ISI Directory

Terry Benzel
Publications
2024
Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE)
Jelena Mirkovic, David Balenson, Brian Kocoloski, Geoff Lawler, Chris Tran, Joseph Barnes, Yuri Pradkin, Terry Benzel, Srivatsan Ravi, Ganesh Sankaran, Alba Regalado, David Choffnes, Daniel Dubois, Luis Garcia
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
2023
IEEE Security and Privacy Symposium in the Year 2003
Terry Benzel, Hilarie Orman
IEEE Security & Privacy 21 (2), 43-47, 2023
DeterLab Testbed for Cybersecurity Experimentation
Terry Benzel, Jelena Mirkovic, David Balenson, Brian Kocoloski
2023
Security and Privacy Research Artifacts: Are We Making Progress?
Terry Benzel
IEEE Security & Privacy 21 (01), 4-6, 2023
2022
Toward findable, accessible, interoperable, and reusable cybersecurity artifacts
David Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic, Laura Tinnel
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022
Cybersecurity as illuminator for the future of computing research
John Wroclawski, Terry Benzel
Communications of the ACM 65 (5), 39-41, 2022
Selected Papers From the 2021 IEEE Symposium on Security and Privacy
Terry Benzel, Thorsten Holz
IEEE Security & Privacy 20 (02), 8-9, 2022
2021
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions
Danfeng Daphne Yao, Terry Benzel
IEEE Security & Privacy 19 (6), 23-24, 2021
Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector?
Terry Benzel
IEEE Security & Privacy 19 (05), 4-7, 2021
Perspectives on the SolarWinds incident
Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael
IEEE Security & Privacy 19 (2), 7-13, 2021
2020
Panel Discussion and Audience Dialogue: Sharing Artifacts and Data for Cybersecurity Experimentation
Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li, Terry Benzel, Daniel Prince, David Hutchison
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps
Terry Benzel, Frank Stajano
Institute of Electrical and Electronics Engineers (IEEE), 2020
Toward orchestration of complex networking experiments
Alefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
2019
Selected Papers From the 2018 USENIX Security Symposium
William Enck, Terry Benzel
IEEE Security & Privacy 17 (04), 7-8, 2019
2018
Encouraging Diversity in Security and Privacy Research
Terry Benzel
IEEE SECURITY & PRIVACY 16 (4), 3-5, 2018
Selected Papers from the 2017 IEEE Symposium on Security and Privacy
Terry Benzel, Sean Peisert
IEEE Security & Privacy 16 (1), 10-11, 2018
2017
Selected Papers from the 2016 IEEE Symposium on Security and Privacy
Terry Benzel
IEEE Security & Privacy 15 (2), 11-13, 2017
2016
The Growth of a Conference, a Community, and an Industry
Terry Benzel
IEEE Security & Privacy 14 (4), 3-5, 2016
The IEEE Security and Privacy symposium workshops
Terry Benzel
IEEE Security & Privacy 14 (2), 12-14, 2016
DETERLab and the DETER Project
John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab
The GENI Book, 35-62, 2016
2015
A strategic plan for cybersecurity research and development
Terry Benzel
IEEE Security & Privacy 13 (4), 3-5, 2015
Cybersecurity experimentation of the future (CEF): catalyzing a new generation of experimental cybersecurity research
David Balenson, Laura Tinnel, Terry Benzel
SRI International, Tech. Rep., 2015
An Enduring Symposium for Leading Research in Security and Privacy
Terry Benzel
IEEE Security & Privacy 13 (2), 12-13, 2015
2014
A Symposium, a Magazine, and a Community [Guest editorial]
Terry Benzel
IEEE Security & Privacy 12 (3), 13-14, 2014
Enabling collaborative research for security and resiliency of energy cyber physical systems
Alefiya Hussain, Ted Faber, Robert Braden, Terry Benzel, Tim Yardley, Jeremy Jones, David M Nicol, William H Sanders, Thomas W Edgar, Thomas E Carroll, David O Manz, Laura Tinnel
2014 IEEE International Conference on Distributed Computing in Sensor …, 2014
2013
Crossing the great divide: from research to market
Terry V Benzel, Eric O'Brien, Robert Rodriguez, William Arbaugh, John Sebes
IEEE security & privacy 11 (2), 42-46, 2013
Deterlab testbed for cybersecurity research and education
Jelena Mirkovic, Terry Benzel
