About
Services
Articles by Gene
Activity
-
The new t-shirt was a hit and I had a blast at RSA 2026. To celebrate my 26th RSA I got this tattoo the last night I was in SF, which a week later…
The new t-shirt was a hit and I had a blast at RSA 2026. To celebrate my 26th RSA I got this tattoo the last night I was in SF, which a week later…
Liked by Gene Spafford
-
I just learned that Dave Farber, one of the fathers of the Internet, has passed. Thanks to Simson Garfinkel and Gene Spafford for writing such a…
I just learned that Dave Farber, one of the fathers of the Internet, has passed. Thanks to Simson Garfinkel and Gene Spafford for writing such a…
Liked by Gene Spafford
-
I’m excited to be participating in this year’s CERIAS Symposium at CERIAS (Center for Education and Research in Information Assurance and Security)…
I’m excited to be participating in this year’s CERIAS Symposium at CERIAS (Center for Education and Research in Information Assurance and Security)…
Liked by Gene Spafford
Experience & Education
Licenses & Certifications
-
CISSP (equivalent—ISC² Fellow)
ISC^2
IssuedCredential ID 27750
Publications
-
Planning and Integrating Deception into Computer Security Defenses
New Security Paradigms NSPW'14 proceedings
Deceptive techniques played a prominent role in many hu- man conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s. However, many computer defenses that uses deception were ad-hoc attempts to incorporate deceptive elements in them. In this paper, we present a model that can be used to plan and integrate deception in computer security defenses. We present an overview of why deception fundamentally works…
Deceptive techniques played a prominent role in many hu- man conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s. However, many computer defenses that uses deception were ad-hoc attempts to incorporate deceptive elements in them. In this paper, we present a model that can be used to plan and integrate deception in computer security defenses. We present an overview of why deception fundamentally works and what are the essential principles in using such techniques. We investigate the unique advantages deception-based mechanisms bring to traditional computer security defenses. Furthermore, we show how our model can be used to incorporate deception to many part of computer systems and discuss how we can use such techniques effectively. A successful deception should present plausible alternative(s) to the truth and these should be de- signed to exploit specific adversaries’ biases. We investigate these biases and discuss how can they be used by presenting a number of examples.
Other authorsSee publication
Honors & Awards
-
Test of Time Award
IEEE Security & Privacy Symposium
For co-authorship of the influential paper "Analysis of a Denial of Service Attack on TCP" in 1997.
-
Fellow
American Academy of Arts and Sciences
-
Security Luminary Award
ISE
Given to C-level executives and equivalent for outstanding contributions to the field.
-
IFIP TC-11 Kristian Beckman Award
IFIP Technical Committee 11
The Kristian Beckman Award is presented annually, starting in 1993. According to the web site, "The objective of the award is to publicly recognize an individual, not a group or organisation, who has significantly contributed to the development of information security, especially achievements with an international perspective." The letter noted my achievements in research, education, and service; my creation and leadership of CERIAS; my guidance and mentorship of students developing security…
The Kristian Beckman Award is presented annually, starting in 1993. According to the web site, "The objective of the award is to publicly recognize an individual, not a group or organisation, who has significantly contributed to the development of information security, especially achievements with an international perspective." The letter noted my achievements in research, education, and service; my creation and leadership of CERIAS; my guidance and mentorship of students developing security tools in widespread use; and my work as Academic Editor then Editor-in-Chief of Computers & Security, the oldest journal in the field of information security.
-
Outstanding Research Award
ITERA
For his work on computer and network security, cybercrime and ethics,
technology policy, and social impact of computing -
Sagamore of the Wabash
Governor of Indiana
This is the highest award in the state of Indiana, awarded by the Governor for outstanding achievement and service to the people of the state.
-
(ISC)² Harold F. Tipton Lifetime Achievement Award
(ISC)²
(ISC)² describes it as "This esteemed honor recognizes an individual for his or her lifelong contributions to the advancement of the information security profession. Named after Harold F. Tipton, CISSP, known as the “George Washington of information security,” the award is given annually to recognize those who have dedicated themselves to carrying on Mr. Tipton’s tradition of passionately promoting and enhancing the information security profession."
-
National Cyber Security Hall of Fame
CSHOF: http://www.cybersecurityhalloffame.com
-
Morrill Professor
Purdue University
Purdue's premier award for the top faculty who excel at integrating research, education and public engagement — the mission of the land-grant university.
