz.ch. Retrieved 2020-02-07.
- ↑ Perrig, Adrian; Tygar, J. D. (2003). "TESLA Broadcast Authentication". Secure Broadcast Communication. pp. 29–53. doi:10.1007/978-1-4615-0229-6_3. ISBN 978-1-4613-4976-1.
- ↑ "Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction". IETF. June 2005. RFC 4082.
- ↑ "Iso/Iec 29192-7:2019".
- ↑ Zubizarreta, Xabier (2018). "Receiver Independent Implementation of the Galileo Open Service Navigation Message Authentication". International Technical Symposium on Navigation and Timing 2018. doi:10.31701/itsnt2018.24.
- ↑ "Directions 2020: Galileo Moves Ahead". 15 December 2019.
- ↑ Hu, Yih-Chun; Johnson, David B.; Perrig, Adrian (2003). "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks". Ad Hoc Networks. 1 (1): 175–192. doi:10.1016/S1570-8705(03)00019-2. ISSN 1570-8705.
- ↑ Hu, Y.-C.; Perrig, A.; Johnson, D.B. (2003). "Packet leashes: a defense against wormhole attacks in wireless networks". IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428). Vol. 3. pp. 1976–1986. doi:10.1109/INFCOM.2003.1209219. ISBN 0-7803-7752-4. S2CID 1132959.
- ↑ Perrig, Adrian; Szewczyk, Robert; Tygar, J.D.; Wen, Victor; Culler, David E. (2002). "SPINS: Security Protocols for Sensor Networks". Wireless Networks. 8 (5): 521–534. doi:10.1023/A:1016598314198. ISSN 1022-0038. S2CID 219910305.
- ↑ "Adrian Perrig - Google Scholar Citations". scholar.google.com.
- ↑ Bootstrapping Trust in Modern Computers. SpringerBriefs in Computer Science. Vol. 10. 2011. doi:10.1007/978-1-4614-1460-5. ISBN 978-1-4614-1459-9. ISSN 2191-5768.
- ↑ "Award Abstract: Secure and Resilient Sensor Network Communication Infrastructure". National Science Foundation. Archived from the original on 2022-01-20. Retrieved 2020-02-07.
- ↑ "Past Fellows". sloan.org. Retrieved 2020-02-07.
- ↑ "ACM SIGSAC Awards". www.sigsac.org. Retrieved 2020-02-07.
- ↑ "Adrian Perrig - Home". dl.acm.org. Retrieved 2020-02-07.
- ↑ "41st IEEE Symposium on Security and Privacy".