Journal of Computing Sciences in Colleges 28 (4), 163-163, 2013
First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems
Ryan Goodfellow, Robert Braden, Terry Benzel, David E Bakken
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
2012
Wscs 2012
Alessandro Armando, Hilarie Orman, Terry Benzel, L Jean Camp, Bruno Crispo, Grit Denker, Eduard Hovy, Alefiya Hussain, Daniela Oliveira, Pierangela Samarati
2012
Teaching cybersecurity with DeterLab
Jelena Mirkovic, Terry Benzel
IEEE Security & Privacy 10 (1), 73-76, 2012
The deter project: Towards structural advances in experimental cybersecurity research and evaluation
Terry Benzel, John Wroclawski
Information and Media Technologies 7 (4), 1615-1625, 2012
2011
The science of cyber security experimentation: the DETER project
Terry Benzel
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
2010
PS 42-138: CANCELLED-SPAN: A new paradigm for collecting and processing field data using real-time in-situ sensing, data models, and workflows, enabling long term data-driven …
Fabio Silva, Sridhar Gullapalli, Young Cho, Jui-Hung Chang, Philip W Rundel, Terry Benzel
The 95th ESA Annual Meeting, 2010
The DETER Project
Jelena Mirkovic, Terry V Benzel, Ted Faber, Robert Braden, John Wroclawski, Stephen Schwab
IEEE International Conference on Technologies for Homeland Security, 2010
2009
SPAN: A Network Providing Integrated, End-to-End, Sensor-to-Database Solutions for Environmental Sciences
T Benzel, YH Cho, A Deschon, S Gullapalli, F Silva
AGU Fall Meeting Abstracts 2009, IN13C-05, 2009
SensorKit: A Flexible and Extensible System for In-Situ Data Acquisition
F Silva, A Deschon, J Chang, S Westrich, YH Cho, S Gullapalli, T Benzel, EA Graham
AGU Fall Meeting Abstracts 2009, IN23C-1072, 2009
PS 59-189: SPAN: A Sensor Processing and Acquisition Network-field deployment lessons learned
Fabio Silva, Eric A Graham, Annette DeSchon, Jui-Hung Chang, Young Cho, Philip W Rundel, Terry Benzel
The 94th ESA Annual Meeting, 2009
Current developments in DETER cybersecurity testbed technology
Terry Benzel, Bob Braden, Ted Faber, Jelena Mirkovic, Steve Schwab, Karen Sollins, John Wroclawski
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
Idea: Trusted emergency management
Timothy E Levin, Cynthia E Irvine, Terry V Benzel, Thuy D Nguyen, Paul C Clark, Ganesha Bhaskara
Engineering Secure Software and Systems: First International Symposium ESSoS …, 2009
Securing the dissemination of emergency response data with an integrated hardware-software architecture
Timothy E Levin, Jeffrey S Dwoskin, Ganesha Bhaskara, Thuy D Nguyen, Paul C Clark, Ruby B Lee, Cynthia E Irvine, Terry V Benzel
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
2008
SensorKit: An End-to-End Solution for Environmental Sensor Networking
F Silva, E Graham, A Deschon, Y Lam, J Goldman, J Wroclawski, W Kaiser, T Benzel
AGU Fall Meeting Abstracts 2008, IN23A-1067, 2008
Satellite Sensornet Gateway Technology Infusion Through Rapid Deployments for Environmental Sensing
T Benzel, F Silva, A Deschon, W Ye, Y Cho
AGU Fall Meeting Abstracts 2008, IN33C-04, 2008
PS 66-133: SensorKit: An integrated sensor data collection system for field ecologists
Fabio Silva, Eric A Graham, Annette DeSchon, Yeung Lam, Thanos Stathopoulos, Wei Ye, Jeffrey Goldman, Terry Benzel, William Kaiser, John Wroclawski
The 93rd ESA Annual Meeting, 2008
Trustworthy Commodity Computing and Communication
Ruby B Lee, Cynthia Irvine, Terry Benzel, Mung Chiang
2008
Information assurance technology forecast 2008
Steven M Bellovin, Terry V Benzel, Bob Blakley, Dorothy E Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo
IEEE Security & Privacy 6 (01), 16-23, 2008
2007
Design principles and guidelines for security
Timothy E Levin, Cynthia E Irvine, Terry V Benzel, Paul C Clark, Thuy D Nguyen, Ganesha Bhaskara
Monterey, California. Naval Postgraduate School, 2007
Securecore security architecture: Authority mode and emergency management
Timothy E Levin, Thuy D Nguyen, Paul C Clark, Terry V Benzel, Cynthia E Irvine, Ganesha Bhaskara
Monterey, California. Naval Postgraduate School, 2007
Design, Deployment, and Use of the DETER Testbed.
