About Me

These biographies, and other matters, are useful when writing grants. I put them here to help collaborators, because sometimes they need a bio at the last minute (or for some reason cannot get hold of me ...)


200 Word Biography

Matt Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security, in 1984. He was a research scientist at the Research Institute of Advanced Computer Science and was on the faculty at Dartmouth College before joining the Department of Computer Science at the University of California at Davis.

His main research area is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. This includes detecting and handling all types of malicious logic. He is active in the areas of network security, the study of denial of service attacks and defenses, policy modeling, software assurance testing, and formal modeling of access control. He is interested in electronic voting, was one of the members of the RABA study for Maryland, and was one of the two principle investigators of the California Top-to-Bottom Review, which performed a technical review of all electronic voting systems certified in the State of California.

He is active in information assurance education. His textbook, “Computer Security: Art and Science”, was published in December 2002 by Addison-Wesley Professional. He teaches introductory programming, software engineering, operating systems, and (of course) computer security.

199 words
ASCII text version for downloading

1 Paragraph Biography

Matt Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security, in 1984. He is on the faculty at the Department of Computer Science at the University of California at Davis. His main research area is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. Currently, he has research projects involving data sanitization, modeling election processes, and attribution in large-scale testbeds such as GENI; he is also looking at the “insider” problem. He has been active in the area of UNIX security since 1979, and has presented tutorials at SANS, USENIX, and other conferences. His textbook, Computer Security: Art and Science, was published in December 2002 by Addison-Wesley Professional. He also teaches software engineering, machine architecture, operating systems, programming, and (of course) computer security.

95 words
ASCII text version for downloading