Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Staff Profile

William A. Casey

William A. Casey

Senior Member of Technical Staff, SEI Cyber Threat and Vulnerability Analysis

Key Responsibilities

Research methodology to advance a Science of Cyber Security (SCS).  We have developed computational algorithms for malicious-code detection, characterization, and analysis to expose the malicious design goals (of malware) or aberrant behaviors of software (vulnerabilities/exploits).  Recently we have considered how these capabilities can be re-engineered into mobile and communicable formats that can be shared among agents within a Recommendation-Verification System.

Professional Background

Casey has worked in the areas of threat analysis, code analysis, natural language processing, genomics, bio-informatics, and applied mathematics in academia, industry, and government. Casey received his PhD in applied mathematics from the Courant Institute at New York University. He also holds an MS in mathematics from Southern Illinois University Carbondale, a master’s equivalency in computer science from the Courant Institute at New York University, and an MA in mathematics from the University of Missouri Columbia. Casey is a member of the American Mathematical Society (AMS) and Society for Industrial and Applied Mathematics (SIAM).

Publications (recent or significant)

  • “Weakly Supervised Extraction of Computer Security Events from Twitter,” (with A. Ritter as lead author, E. Wright, and T. Mitchell), 24th International World Wide Web Conference, WWW 2015, Florence, Italy, (May 18-22), 2015
  • “Cyber Security via Minority Games with Epistatic Signaling,” (with B. Mishra, R. Weaver, L. Metcalf, J.A. Morales, and E. Wright), 8th International Conference on Bio-Inspired Information and Communication Technologies, BICT 2014, Boston, MA, (Dec 1-3, 2014), 2014
  • "Agent Based Trace Learning in a Recommendation-Verification System for Cyber Security," (with B. Mishra, E. Wrigth, J.A. Morales, M. Appel, J. Gennari, L. Metcalf, and R. Weaver), 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014, Fajardo, Puerto Rico, October 28-30, 2014.

  • "Cyber Security via Signaling Games: Toward a Science of Cyber Security," (with B. Mishra, J.A. Morales, T. Nguyen, J. Spring, R. Weaver, and E. Wright), 10th International Conference on Distributed Computing and Internet Technology, Bhubaneswar, Odisha, India, (February, 2014), 2013.

  • "Diversity Characteristics in the Zeus Family of Malware," (with C. Cohen, D. French, C. Hines, J. Havrilla, R. Kinder), Carnegie Mellon University, CMU/SEI-2010-SR-030

  • "Coupled oscillator models for a set of communicating cells," Priami, Corrado (ed.), Computational methods in systems biology. First international workshop, CMSB 2003, Rovereto, Italy, February 24-26, 2003.

  • "Minimal entropy probability paths between genome families," (with Ahlbrandt, Calvin; Benson, Gary), J. Math. Biol. 48, No.5, 563-590 (2004).

  • "Placing Probes along the Genome using Pair-wise Distance Data," (with B. Mishra and M. Wigler), Algorithms in Bioinformatics, First International Workshop, WABI 2001 Proceedings, LNCS 2149:52-68, Springer-Verlag, 2001.

Activities 2015

PC Chair, 9th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS) December 3-5th 2015 New York, New York

Co organizer (along with S. Chaki and J. Cowley) of CMU/SEI Theory Group Discussion Seminar.