• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Profiles
  • Home
  • /Profiles

Matt Bishop

Award Recipient

Featured ImageMatt Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security, in 1984. He was a research scientist at the Research Institute of Advanced Computer Science and on the faculty at Dartmouth College before joining the Department of Computer Science at the University of California at Davis in 1993.

His main research area is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. He works in network security, resilience, attribution, data anonymization and sanitization, policy modeling, software assurance testing, and formal modeling of access control. He has worked on numerous analyses of e-voting systems including the RABA study in Maryland, and was one of the two principle investigators of the California Top-to-Bottom Review, which performed a technical review of all electronic voting systems certified in the State of California. With colleagues at the University of Massachusetts Amherst, he has applied process modeling to the election process as a whole.

He is active in the cybersecurity community. He was the founder of the USENIX UNIX Security Workshop and chaired the first one. It has since evolved into the USENIX Security Symposium, one of the premiere computer security conferences. He was a member of the California Voting Systems Technology Assessment Advisory Board. He provided technical advice to the California Assembly staff for the Electronic Recording Delivery Act of 2004 in California.

He is active in cybersecurity education. He co-led the Joint Task Force that developed the ACM/IEEE/ASIS SIGSAC/IFIP WG11.8 Cybersecurity Curricular Guidelines and the Summit on Education in Secure Software. His textbook, "Computer Security: Art and Science" is widely used in universities throughout the world; the second edition was published in November 2018 by Addison-Wesley Professional. He teaches introductory programming, operating systems, and computer security.

Awards

2022 Taylor L. Booth Education Award
“For contributions as an educator, author, and technical leader in cybersecurity education.”
Learn more about the Taylor L. Booth Award

LATEST NEWS
From Clicks to Conversations: How HCI Is Evolving in an AI-First World
From Clicks to Conversations: How HCI Is Evolving in an AI-First World
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Read Next

From Clicks to Conversations: How HCI Is Evolving in an AI-First World

The AI Adoption Gap: Why Enterprise AI Fails After Deployment

Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces

From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains

An Evaluation of Autoencoder Architectures for Fraud Detection in Credit Card Transactions

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter