West Lafayette, Indiana, United States
6K followers 500+ connections

Join to view profile

About

*** My posts here are my personal opinions and are in no way associated with any…

Services

Articles by Gene

  • Emergency Aid for Charities?

    The coronavirus-related shutdowns are having all sorts of unexpected effects. One consequence that hits close to home…

    2 Comments
  • We need your good ideas!

    Want to affect the future of cybersecurity & privacy education? Then see this: NACE Workshop

  • Time is Running Out!

    The 20th anniversary of CERIAS is being celebrated at the annual symposium, held April 3 & 4. That's 20 years as one of…

    3 Comments
  • Next Director of CERIAS Applications

    Purdue University invites applications and nominations for the position of Director of the Center for Education and…

  • Full CERIAS Symposium 2017 Available

    Presentations from the 2017 CERIAS Security Symposium are now available for viewing on our website. Please go to the…

  • Ron Ross talks about Risk & Security

    The legendary Ron Ross of NIST gives the closing keynote at this year’s CERIAS Symposium. Worth watching! https://www.

  • Provide some love to CERIAS -- TODAY!

    Today is Purdue’s annual Day of Giving. This is a great time (and easy method) of giving something to Purdue to support…

  • CERIAS Students Find Flaw in Google Internet Protocol

    Three CERIAS students have found a serious flaw in a standard Google protocol: http://ceri.as/ring-road Check it out.

    1 Comment
  • Speak in the CERIAS Seminar?

    If you work in cyber security, privacy, or cyber crime, and you think you have interesting material to talk about…

  • Cyber Security Hall of Fame Nominations Open

    The nomination cycle for the 2016 induction into the Cyber Security Hall of Fame is now open. Details on the nomination…

Activity

Join now to see all activity

Experience & Education

  • Purdue University

View Gene’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

  • CISSP (equivalent—ISC² Fellow)

    ISC^2

    Issued
    Credential ID 27750

Publications

  • Planning and Integrating Deception into Computer Security Defenses

    New Security Paradigms NSPW'14 proceedings

    Deceptive techniques played a prominent role in many hu- man conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s. However, many computer defenses that uses deception were ad-hoc attempts to incorporate deceptive elements in them. In this paper, we present a model that can be used to plan and integrate deception in computer security defenses. We present an overview of why deception fundamentally works…

    Deceptive techniques played a prominent role in many hu- man conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s. However, many computer defenses that uses deception were ad-hoc attempts to incorporate deceptive elements in them. In this paper, we present a model that can be used to plan and integrate deception in computer security defenses. We present an overview of why deception fundamentally works and what are the essential principles in using such techniques. We investigate the unique advantages deception-based mechanisms bring to traditional computer security defenses. Furthermore, we show how our model can be used to incorporate deception to many part of computer systems and discuss how we can use such techniques effectively. A successful deception should present plausible alternative(s) to the truth and these should be de- signed to exploit specific adversaries’ biases. We investigate these biases and discuss how can they be used by presenting a number of examples.

    Other authors
    See publication
  • Future Biometric Systems and Privacy, in Privacy in America: Interdisciplinary Perspectives

    Scarecrow Press, Inc

    Other authors

Honors & Awards

  • Test of Time Award

    IEEE Security & Privacy Symposium

    For co-authorship of the influential paper "Analysis of a Denial of Service Attack on TCP" in 1997.

  • Fellow

    American Academy of Arts and Sciences

  • Security Luminary Award

    ISE

    Given to C-level executives and equivalent for outstanding contributions to the field.

  • IFIP TC-11 Kristian Beckman Award

    IFIP Technical Committee 11

    The Kristian Beckman Award is presented annually, starting in 1993. According to the web site, "The objective of the award is to publicly recognize an individual, not a group or organisation, who has significantly contributed to the development of information security, especially achievements with an international perspective." The letter noted my achievements in research, education, and service; my creation and leadership of CERIAS; my guidance and mentorship of students developing security…

    The Kristian Beckman Award is presented annually, starting in 1993. According to the web site, "The objective of the award is to publicly recognize an individual, not a group or organisation, who has significantly contributed to the development of information security, especially achievements with an international perspective." The letter noted my achievements in research, education, and service; my creation and leadership of CERIAS; my guidance and mentorship of students developing security tools in widespread use; and my work as Academic Editor then Editor-in-Chief of Computers & Security, the oldest journal in the field of information security.

