Revision as of 01:28, 22 September 2021 editRed-tailed hawk (talk | contribs)Edit filter managers, Administrators32,470 edits Declining submission: v - Submission is improperly sourced (AFCH 0.9.1)← Previous edit | Revision as of 17:39, 26 September 2021 edit undoUpitt-panther (talk | contribs)48 edits Added additional third party references. Created a section categorizing and highlighting important papers published by Dr. Cunningham.Next edit → | ||
Line 62: | Line 62: | ||
==Awards== | ==Awards== | ||
Dr. Cunningham is a Fellow of the ].<ref>{{Cite web|url=https://news.mit.edu/2017/seven-from-mit-named-2017-ieee-fellows-0105|title=Seven from MIT are named 2017 IEEE Fellows|website=MIT News | Massachusetts Institute of Technology}}</ref> In 2015, he received an MIT Excellence Award,<ref>{{Cite web|url=https://hr.mit.edu/rewards/recipient/award-recipients/2015/bringing-out-best/robert-k-cunningham|title=Robert K. Cunningham | MIT Human Resources|website=hr.mit.edu}}</ref> Bringing out the Best, from the ]. | Dr. Cunningham is a Fellow of the ].<ref></ref><ref>{{Cite web|url=https://news.mit.edu/2017/seven-from-mit-named-2017-ieee-fellows-0105|title=Seven from MIT are named 2017 IEEE Fellows|website=MIT News | Massachusetts Institute of Technology}}</ref> In 2015, he received an MIT Excellence Award,<ref>{{Cite web|url=https://hr.mit.edu/rewards/recipient/award-recipients/2015/bringing-out-best/robert-k-cunningham|title=Robert K. Cunningham | MIT Human Resources|website=hr.mit.edu}}</ref> Bringing out the Best, from the ]. In addition to organizing and reviewing for many conferences and publications, he served as an NSA Science of Security "Distinguished Expert" reviewer<ref></ref>. | ||
== Personal life == | == Personal life == | ||
He is married to ], with whom he has two sons (born in 1994 and 1996).<ref>{{Cite web|url=https://archive.org/stream/brownalumnimonth956brow/brownalumnimonth956brow_djvu.txt|title=Brown Alumni Monthly Archives|website=archive.org}}</ref> | He is married to ], with whom he has two sons (born in 1994 and 1996).<ref>{{Cite web|url=https://archive.org/stream/brownalumnimonth956brow/brownalumnimonth956brow_djvu.txt|title=Brown Alumni Monthly Archives|website=archive.org}}</ref> | ||
== Selected publications == | |||
Dr. Cunningham has written broadly on computer security, covering multiple important topic areas. This section contains a sampling. | |||
=== Measuring and Understanding Computer Security and Privacy === | |||
Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K. and Zissman, M.A., 2000, January. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00 (Vol. 2, pp. 12-26). IEEE. | |||
Lippmann, R.P. and Cunningham, R.K., 1999. Guide to creating stealthy attacks for the 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4), pp.579-595. | |||
Pfleeger, S. and Cunningham, R., 2010. Why measuring security is hard. IEEE Security & Privacy, 8(4), pp.46-54. | |||
Rossey, L.M., Cunningham, R.K., Fried, D.J., Rabek, J.C., Lippmann, R.P., Haines, J.W. and Zissman, M.A., 2002, March. LARIAT: Lincoln adaptable real-time information assurance testbed. In Proceedings, ieee aerospace conference (Vol. 6, pp. 6-6). IEEE. | |||
Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J.D. and Cunningham, R.K., 2019. Don't Even Ask: Database Access Control through Query Control. ACM SIGMOD Record, 47(3), pp.17-22. | |||
Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Trachtenberg, A., Housley, R. and Cunningham, R.K., 2016. SoK: Privacy on Mobile Devices-It's Complicated. Proc. Priv. Enhancing Technol., 2016(3), pp.96-116. | |||
Weaver, N., Paxson, V., Staniford, S. and Cunningham, R., 2003, October. A taxonomy of computer worms. In Proceedings of the 2003 ACM workshop on Rapid Malcode (pp. 11-18). | |||
Yu, T.H., Fuller, B.W., Bannick, J.H., Rossey, L.M. and Cunningham, R.K., 2008. Integrated environment management for information operations testbeds. In VizSEC 2007 (pp. 67-83). Springer, Berlin, Heidelberg. | |||
Zhivich, M. and Cunningham, R.K., 2009. The real cost of software errors. IEEE Security & Privacy, 7(2), pp.87-90. | |||
=== Leveraging Static Analysis and Machine Learning for Computer Security === | |||
Boyer, S., Dain, O. and Cunningham, R., 2005, March. Stellar: A fusion system for scenario construction and security risk assessment. In Third IEEE International Workshop on Information Assurance (IWIA'05) (pp. 105-116). IEEE. | |||
Cunningham, R.K., Lippmann, R.P., Kassay, D., Webster, S.E. and Zissman, M.A., 1999, November. Host-based bottleneck verification efficiently detects novel computer attacks. In IEEE Military Communications Conference Proceedings. | |||
Khazan, R., Rabek, J., Lewandowski, S. and Cunningham, R., Massachusetts Institute of Technology, 2005. Technique for detecting executable malicious code using a combination of static and dynamic analyses. U.S. Patent Application 10/464,828. | |||
