home :: pubs :: cal :: vitae

Mark Gondree

Mark Gondree is currently an Assistant Professor in the Computer Science Department at Sonoma State University.

gondree at gmail dot com

| @LinkedIn | @Twitter |
| @GoogleScholar | @ResearchGate |
| @GitHub | @Ohloh | @Flickr |
@BGG | @TableTopSecurity |

PGP KeyID 0x56968f5d51091591
217E 9CD9 A4A3 B9DA 871D
A204 660A 01EB 0A5B 89A1

brief biography

Previously, Gondree was a Research Associate Professor in the Computer Science Dept at the Naval Postgraduate School in Monterey, CA, where he taught, advised students and did research related to computer security and computer security education. His sponsors include the National Science Foundation, the US Navy, the National Reconnaissance Office and the Department of Homeland Security.

Gondree received his PhD from the Computer Science Dept. at UC Davis in 2009, where he worked with his advisor Matt Franklin. While at UCD, Gondree was a researcher in the CS theory lab, and a member of the cryptography research group and the electronic voting research group. Gondree received his masters in computer science from CWRU in 2003, under his advisor David Singer. He spent 2003-4 studying at the IUM in Moscow. Gondree is originally from Buffalo, New York. 

research interests

Gondree is interested in security pedagogy, efficient secure computation, delegating work securely to untrusted participants, provable security, electronic privacy, trusted component minimization, and the science of building secure systems.


  • Peyton Price, Nicholas Leyba, Mark Gondree, Zachary Staples, and Thomas Parker. "Asset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain," Hawaii International Conference on System Sciences, 2017 (to appear).
  • Mark Gondree, Zachary Peterson, and Portia Pusey. "Talking about talking about cybersecurity games," USENIX ;login; 41(1):36--39, Spring 2016. [html]
  • Thuy D. Nguyen and Mark Gondree, "Teaching Industrial Control System Security Using Collaborative Projects," in the Conference on Cybersecurity of Industrial Control Systems (CyberICS) at ESORICS, 2015, pp. 16--30. [full, slides, DOI]
  • Tanya Flushman, Mark Gondree, and Zachary N.J. Peterson, "This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates," in 8th USENIX Workshop on Cyber Security Experimentation and Test (CSET'15), 2015. [html]
  • Thuy D. Nguyen, Mark Gondree, Jean Khosalim, and Cynthia E. Irvine, "Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores." International Symposium on Engineering Secure Software and Systems (ESSoS), pp. 86--101, 2015. [DOI]
  • Timothy Peters, Mark Gondree, and Zachary N.J. Peterson. "DEFY: A Deniable, Encrypted File System for Log-Structured Storage," in Proceedings of the Network and Distributed System Security (NDSS) Symposium, 2015. [full]
  • Mark Gondree, "Capturing Capture the Flag: Further Discussions," USENIX ;login: 39(6), Dec. 2014. [html]
  • Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, and Cynthia E. Irvine, "Towards a Cross-Domain MapReduce Framework." MILCOM 2013, pp. 1436--1441. [DOI]
  • Mark Gondree and Zachary N. J. Peterson. "Valuing Security by Getting [d0x3d!]: Experiences with a Network Security Board Game," in 6th USENIX Workshop on Cyber Security Experimentation and Test (CSET'13), 2013. [full, html]
  • Mark Gondree, Zachary N. J. Peterson, Tamara Denning. "Security through Play," IEEE Security & Privacy, Volume 11, Issue 3 (May/June), pp. 64-67, 2013. [DOI]
  • Mark Gondree and Zachary N. J. Peterson. "Geolocation of Data in the Cloud," in ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 25-36, 2013. [full, DOI]
  • Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, David J. Shifflett, Timothy Levin and Cynthia Irvine, "An Approach for Cross-Domain Intrusion Detection," International Conference on Information Warfare and Security (ICIW 2012), 2012. [full]
  • Zachary N. J. Peterson, Mark Gondree and Robert Beverly, "A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud," in 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud'11), 2011. [full, slides, video]
  • Thuy D. Nguyen, Mark A. Gondree, David J. Shifflett, Jean Khosalim, Timothy E. Levin, Cynthia E. Irvine. "A Cloud-Oriented Cross-Domain Security Architecture." MILCOM 2010, pp. 441--447. [DOI]
  • Mark Gondree and Payman Mohassel. "Longest Common Subsequence as Private Search." WPES 2009, pp. 81--90. [full, DOI]
  • Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark, Mark Gondree. "MYSEA: the Monterey Security Architecture." Scalable Trusted Computing (STC) 2009, pp. 39-48. [DOI]
  • Matthew Franklin, Mark Gondree and Payman Mohassel. "Communication-Efficient Private Protocols for Longest Common Subsequence." RSA Conference, Cryptographer's Track (CT-RSA 2009), pp. 265--278. [full, DOI]
  • Matthew Franklin, Mark Gondree and Payman Mohassel. "Multi-Party Indirect Indexing and Applications." ASIACRYPT 2007, pp. 283-297. [full, DOI, slides]
  • Earl Barr, Matt Bishop and Mark Gondree, "Fixing Federal E-Voting Standards," Communications of the ACM 50(3) pp. 19--24 (Mar. 2007). [DOI]
  • Matthew Franklin, Mark Gondree and Payman Mohassel. "Improved Efficiency for Private Stable Matching." RSA Conference, Cryptographer's Track (CT-RSA 2007), pp. 163--177. [full, DOI]

technical reports, miscellany

  • E. Barr, M. Bishop, D. DeFigueiredo, M. Gondree, P. Wheeler.
    "Toward Clarifying Election Systems Standards," CSE-2005-21, Sept. 2005 [pdflink]
  • M. Gondree, P. Wheeler, D. DeFigueiredo.
    "A critique of the 2002 FEC VSPT E-Voting Standards," CSE-2005-20, Sept. 2005 [pdflink]
  • Benjamin J. Culpepper and Mark Gondree.
    "SVMs for Improved Branch Prediction," report for Computer Architecture, Fall 2004 [pdf] (Relatedly, Jimenez's piecewise linear predictor [Dec 2004] does a good job with less overhead in learning approximations of non-linear behavior, than the scheme proposed in this class project.)

student advising

If you are student and interested in working with me, e-mail me. It is always useful to start such a conversation by discussing a paper or prior research work of mine about which you are interested, rather than a vague "hey, you work on neat stuff -- I want to do that too." Try to read something I've written that interests you, and then ask me questions. If you want inspiration, prior NPS theses with which I was involved can be located at NPS's institutional archive: gondree @ NPS-Calhoun. Most everything I've written, or my students have written, have future work sections!