  • Outstanding Research Award

    ITERA

    For his work on computer and network security, cybercrime and ethics,
    technology policy, and social impact of computing

  • Sagamore of the Wabash

    Governor of Indiana

    This is the highest award in the state of Indiana, awarded by the Governor for outstanding achievement and service to the people of the state.

  • (ISC)² Harold F. Tipton Lifetime Achievement Award

    (ISC)²

    (ISC)² describes it as "This esteemed honor recognizes an individual for his or her lifelong contributions to the advancement of the information security profession. Named after Harold F. Tipton, CISSP, known as the “George Washington of information security,” the award is given annually to recognize those who have dedicated themselves to carrying on Mr. Tipton’s tradition of passionately promoting and enhancing the information security profession."

  • National Cyber Security Hall of Fame

    CSHOF: http://www.cybersecurityhalloffame.com

  • Morrill Professor

    Purdue University

    Purdue's premier award for the top faculty who excel at integrating research, education and public engagement — the mission of the land-grant university.

    This is the highest faculty award at Purdue. Only about a dozen faculty have ever received it.

  • Lifetime Achievement Award

    SANS

    Career accomplishment in information security — in teaching, education, and public service

  • ABACUS Award

    Upsilon Pi Epsilon

    For outstanding contributions as an educator in computing

  • Distinguished Fellow

    ISSA

    For outstanding career contributions to the field of cyber security

  • Distinguished Service Award

    Computing Research Association

    Career contributions to the field of computing, and particularly service in the area of computing research policy and support.

  • Fellow

    (ISC)²

    Highest level of membership granted only for outstanding achievements in the field.

  • President's Award

    ACM

    For unique and exemplary contributions to ACM and to the computing community.

  • Joseph J. Wasserman Award

    NYC ISACA

    Contributions to the field of information security, audit and control

  • Outstanding Contribution Award

    ACM SIGSAC

    For outstanding career contributions in security, audit and control research and education

  • Technical Achievement Award

    IEEE Computer Society

    Outstanding contributions to the science and engineering of computing

  • Honorary D.Sc.

    State University College at Brockport, NY

    Lifetime contributions to education, research and policy

  • Making a Difference Award

    ACM SIGCAS

    Contributions to issues of security, privacy and ethics that have made a positive difference in society

  • Taylor L. Booth Memorial Award

    IEEE Computer Society

    Outstanding contributions to education in computing

  • Book of Great Teachers

    Purdue University

    Once every 5 years, Purdue adds the names of outstanding faculty to this book. Only a few percent of Purdue faculty are ever added. It recognizes the best teachers on campus over a prolonged period of time.

  • Meritorious Service Medal

    U.S Air Force

    For meritorious service to the Air Force and the nation as a member of the USAF Science Advisory Board

  • Outstanding Teaching Award in memory of Charles B. Murphy

    Purdue University

    Recognition as one of the top undergraduate instructors at the university.

  • Founder's Medal

    National Colloquium for Information Systes Security Education

    For lifetime, outstanding accomplishment.

  • Hall of Fame

    ISSA

    For contributions to information security and privacy as a field

  • Fellow

    IEEE

    Highest level of membership, awarded to less than 2% of members, and granted only for outstanding achievements in the field.

  • National Computer Systems Security Award

    NIST and the NCSC

    This is the highest award given in the US for achievement in information security. (The award was discontinued after 2012.)

  • Fellow

    AAAS

    Highest level of membership granted only for outstanding achievements in the field.

  • Fellow

    ACM

    Highest level of membership, awarded to less than 2% of members, and granted only for outstanding achievements in the field.

Recommendations received

More activity by Gene

View Gene’s full profile

  • See who you know in common
  • Get introduced
  • Contact Gene directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses