photoSven Dietrich

Associate Professor
Mathematics and Computer Science Department
John Jay College of Criminal Justice
City University of New York (CUNY)
524 West 59th Street, Room 06.65.13NB
New York, NY 10019
Email: spock AT ieee DOT org
Phone: +1-212-393-6839

CUNY Affiliations: CUNY Graduate Center (Doctoral Faculty, Computer Science Department), CUNY John Jay Center for Cybercrime Studies, CUNY John Jay Digital Forensics and Cybersecurity Master's Program
CUNY John Jay Roles:
Department of Mathematics and Computer Science: Major Coordinator for Computer Science and Information Security, Member of Curriculum Committee.
College: Member of Faculty Senate,  Member of College Council, Member of Executive Committee for College Council, Faculty Advisor for CUNY John Jay Computer Science Society.

Program Committees: IEEE SPW SADFE 2018, DIMVA 2018, ESSoS 2018, Usenix CSET 2018.
Steering Committees: IEEE Cybersecurity Initiative, DIMVA.
Organizing Committees: IEEE Computer Society Board of Governors (2018), IEEE CS Conference Activities Committee.

Past Program Chair: DIMVA 2014 (London, UK, July 2014), 3rd Workshop on Ethics in Computer Security Research (WECSR 2012).
Past General Chair: Security and Privacy Workshops 2012.
Past Workshop Organizer: Network Attack Detection and Defense - Security Challenges and Opportunities of Software-Defined Networking, Ethics in Data Sharing.
Recent Program Committees: IEEE WIFS 2017, DIMVA 2017, Usenix CSET 2017, TRUST 2016, IEEE BigData 2016, WaTeR 2016, IEEE WIFS 2016, DIMVA 2016, ACSAC 2015, DIMVA 2015, FLAIRS-2015, WATeR 2014, IEEE BigData 2014, IEEE Big Data 2014, CSET 2014, DIMVA 2013, Kaspersky North American Round 2013TRUST 2012, ACSAC 2012, ESORICS 2012.
Recent Organizing Committees: IEEE CS Technical Activities Committee (Chair), IEEE CS Technical Committee on Security and Privacy (Chair Emeritus), International Financial Cryptography Association, 20th Anniversary Co-Chair for Financial Crypto 2016.

Brief Bio:

I joined the faculty in the Mathematics and Computer Science Department at CUNY John Jay as Associate Professor in August 2014. Prior to joining CUNY John Jay, I was in the Computer Science Department at the Stevens Institute of Technology as Assistant Professor from 2007 to 2014. I previously worked at CERT, located at Carnegie Mellon University, as a Senior Member of the Technical Staff from 2001 to 2007. I was also adjunct faculty at Carnegie Mellon's CyLab (2003-2007) and briefly in the Mathematics and Computer Science Department at Duquesne University in Spring 2007. I was also member of the CMU CyLab Usable Privacy & Security Laboratory (2006-2007). Prior to that, I was a Senior Security Architect at the NASA Goddard Space Flight Center (1997-2001).

Research Interests:

My interests are in computer and network security, cryptography, anonymity, and privacy. In network security, my areas are in denial of service and malware (DDoS, botnets), and I have some interests in anti-phishing (I contributed to the technology in the anti-phishing startup Wombat Security Technologies). For cryptography, I look at cryptographic aspects of malware, and have interests in verification of cryptographic protocols.


          Fall 2018: CSCI 400 Capstone in Cybersecurity I, CSc 87100 Advanced Network Security and Malware (CUNY Graduate Center)
          Fall 2017: CSCI 400 Capstone in Cybersecurity I
          Spring 2017: CSCI 401 Capstone in Cybersecurity II
Fall 2016: CSCI 400 Capstone Course in Cybersecurity I, FCM 745 Network Forensics
Spring 2016: CSCI 401 Capstone Course in Cybersecurity II (formerly CSCI 404), CSCI 360 Cryptography and Cryptanalysis

Fall 2015: CSCI 400 Capstone Course in Cybersecurity I, CSc 87100 Advanced Network Security and Malware (CUNY Graduate Center)

Spring 2015: CSCI 404 Capstone Course in Cybersecurity II, CSCI 373 Advanced Data Structures

Fall 2014: CSCI 400 Capstone Course in Cybersecurity I, FCM 710 Architecture of Secure Operating Systems

Select publications:

Google Scholar page ; Researchgate page ; CSauthors page (my Erdős number is 4)

- Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure, by Shoufu Luo, Jeremy D. Seideman and Sven Dietrich. In Proceedings of the 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2018), IEEE CS Security and Privacy Workshops, San Francisco, CA, May 2018.
- Cybersecurity and the Future, by Sven Dietrich, in IEEE Computer, Vol. 50 No. 4, p. 7, April 2017, ISSN: 0018:9162.
- Security Challenges and Opportunities of Software-Defined Networking, by Marc C. Dacier, Hartmut Koenig, Radoslaw Cwalinski, Frank Kargl, and Sven Dietrich, in IEEE Security and Privacy Magazine 15(2):98-102, March/April 2017, ISSN: 1540-7993.
- Who are you now? Fading to multiple personas, by Sven Dietrich, Michael Brenner, and Katharina Krombholz, in Proceedings of the WAY workshop at the 12th Symposium On Usable Privacy and Security (SOUPS) 2016, Denver, CO, June 2016.
- Detecting Zero-Day Attacks Using Context-Aware Anomaly Detection At The Application Layer, by Patrick Duessel, Christian Gehl, Ulrich Flegel, Sven Dietrich, and Michael Meier, in International Journal of Information Security 16(5):475-490, Springer Verlag, October 2017 (online July 2016). Local copy is here.
- Ethics of data sharing: a model for best practice, by Sven Dietrich, Jeroen van der Ham, Aiko Pras, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, and Lenore Zuck, in Proceedings of the 2014 Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS), IEEE CS Security & Privacy Workshops, San Jose, CA, May 2014.

- A Secure Submission System for Online Whistleblowing Platforms, by Volker Roth, Benjamin Gueldenring, Eleanor Rieffel, Sven Dietrich and Lars Ries, in Proceedings of Financial Cryptography and Data Security 2013, 8 pp, Springer LNCS 7859, April 2013. Extended version available at AdLeaks project page is here.

- Experiments in P2P botnet detection, by Lionel Riviere, Sven Dietrich, in IT Oldenbourg Journal, Special Issue on Reactive Security, it - Information Technology Vol. 54, No. 2, pp. 90-95, 04/2012. Local copy is here.

- SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster, by Theodore Reed, Joseph Geis, and Sven Dietrich, in Proceedings of the 5th Usenix Workshop on Offensive Technologies (WOOT 2011), August 2011. Project page is here.

- Building An Active Computer Security Ethics Community, by David Dittrich, Michael Bailey, and Sven Dietrich, IEEE Security and Privacy Magazine 9(4):32-40, July/August 2011, ISSN: 1540-7993.  Local copy is here.

- Friends of an Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts, with Baris Coskun, Nasir Memon, published in Proceedings of ACSAC 2010, December 2010. Acceptance rate: 17%.

- David Dittrich, Michael Bailey, Sven Dietrich. Towards Community Standards for Ethical Behavior in  Computer Security Research. Stevens CS Technical Report 2009-1, 20 April 2009. Most recent draft is here.

- David Dittrich, Sven Dietrich.  Discovery techniques for P2P botnets, Stevens CS Technical Report 2008-4, September 2008. Revised April 2009.

- David Dittrich, Sven Dietrich. P2P as botnet command and control: a deeper insight, in Proceedings of the 2008 3rd International Conference on Malicious and Unwanted Software (Malware), pp. 46-63, October 2008 ("Best Paper" award winner)

- Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher. Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, 2004.

Current students:
- Shoufu (Sean) Luo (PhD student, 2011-now)
- Jeremy Seideman (PhD student, 2016-now)
- Harrison Fernandez (Honors/PRISM undergraduate student, 2018-now)

Former Visiting Scholars/Postdocs:

- Sebastian Schmerl (Fall 2010)

Former Students:

- Tadas Vilkeliskis (Technogenesis Undergraduate Summer Scholar, 2009)

- Rich Catena (Post-MS, 2008-2009)
- Ralph Mattiaccio (Summer Scholar, 2010-2011)
- Lionel Riviere (Visiting MS Student, 2011)
          - Sadia Akhter (PhD student, 2012-2014)
          - Neal Trischitta (Summer Scholar, 2012)
- Patrick Duessel (PhD student, co-advised with Michael Meier, University of Bonn, defended July 2018)

I am always looking for good undergraduate and graduate students interested in, among others, the research topics above and wanting to pursue a degree at CUNY John Jay (undergraduate, masters) or CUNY Graduate Center (PhD in CS). If you think you are the right person, please send me a brief statement to that effect, your background, and what type of projects you might work on. Generic e-mails of the type "I'm interested in your research" without further explanation are unlikely to be answered. Internships are not generally offered.

More info:

- I was an affiliated professor at the Computer Science department at KAIST (2010-2013).

Last updated: November 24, 2018.