Michel Cukier

Associate Professor
3419 A.V. Williams Building
(301) 314-2804
Ph.D., National Polytechnic Institute of Toulouse (Computer Science)
Special Awards/Honors: 
National Science Foundation (NSF) CAREER Award
Best Paper Award, Pacific Rim International Symposium on Dependable Computing
IEEE member

Michel Cukier is the director for the Advanced Cybersecurity Experience for Students (ACES) and the associate director for education for the Maryland Cybersecurity Center. He also an associate professor of reliability engineering with a joint appointment in the Department of Mechanical Engineering.

His research covers dependability and security issues. His latest research focuses on the empirical quantification of cybersecurity. He has published more than 70 papers in journals and refereed conference proceedings in those areas.

He was the program chair of the 21st IEEE International Symposium on Software Reliability Engineering (ISSRE 2010) and the program chair of the Dependable Computing and Communication Symposium of the IEEE International Conference on Dependable Systems and Networks (DSN-2012).

Cukier is the primary investigator of a National Science Foundation REU Site on cybersecurity in collaboration with Women in Engineering, where more than 85 percent of the participants are female students. He co-advises the UMD Cybersecurity Club, which has a membership of more than 400 students.

He received a degree in physics engineering from the Free University of Brussels, Belgium, in 1991, and a doctorate in computer science from the National Polytechnic Institute of Toulouse, France, in 1996. From 1996 to 2001, he was a researcher in the Perform research group in the Coordinated Science Laboratory at the University of Illinois, Urbana-Champaign. He joined the University of Maryland in 2001 as an assistant professor.



Condon E, Cummins E, Afoulki Z, Cukier M.  2011.  How secure are networked office devices?

Salles-Loustau G, Berthier R, Collange E, Sobesto B, Cukier M.  2011.  Characterizing Attackers and Attacks: An Empirical Study.


Berthier R, Cukier M, Hiltunen M, Kormann D, Vesonder G, Sheleheda D.  2010.  Nfsight: netflow-based network awareness tool.


Berthier R, Cukier M.  2009.  An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks. 4(1):110-124.

Molina J, Cukier M.  2009.  Evaluating Attack Resiliency for Host Intrusion Detection Systems. Journal of Information Assurance and Security. 4(1):001-009.


Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.

Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis.

Ramasamy HGV, Pandey P, Cukier M, Sanders WH.  2008.  Experiences with building an intrusion-tolerant group communication system. Software: Practice and Experience. 38(6):639-666.


Cukier M, Sharma A.  2007.  Password Changes: Empirical Results. Computers and Software Engineering.

Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.


Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling and Simulation of the Escalation Archetype in Computer Security. Symposium on Simulation Software Security (SSSS 06). 38(2):495-495.

Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.


Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities.


Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool.

Chandra R, Lefever RM, Joshi KR, Cukier M, Sanders WH.  2004.  A global-state-triggered fault injector for distributed system evaluation. Parallel and Distributed Systems, IEEE Transactions on. 15(7):593-605.


Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.

Ren Y, Bakken DE, Courtney T, Cukier M, Karr DA, Rubel P, Sabnis C, Sanders WH, Schantz RE, Seri M.  2003.  AQuA: an adaptive architecture that provides dependable distributed objects. Computers, IEEE Transactions on. 52(1):31-50.

Krishnamurthy S, Sanders WH, Cukier M.  2003.  An adaptive quality of service aware middleware for replicated services. Parallel and Distributed Systems, IEEE Transactions on. 14(11):1112-1125.


Seri M, Courtney T, Cukier M, Gupta V, Krishnmamurthy S, Lyons J, Ramasamy H, Ren J, Sanders WH.  2002.  A configurable CORBA gateway for providing adaptable system properties.

Ren Y, Rubel P, Seri M, Cukier M, Sanders WH, Courtney T.  2002.  Passive replication schemes in AQuA.

Sanders WH, Cukier M, Webber F, Pal P, Watro R.  2002.  Probabilistic validation of intrusion tolerance.


Ren Y, Cukier M, Sanders WH.  2001.  An adaptive algorithm for tolerating value faults and crash failures. Parallel and Distributed Systems, IEEE Transactions on. 12(2):173-192.

Cukier M, Lyons J, Pandey P, Ramasamy HV, Sanders WH, Pal P, Webber F, Schantz R, Loyall J, Watro R.  2001.  Intrusion tolerance approaches in ITUA. 64



Sabnis C, Cukier M, Ren J, Rubel P, Sanders WH, Bakken DE, Karr D.  1999.  Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA.

Ren J, Cukier M, Rubel P, Sanders WH, Bakken DE, Karr DA.  1999.  Building dependable distributed applications using AQUA.

Cukier M, Powell D, Ariat J.  1999.  Coverage estimation methods for stratified fault-injection. Computers, IEEE Transactions on. 48(7):707-723.


Cukier M, Arlat J, Powell D.  1998.  Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.



Powell D, Cukier M, Arlat J.  1996.  On stratified sampling for high coverage estimations. Dependable Computing — EDCC-2. 1150:35-54.


Kaâniche M, Kanoun K, Cukier M, Martini M.  1994.  Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.