Terry Benzel, Robert Braden, Dongho Kim, Anthony D Joseph, B Clifford Neuman, Ron Ostrenga, Stephen Schwab, Keith Sklower
DETER, 2007
2006
Virtualization of a Processor-based Crypto-Protection Mechanism and Integration within a Separation Kernel Architecture
Ganesha Bhaskara, Timothy E Levin, Thuy D Nguyen, Cynthia E Irvine, Terry V Benzel, Jeffrey S Dwoskin, Ruby B Lee
Technical report, Princeton University Department of Electrical Engineering …, 2006
Virtualization and Integration of SP Services in SecureCore
Ganesha Bhaskara, Timothy E Levin, Thuy D Nguyen, Cynthia E Irvine, Terry V Benzel, Jeffrey Dwoskin, Ruby Lee
University of California, Information Sciences Institute Technical Report …, 2006
Integration of user specific hardware for SecureCore cryptographic services
Ganesha Bhaskara, Timothy E Levin, Thuy D Nguyen, Terry V Benzel, Cynthia E Irvine, Paul C Clark
Technical Report NPS-CS-06-012, Naval Postgraduate School, Monterey, California, 2006
Experience with deter: a testbed for security research
Terry Benzel, Robert Braden, Dongho Kim, Clifford Neuman, Anthony Joseph, Keith Sklower, Ron Ostrenga, Stephen Schwab
2nd International Conference on Testbeds and Research Infrastructures for …, 2006
Preliminary security requirements for SecureCore hardware
Thuy D Nguyen, Timothy E Levin, Cynthia E Irvine, Terry V Benzel, Ganesha Bhaskara
Monterey, California. Naval Postgraduate School, 2006
2005
Design principles for security
Terry V Benzel, Cynthia E Irvine, Timothy E Levin, Thuy D Nguyen, Paul C Clark, Ganesha Bhaskare
Monterey, California. Naval Postgraduate School, 2005
Trustworthy Commodity Computation and Communication
Cynthia Irvine, Terry Benzel, Ruby B Lee, Mung Chiang
2005
2004
Cyber Defense Technology Networking and Evaluation Creating an experimental infrastructure for developing next-generation information security technologies.
R Bajcsy, T Benzel, M Bishop, B Braden, C Brodley, S Fahmy, S Floyd, W Hardaker, A Joseph, G Kesidis, K Levitt, B Lindell, P Liu, D Miller, R Mundy, C Neuman, R Ostrenga, V Paxson, P Porras, C Rosenberg, JD Tygar, S Sastry, D Sterne, SF Wu
2004
2000
Sigma: Security and interoperability for heterogeneous distributed systems
T Benzel, D Sterne, P Pasturel, G Tally, D Shands, E Sebes
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
1996
Sigma: Security for distributed object interoperability between trusted and untrusted systems
E John Sebes, TC Vickers Benzel
Proceedings 12th Annual Computer Security Applications Conference, 158-168, 1996
Browsing the web safely with Domain and Type Enforcement
Daniel F Sterne, Terry V Benzel, Lee Badger, Kenneth M Walker, Karen A Oostendorp, David L Sherman, Michael J Petkac
IEEE Symposium on Security and Privacy, 1996
Identification of subjects and objects in a trusted extensible client server architecture
Terry C Vickers Benzel, E John Sebes, Homayoon Tajalli
Anonymous [Ano95], 83-99, 1996
1995
The Triad System: The Design of a Distributed, Real-Time, Trusted System
EJ Sebes, T Benzel
Proceedings of the Aerospace Computer Security Applications Conference, 1995
1994
The Architecture of Triad: A Distributed Real-Time Trusted System
E John Sebes, Nancy Kelem, Terry C Vickers Benzel, Mary Bernstein, Eve Cohen, Jeff Jones, Jon King, Michael Barnett, David M Gallon, Roman Zacjew
Proceedings of the National Computer Security Conference, 184-193, 1994
1993
Real-time trust with'System Build': lessons learned
Mary M Bernstein, TC Vickers Benzel
Proceedings of 9th Annual Computer Security Applications Conference, 130-136, 1993
Integrated Trusted System Development Environment Process(Final Report, Apr. 1991- Dec. 1992)
TERRYC BENZEL, DOUGLASW ROTHNIE, STEPHEND CROCKER
1993
1991
Formal Policies for Trusted Processes
Terry C Vickers Benzel
position paper, Seventh Annual Computer Security Applications Conference, 1991
1989
Integrating security requirements and software development standards
T Benzel
Proceedings of the 12th National Computer Security Conference, 10-13, 1989
Formal policies for trusted processes
Jaisook Landauer, Timothy Redmond, Terry Benzel
Proceedings of the Computer Security Foundations Workshop II,, 31-40, 1989
Developing trusted systems using dod-std-2167a
Terry C Vickers Benzel
1989 Fifth Annual Computer Security Applications Conference, 166,167,168,169 …, 1989
1985
Verification technology and the A1 criteria
Terry C Vickers Benzel
ACM SIGSOFT Software Engineering Notes 10 (4), 108-109, 1985
Trusted software verification: A case study
Terry C Vickers Benzel, Deborah A Tavilla
1985 IEEE Symposium on Security and Privacy, 14-14, 1985
1984
Analysis of a kemel verification
Terry Vickers Benzel
1984 IEEE Symposium on Security and Privacy, 125-125, 1984