Misplaced Pages

Robert K. Cunningham: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 01:28, 22 September 2021 editRed-tailed hawk (talk | contribs)Edit filter managers, Administrators32,482 edits Declining submission: v - Submission is improperly sourced (AFCH 0.9.1)← Previous edit Revision as of 17:39, 26 September 2021 edit undoUpitt-panther (talk | contribs)48 edits Added additional third party references. Created a section categorizing and highlighting important papers published by Dr. Cunningham.Next edit →
Line 62: Line 62:


==Awards== ==Awards==
Dr. Cunningham is a Fellow of the ].<ref>{{Cite web|url=https://news.mit.edu/2017/seven-from-mit-named-2017-ieee-fellows-0105|title=Seven from MIT are named 2017 IEEE Fellows|website=MIT News &#124; Massachusetts Institute of Technology}}</ref> In 2015, he received an MIT Excellence Award,<ref>{{Cite web|url=https://hr.mit.edu/rewards/recipient/award-recipients/2015/bringing-out-best/robert-k-cunningham|title=Robert K. Cunningham &#124; MIT Human Resources|website=hr.mit.edu}}</ref> Bringing out the Best, from the ]. Dr. Cunningham is a Fellow of the ].<ref></ref><ref>{{Cite web|url=https://news.mit.edu/2017/seven-from-mit-named-2017-ieee-fellows-0105|title=Seven from MIT are named 2017 IEEE Fellows|website=MIT News &#124; Massachusetts Institute of Technology}}</ref> In 2015, he received an MIT Excellence Award,<ref>{{Cite web|url=https://hr.mit.edu/rewards/recipient/award-recipients/2015/bringing-out-best/robert-k-cunningham|title=Robert K. Cunningham &#124; MIT Human Resources|website=hr.mit.edu}}</ref> Bringing out the Best, from the ]. In addition to organizing and reviewing for many conferences and publications, he served as an NSA Science of Security "Distinguished Expert" reviewer<ref></ref>.


== Personal life == == Personal life ==
He is married to ], with whom he has two sons (born in 1994 and 1996).<ref>{{Cite web|url=https://archive.org/stream/brownalumnimonth956brow/brownalumnimonth956brow_djvu.txt|title=Brown Alumni Monthly Archives|website=archive.org}}</ref> He is married to ], with whom he has two sons (born in 1994 and 1996).<ref>{{Cite web|url=https://archive.org/stream/brownalumnimonth956brow/brownalumnimonth956brow_djvu.txt|title=Brown Alumni Monthly Archives|website=archive.org}}</ref>

== Selected publications ==
Dr. Cunningham has written broadly on computer security, covering multiple important topic areas. This section contains a sampling.

=== Measuring and Understanding Computer Security and Privacy ===

Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K. and Zissman, M.A., 2000, January. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00 (Vol. 2, pp. 12-26). IEEE.

Lippmann, R.P. and Cunningham, R.K., 1999. Guide to creating stealthy attacks for the 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4), pp.579-595.

Pfleeger, S. and Cunningham, R., 2010. Why measuring security is hard. IEEE Security & Privacy, 8(4), pp.46-54.

Rossey, L.M., Cunningham, R.K., Fried, D.J., Rabek, J.C., Lippmann, R.P., Haines, J.W. and Zissman, M.A., 2002, March. LARIAT: Lincoln adaptable real-time information assurance testbed. In Proceedings, ieee aerospace conference (Vol. 6, pp. 6-6). IEEE.

Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J.D. and Cunningham, R.K., 2019. Don't Even Ask: Database Access Control through Query Control. ACM SIGMOD Record, 47(3), pp.17-22.

Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Trachtenberg, A., Housley, R. and Cunningham, R.K., 2016. SoK: Privacy on Mobile Devices-It's Complicated. Proc. Priv. Enhancing Technol., 2016(3), pp.96-116.

Weaver, N., Paxson, V., Staniford, S. and Cunningham, R., 2003, October. A taxonomy of computer worms. In Proceedings of the 2003 ACM workshop on Rapid Malcode (pp. 11-18).

Yu, T.H., Fuller, B.W., Bannick, J.H., Rossey, L.M. and Cunningham, R.K., 2008. Integrated environment management for information operations testbeds. In VizSEC 2007 (pp. 67-83). Springer, Berlin, Heidelberg.

Zhivich, M. and Cunningham, R.K., 2009. The real cost of software errors. IEEE Security & Privacy, 7(2), pp.87-90.

=== Leveraging Static Analysis and Machine Learning for Computer Security ===
Boyer, S., Dain, O. and Cunningham, R., 2005, March. Stellar: A fusion system for scenario construction and security risk assessment. In Third IEEE International Workshop on Information Assurance (IWIA'05) (pp. 105-116). IEEE.

Cunningham, R.K., Lippmann, R.P., Kassay, D., Webster, S.E. and Zissman, M.A., 1999, November. Host-based bottleneck verification efficiently detects novel computer attacks. In IEEE Military Communications Conference Proceedings.

Khazan, R., Rabek, J., Lewandowski, S. and Cunningham, R., Massachusetts Institute of Technology, 2005. Technique for detecting executable malicious code using a combination of static and dynamic analyses. U.S. Patent Application 10/464,828.

Lippmann, R.P. and Cunningham, R.K., 2000. Improving intrusion detection performance using keyword selection and neural networks. Computer networks, 34(4), pp.597-603.

Streilein, W.W., Cunningham, R.K. and Webster, S.E., 2001, June. Improved detection of low-profile probe and denial-of-service attacks. In Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection.

=== Cryptographically-protected search and computation ===

Fuller, B., Varia, M., Yerukhimovich, A., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J.D. and Cunningham, R.K., 2017, May. Sok: Cryptographically protected database search. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 172-191). IEEE.

Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A. and Cunningham, R.K., 2014, September. Computing on masked data: a high performance method for improving big data veracity. In 2014 IEEE High Performance Extreme Computing Conference (HPEC) (pp. 1-6). IEEE.

Shen, E., Varia, M., Cunningham, R.K. and Vesey, W.K., 2015. Cryptographically secure computation. Computer, 48(4), pp.78-81.

=== Analysis Tools ===
Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M. and Cunningham, R., 2006, October. Validating and restoring defense in depth using attack graphs. In MILCOM 2006-2006 IEEE Military Communications Conference (pp. 1-10). IEEE.

Williams, T., Kelley, C., Bröker, H.B., Campbell, J., Cunningham, R., Denholm, D., Elber, E., Fearick, R., Grammes, C. and Hart, L., 2017. Gnuplot 4.6: An interactive plotting program, 2012. URL http://www. gnuplot. info, 56.


== References == == References ==

Revision as of 17:39, 26 September 2021

This article, Robert K. Cunningham, has recently been created via the Articles for creation process. Please check to see if the reviewer has accidentally left this template after accepting the draft and take appropriate action as necessary.
Reviewer tools: Inform author

Robert K Cunningham
Alma materBrown University, Boston University
SpouseBarbara Shinn-Cunningham
AwardsFellow IEEE
Scientific career
Fieldscomputer security, machine learning, electrical engineering
InstitutionsUniversity of Pittsburgh, Carnegie Mellon University, University of Maryland, Massachusetts Institute of Technology

Robert Kevin Cunningham (born 1963) is an American scientist and engineer.

Career

In 2021, Cunningham became the Vice Chancellor for Research Infrastructure at the University of Pittsburgh, while maintaining connections to Carnegie Mellon University. He worked at the Software Engineering Institute of Carnegie Mellon University from 2018 to 2021, and served as director of the Laboratory of Physical Science at the University of Maryland (2019–2020). Prior to this, he spent twenty-five years at the federally funded research laboratory MIT Lincoln Laboratory, where his efforts were critical to building their research in computer security. While at the Software Engineering Institute, he helped promote the promise of quantum computing.

He has given his time to many professional endeavors (e.g.,), including serving as the Chair of the IEEE Cybersecurity Initiative and co-founding (with Prof. Michael Hicks) the IEEE Secure Development Conference (SECDEV).

Education

He earned an Sc.B. in Electrical Engineering from Brown University, which he attended from 1981-1985. He studied visual processes as well as artificial intelligence in the former Department of Cognitive and Neural Systems of Boston University, where he earned his Ph.D.

Awards

Dr. Cunningham is a Fellow of the IEEE. In 2015, he received an MIT Excellence Award, Bringing out the Best, from the Massachusetts Institute of Technology. In addition to organizing and reviewing for many conferences and publications, he served as an NSA Science of Security "Distinguished Expert" reviewer.

Personal life

He is married to Barbara Shinn-Cunningham, with whom he has two sons (born in 1994 and 1996).

Selected publications

Dr. Cunningham has written broadly on computer security, covering multiple important topic areas. This section contains a sampling.

Measuring and Understanding Computer Security and Privacy

Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K. and Zissman, M.A., 2000, January. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00 (Vol. 2, pp. 12-26). IEEE.

Lippmann, R.P. and Cunningham, R.K., 1999. Guide to creating stealthy attacks for the 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4), pp.579-595.

Pfleeger, S. and Cunningham, R., 2010. Why measuring security is hard. IEEE Security & Privacy, 8(4), pp.46-54.