Lippmann, R.P. and Cunningham, R.K., 2000. Improving intrusion detection performance using keyword selection and neural networks. Computer networks, 34(4), pp.597-603. | |||
Streilein, W.W., Cunningham, R.K. and Webster, S.E., 2001, June. Improved detection of low-profile probe and denial-of-service attacks. In Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection. | |||
=== Cryptographically-protected search and computation === | |||
Fuller, B., Varia, M., Yerukhimovich, A., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J.D. and Cunningham, R.K., 2017, May. Sok: Cryptographically protected database search. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 172-191). IEEE. | |||
Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A. and Cunningham, R.K., 2014, September. Computing on masked data: a high performance method for improving big data veracity. In 2014 IEEE High Performance Extreme Computing Conference (HPEC) (pp. 1-6). IEEE. | |||
Shen, E., Varia, M., Cunningham, R.K. and Vesey, W.K., 2015. Cryptographically secure computation. Computer, 48(4), pp.78-81. | |||
=== Analysis Tools === | |||
Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M. and Cunningham, R., 2006, October. Validating and restoring defense in depth using attack graphs. In MILCOM 2006-2006 IEEE Military Communications Conference (pp. 1-10). IEEE. | |||
Williams, T., Kelley, C., Bröker, H.B., Campbell, J., Cunningham, R., Denholm, D., Elber, E., Fearick, R., Grammes, C. and Hart, L., 2017. Gnuplot 4.6: An interactive plotting program, 2012. URL http://www. gnuplot. info, 56. | |||
== References == | == References == |
Revision as of 17:39, 26 September 2021
This article, Robert K. Cunningham, has recently been created via the Articles for creation process. Please check to see if the reviewer has accidentally left this template after accepting the draft and take appropriate action as necessary.
Reviewer tools: Inform author |
- Comment: The individual described is most likely notable based off of the information in the article. However, atricles are required to have multiple independent reliable sources that cover the article subject in-depth. The sources that are independent of the article subject seem to give only trivial coverage. And, since this is a biography of a living person, self-published sources cannot be used in the article except in a very narrow set of circumstances. — Mikehawk10 (talk) 01:28, 22 September 2021 (UTC)
Robert K Cunningham | |
---|---|
Alma mater | Brown University, Boston University |
Spouse | Barbara Shinn-Cunningham |
Awards | Fellow IEEE |
Scientific career | |
Fields | computer security, machine learning, electrical engineering |
Institutions | University of Pittsburgh, Carnegie Mellon University, University of Maryland, Massachusetts Institute of Technology |
Robert Kevin Cunningham (born 1963) is an American scientist and engineer.
Career
In 2021, Cunningham became the Vice Chancellor for Research Infrastructure at the University of Pittsburgh, while maintaining connections to Carnegie Mellon University. He worked at the Software Engineering Institute of Carnegie Mellon University from 2018 to 2021, and served as director of the Laboratory of Physical Science at the University of Maryland (2019–2020). Prior to this, he spent twenty-five years at the federally funded research laboratory MIT Lincoln Laboratory, where his efforts were critical to building their research in computer security. While at the Software Engineering Institute, he helped promote the promise of quantum computing.
He has given his time to many professional endeavors (e.g.,), including serving as the Chair of the IEEE Cybersecurity Initiative and co-founding (with Prof. Michael Hicks) the IEEE Secure Development Conference (SECDEV).
Education
He earned an Sc.B. in Electrical Engineering from Brown University, which he attended from 1981-1985. He studied visual processes as well as artificial intelligence in the former Department of Cognitive and Neural Systems of Boston University, where he earned his Ph.D.
Awards
Dr. Cunningham is a Fellow of the IEEE. In 2015, he received an MIT Excellence Award, Bringing out the Best, from the Massachusetts Institute of Technology. In addition to organizing and reviewing for many conferences and publications, he served as an NSA Science of Security "Distinguished Expert" reviewer.
Personal life
He is married to Barbara Shinn-Cunningham, with whom he has two sons (born in 1994 and 1996).
Selected publications
Dr. Cunningham has written broadly on computer security, covering multiple important topic areas. This section contains a sampling.
Measuring and Understanding Computer Security and Privacy
Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K. and Zissman, M.A., 2000, January. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00 (Vol. 2, pp. 12-26). IEEE.