This is the highest faculty award at Purdue. Only about a dozen faculty have ever received it. -
Lifetime Achievement Award
SANS
Career accomplishment in information security — in teaching, education, and public service
-
ABACUS Award
Upsilon Pi Epsilon
For outstanding contributions as an educator in computing
-
Distinguished Fellow
ISSA
For outstanding career contributions to the field of cyber security
-
Distinguished Service Award
Computing Research Association
Career contributions to the field of computing, and particularly service in the area of computing research policy and support.
-
Fellow
(ISC)²
Highest level of membership granted only for outstanding achievements in the field.
-
President's Award
ACM
For unique and exemplary contributions to ACM and to the computing community.
-
Joseph J. Wasserman Award
NYC ISACA
Contributions to the field of information security, audit and control
-
Outstanding Contribution Award
ACM SIGSAC
For outstanding career contributions in security, audit and control research and education
-
Technical Achievement Award
IEEE Computer Society
Outstanding contributions to the science and engineering of computing
-
Honorary D.Sc.
State University College at Brockport, NY
Lifetime contributions to education, research and policy
-
Making a Difference Award
ACM SIGCAS
Contributions to issues of security, privacy and ethics that have made a positive difference in society
-
Taylor L. Booth Memorial Award
IEEE Computer Society
Outstanding contributions to education in computing
-
Book of Great Teachers
Purdue University
Once every 5 years, Purdue adds the names of outstanding faculty to this book. Only a few percent of Purdue faculty are ever added. It recognizes the best teachers on campus over a prolonged period of time.
-
Meritorious Service Medal
U.S Air Force
For meritorious service to the Air Force and the nation as a member of the USAF Science Advisory Board
-
Outstanding Teaching Award in memory of Charles B. Murphy
Purdue University
Recognition as one of the top undergraduate instructors at the university.
-
Founder's Medal
National Colloquium for Information Systes Security Education
For lifetime, outstanding accomplishment.
-
Hall of Fame
ISSA
For contributions to information security and privacy as a field
-
Fellow
IEEE
Highest level of membership, awarded to less than 2% of members, and granted only for outstanding achievements in the field.
-
National Computer Systems Security Award
NIST and the NCSC
This is the highest award given in the US for achievement in information security. (The award was discontinued after 2012.)
-
Fellow
AAAS
Highest level of membership granted only for outstanding achievements in the field.
-
Fellow
ACM
Highest level of membership, awarded to less than 2% of members, and granted only for outstanding achievements in the field.
Recommendations received
23 people have recommended Gene
Join now to viewMore activity by Gene
-
HHS Launches MASA Initiative: The Implications for Artificial Intelligence Washington DC -- Hold for Release April 1, 2026 HHS Secretary Robert F…
HHS Launches MASA Initiative: The Implications for Artificial Intelligence Washington DC -- Hold for Release April 1, 2026 HHS Secretary Robert F…
Shared by Gene Spafford
-
Back when I used to do pranks on April 1, I spent some time and effort planning them. This was perhaps my best one, from 2008. It will be somewhat…
Back when I used to do pranks on April 1, I spent some time and effort planning them. This was perhaps my best one, from 2008. It will be somewhat…
Shared by Gene Spafford
-
Waiting for LinkedIn to allow me to update my profile, but as many people heard last week, I recently joined AISLE™ and the Field CISO. Few people…
Waiting for LinkedIn to allow me to update my profile, but as many people heard last week, I recently joined AISLE™ and the Field CISO. Few people…
Liked by Gene Spafford
-
Purdue Computer Science sponsored the FIRST Indiana Robotics Lafayette District Event, held March 26–28, 2026! (At least one of the team members in…
Purdue Computer Science sponsored the FIRST Indiana Robotics Lafayette District Event, held March 26–28, 2026! (At least one of the team members in…
Liked by Gene Spafford
-
I woke up this morning, feeling wonderful, energized, and happy to be alive. Now that I've been awake for a while, I've recovered and I am back to…
I woke up this morning, feeling wonderful, energized, and happy to be alive. Now that I've been awake for a while, I've recovered and I am back to…
Posted by Gene Spafford
-
News you may have missed while at #RSAC: Researchers claim to have found a megastructure and a second Sphinx buried beneath the current Sphinx in…
News you may have missed while at #RSAC: Researchers claim to have found a megastructure and a second Sphinx buried beneath the current Sphinx in…
Posted by Gene Spafford
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
-
1h 33m
Cryptocurrencies and Blockchain Security Fundamentals: Build a Secure Foundation in Crypto and Blockchain
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access
-
13m
A Standalone Project: Build a Simple Intrusion Detection System (IDS) Using Python to Monitor Network Traffic