Skip to main content

Adrian Perrig

Distinguished Fellow, CyLab; Full Professor, Computer Science, ETH Zurich

[Email]

Adrian Perrig

Research Areas

Next Generation Secure and Available Networks, Trustworthy Computing Platforms and Devices

Cross Cutting Thrusts

Software Security

Biography

Adrian Perrig is a Professor of Computer Science at the Department of Computer Science at the Swiss Federal Institute of Technology (ETH) in Zürich, where he leads the network security group. He is also a Distinguished Fellow at CyLab, and an Adjunct Professor of Electrical and Computer Engineering, and Engineering and Public Policy at Carnegie Mellon University. From 2002 to 2012, he was a Professor of Electrical and Computer Engineering, Engineering and Public Policy, and Computer Science (courtesy) at Carnegie Mellon University; From 2007 to 2012, he also served as the technical director for Carnegie Mellon's Cybersecurity Laboratory (CyLab).

He earned his Ph.D. degree in Computer Science from Carnegie Mellon University under the guidance of J. D. Tygar, and spent three years during his Ph.D. degree at the University of California at Berkeley. He received his B.Sc. degree in Computer Engineering from the Swiss Federal Institute of Technology in Lausanne (EPFL).

He is a recipient of the NSF CAREER award in 2004, IBM faculty fellowships in 2004 and 2005, the Sloan research fellowship in 2006, the Security 7 award in the category of education by the Information Security Magazine in 2009, the Benjamin Richard Teare teaching award in 2011, and the ACM SIGSAC Outstanding Innovation Award in 2013. Adrian's research revolves around building secure systems -- in particular secure future Internet architectures.

Education

PhD, 2000. Computer Science, Carnegie Mellon University
MS, 1999. Computer Science, Carnegie Mellon University
Dipl. Ing., 1997. Computer Science, Swiss Federal Institute of Technology, Lausanne

Research Projects

Next Generation Available Internet

Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researchers: Virgil Gligor, Adrian Perrig, Soo Bum Lee

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange

Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security | Cryptography
Researchers: Michael Farb, Adrian Perrig, Jonathan McCune, Tiffany Hyun-Jin Kim, Yue-Hsun Lin

Trust Establishment in Interactive Human Protocols Over the Internet

Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Adrian Perrig, Tiffany Hyun-Jin Kim

Trustworthy Computing Platforms and Devices

Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Anupam Datta, Adrian Perrig, Amit Vasudevan, Limin Jia

SCION: Scalability, Control, and Isolation On Next-Generation Networks

Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researchers: Adrian Perrig, Dave Andersen, Virgil Gligor, Soo Bum Lee

Software-Based Attestation for Peripherals

Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Adrian Perrig, Jonathan McCune

Trustworthy Execution Environments on Mobile Devices

Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Amit Vasudevan, Adrian Perrig, James Newsome, Jonathan McCune

Security for Cloud Clients with Rich Controlled Sharing

Researchers: Virgil Gligor, Adrian Perrig, James Newsome, Jonathan McCune, Collin Jackson, Eric Chen

Lockdown: A Safe and Practical Environment for Security Applications

Research Area: Secure Home Computing | Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Adrian Perrig, Amit Vasudevan

XTREC: Secure Real-time Execution Trace Recording and Analysis on Commodity Platforms

Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Cross Cutting Thrusts: Software Security
Researchers: Adrian Perrig, Virgil Gligor, Amit Vasudevan

Securing the Digital Home

Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Greg Ganger, Adrian Perrig

Sensor Network Security Monitoring and Management System

Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

Trusted Computing

Research Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Adrian Perrig, Virgil Gligor, Amit Vasudevan

Secure Ad Hoc Routing Protocols

Research Area: Mobility
Researcher: Adrian Perrig

Secure Broadcast Communication: in Wired and Wireless Networks

Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

Secure Communication in Sensor Networks

Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

Secure Routing in Sensor Networks

Researcher: Adrian Perrig

Secure Sensor Networks

Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

The TESLA Broadcast Authentication Protocol

Researcher: Adrian Perrig

Pi (Path Identifier) Packet Marking Scheme

Researcher: Adrian Perrig

Publications

"KISS: "Key it Simple and Secure" Corporate Key Management". Zhou, Z., Han, J., Lin, Y.-H., Perrig, A., & Gligor, V. D. (2013). International Conference on Trust and Trustworthy Computing (TRUST).

"ReDABLS: Revisiting device attestation with bounded leakage of secrets". Zhao, J., Gligor, V. D., Perrig, A., & Newsome, J. (2013). 21st International Workshop on Security Protocols.

"RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication". Kim, T. H.-J., Yamada, A., Gligor, V. D., Hong, J., & Perrig, A. (2013). Financial Cryptography and Data Security.

"Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference". Kim, T. H.-J., Gligor, V. D., Guajardo, J., Hong, J., & Perrig, A. (2013). Proceedings of the Workshop on Usable Security.

"STRIDE: Sanctuary Trail -- Refuge from Internet DDoS Entrapment". Hsiao, H.-C., Kim, T. H.-J., Lee, S. B., Zhang, X., Yoo, S., Gligor, V. D., & Perrig, A. (2013). ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security.