Lippmann, R.P. and Cunningham, R.K., 1999. Guide to creating stealthy attacks for the 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4), pp.579-595.
Pfleeger, S. and Cunningham, R., 2010. Why measuring security is hard. IEEE Security & Privacy, 8(4), pp.46-54.
Rossey, L.M., Cunningham, R.K., Fried, D.J., Rabek, J.C., Lippmann, R.P., Haines, J.W. and Zissman, M.A., 2002, March. LARIAT: Lincoln adaptable real-time information assurance testbed. In Proceedings, ieee aerospace conference (Vol. 6, pp. 6-6). IEEE.
Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J.D. and Cunningham, R.K., 2019. Don't Even Ask: Database Access Control through Query Control. ACM SIGMOD Record, 47(3), pp.17-22.
Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Trachtenberg, A., Housley, R. and Cunningham, R.K., 2016. SoK: Privacy on Mobile Devices-It's Complicated. Proc. Priv. Enhancing Technol., 2016(3), pp.96-116.
Weaver, N., Paxson, V., Staniford, S. and Cunningham, R., 2003, October. A taxonomy of computer worms. In Proceedings of the 2003 ACM workshop on Rapid Malcode (pp. 11-18).
Yu, T.H., Fuller, B.W., Bannick, J.H., Rossey, L.M. and Cunningham, R.K., 2008. Integrated environment management for information operations testbeds. In VizSEC 2007 (pp. 67-83). Springer, Berlin, Heidelberg.
Zhivich, M. and Cunningham, R.K., 2009. The real cost of software errors. IEEE Security & Privacy, 7(2), pp.87-90.
Leveraging Static Analysis and Machine Learning for Computer Security
Boyer, S., Dain, O. and Cunningham, R., 2005, March. Stellar: A fusion system for scenario construction and security risk assessment. In Third IEEE International Workshop on Information Assurance (IWIA'05) (pp. 105-116). IEEE.
Cunningham, R.K., Lippmann, R.P., Kassay, D., Webster, S.E. and Zissman, M.A., 1999, November. Host-based bottleneck verification efficiently detects novel computer attacks. In IEEE Military Communications Conference Proceedings.
Khazan, R., Rabek, J., Lewandowski, S. and Cunningham, R., Massachusetts Institute of Technology, 2005. Technique for detecting executable malicious code using a combination of static and dynamic analyses. U.S. Patent Application 10/464,828.
Lippmann, R.P. and Cunningham, R.K., 2000. Improving intrusion detection performance using keyword selection and neural networks. Computer networks, 34(4), pp.597-603.
Streilein, W.W., Cunningham, R.K. and Webster, S.E., 2001, June. Improved detection of low-profile probe and denial-of-service attacks. In Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection.
Cryptographically-protected search and computation
Fuller, B., Varia, M., Yerukhimovich, A., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J.D. and Cunningham, R.K., 2017, May. Sok: Cryptographically protected database search. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 172-191). IEEE.
Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A. and Cunningham, R.K., 2014, September. Computing on masked data: a high performance method for improving big data veracity. In 2014 IEEE High Performance Extreme Computing Conference (HPEC) (pp. 1-6). IEEE.
Shen, E., Varia, M., Cunningham, R.K. and Vesey, W.K., 2015. Cryptographically secure computation. Computer, 48(4), pp.78-81.
Analysis Tools
Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M. and Cunningham, R., 2006, October. Validating and restoring defense in depth using attack graphs. In MILCOM 2006-2006 IEEE Military Communications Conference (pp. 1-10). IEEE.
Williams, T., Kelley, C., Bröker, H.B., Campbell, J., Cunningham, R., Denholm, D., Elber, E., Fearick, R., Grammes, C. and Hart, L., 2017. Gnuplot 4.6: An interactive plotting program, 2012. URL http://www. gnuplot. info, 56.
References
- "CMU official named vice chancellor for research infrastructure". utimes.
- "Rob Cunningham". www.cylab.cmu.edu.
- Zissman, Marc A.; Cunningham, Robert K. (2016). "Cyber Security Research at Lincoln Laboratory" (PDF). ll.mit.edu/. Retrieved 15 August 2021.
{{cite web}}
: CS1 maint: url-status (link) - "The Promise of Quantum Computing". resources.sei.cmu.edu.
- "CSDL | IEEE Computer Society". www.computer.org.
- "IEEE Cybersecurity – Home of the IEEE Cybersecurity Initiative". cybersecurity.ieee.org.
- "Mike Hicks | UMIACS". www.umiacs.umd.edu.
- "Home - IEEE Secure Development Conference". secdev.ieee.org.
- IEEE Fellow Directory
- "Seven from MIT are named 2017 IEEE Fellows". MIT News | Massachusetts Institute of Technology.
- "Robert K. Cunningham | MIT Human Resources". hr.mit.edu.
- Science of Security Announcement
- "Brown Alumni Monthly Archives". archive.org.