Rossey, L.M., Cunningham, R.K., Fried, D.J., Rabek, J.C., Lippmann, R.P., Haines, J.W. and Zissman, M.A., 2002, March. LARIAT: Lincoln adaptable real-time information assurance testbed. In Proceedings, ieee aerospace conference (Vol. 6, pp. 6-6). IEEE.

Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J.D. and Cunningham, R.K., 2019. Don't Even Ask: Database Access Control through Query Control. ACM SIGMOD Record, 47(3), pp.17-22.

Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Trachtenberg, A., Housley, R. and Cunningham, R.K., 2016. SoK: Privacy on Mobile Devices-It's Complicated. Proc. Priv. Enhancing Technol., 2016(3), pp.96-116.

Weaver, N., Paxson, V., Staniford, S. and Cunningham, R., 2003, October. A taxonomy of computer worms. In Proceedings of the 2003 ACM workshop on Rapid Malcode (pp. 11-18).

Yu, T.H., Fuller, B.W., Bannick, J.H., Rossey, L.M. and Cunningham, R.K., 2008. Integrated environment management for information operations testbeds. In VizSEC 2007 (pp. 67-83). Springer, Berlin, Heidelberg.

Zhivich, M. and Cunningham, R.K., 2009. The real cost of software errors. IEEE Security & Privacy, 7(2), pp.87-90.

Leveraging Static Analysis and Machine Learning for Computer Security

Boyer, S., Dain, O. and Cunningham, R., 2005, March. Stellar: A fusion system for scenario construction and security risk assessment. In Third IEEE International Workshop on Information Assurance (IWIA'05) (pp. 105-116). IEEE.

Cunningham, R.K., Lippmann, R.P., Kassay, D., Webster, S.E. and Zissman, M.A., 1999, November. Host-based bottleneck verification efficiently detects novel computer attacks. In IEEE Military Communications Conference Proceedings.

Khazan, R., Rabek, J., Lewandowski, S. and Cunningham, R., Massachusetts Institute of Technology, 2005. Technique for detecting executable malicious code using a combination of static and dynamic analyses. U.S. Patent Application 10/464,828.

Lippmann, R.P. and Cunningham, R.K., 2000. Improving intrusion detection performance using keyword selection and neural networks. Computer networks, 34(4), pp.597-603.

Streilein, W.W., Cunningham, R.K. and Webster, S.E., 2001, June. Improved detection of low-profile probe and denial-of-service attacks. In Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection.

Cryptographically-protected search and computation

Fuller, B., Varia, M., Yerukhimovich, A., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J.D. and Cunningham, R.K., 2017, May. Sok: Cryptographically protected database search. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 172-191). IEEE.

Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A. and Cunningham, R.K., 2014, September. Computing on masked data: a high performance method for improving big data veracity. In 2014 IEEE High Performance Extreme Computing Conference (HPEC) (pp. 1-6). IEEE.

Shen, E., Varia, M., Cunningham, R.K. and Vesey, W.K., 2015. Cryptographically secure computation. Computer, 48(4), pp.78-81.

Analysis Tools

Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M. and Cunningham, R., 2006, October. Validating and restoring defense in depth using attack graphs. In MILCOM 2006-2006 IEEE Military Communications Conference (pp. 1-10). IEEE.

Williams, T., Kelley, C., Bröker, H.B., Campbell, J., Cunningham, R., Denholm, D., Elber, E., Fearick, R., Grammes, C. and Hart, L., 2017. Gnuplot 4.6: An interactive plotting program, 2012. URL http://www. gnuplot. info, 56.

References

  1. "CMU official named vice chancellor for research infrastructure". utimes.
  2. "Rob Cunningham". www.cylab.cmu.edu.
  3. Zissman, Marc A.; Cunningham, Robert K. (2016). "Cyber Security Research at Lincoln Laboratory" (PDF). ll.mit.edu/. Retrieved 15 August 2021.{{cite web}}: CS1 maint: url-status (link)
  4. "The Promise of Quantum Computing". resources.sei.cmu.edu.
  5. "CSDL | IEEE Computer Society". www.computer.org.
  6. "IEEE Cybersecurity – Home of the IEEE Cybersecurity Initiative". cybersecurity.ieee.org.
  7. "Mike Hicks | UMIACS". www.umiacs.umd.edu.
  8. "Home - IEEE Secure Development Conference". secdev.ieee.org.
  9. IEEE Fellow Directory
  10. "Seven from MIT are named 2017 IEEE Fellows". MIT News | Massachusetts Institute of Technology.
  11. "Robert K. Cunningham | MIT Human Resources". hr.mit.edu.
  12. Science of Security Announcement
  13. "Brown Alumni Monthly Archives". archive.org.
Categories: