Peter Hawrylak, PhD

Peter Hawrylak, PhD
Associate Professor of Electrical and Computer Engineering
College of Engineering & Natural Sciences
Computer Science
Electrical and Computer Engineering
918-631-3277 Rayzor Hall Room 1100

Education

PhD – University of Pittsburgh MS – University of Pittsburgh BS – University of Pittsburgh

Bio

Peter J. Hawrylak, Ph.D. received the B.S. degree in computer engineering, the M.S. degree in electrical engineering, and the Ph.D. in electrical engineering from the University of Pittsburgh, Pittsburgh, PA, USA, in 2002, 2004, and 2006 respectively. He is an Associate Professor in the Department of Electrical and Computer Engineering, with a joint appointment in the Tandy School for Computer Science, at The University of Tulsa, Tulsa, OK, USA. He has published more than 40 publications and holds 14 patents in the radio frequency identification (RFID), energy harvesting, and cyber-security areas. His research interests include RFID (radio frequency identification), security for low-power wireless devices, Internet of Things (IoT) applications, and digital design. Dr. Hawrylak is a member of the IEEE and IEEE Computer Society, and is currently the Secretary of the Tulsa Section of the IEEE. He served as chair of the RFID Experts Group (REG) of Association for Automatic Identification and Mobility (AIM) in 2012-2013. Peter received AIM Inc.’s Ted Williams Award in 2015 for his contributions to the RFID industry. Dr. Hawrylak is the Publication Chair of the International IEEE RFID Conference, and is the Editor-in-Chief of the International Journal of Radio Frequency Identification Technology and Applications (IJRFITA) journal published by InderScience Publishers, which focuses on the application and development of RFID technology. Dr. Hawrylak is also the Editor-in-Cheif of the IEEE RFID Virtual Journal which provides a single source for high-quality and high-impact publications in the areas of RFID and Internet of Things (IoT).

Research Interests

Embedded Systems
Radio Frequency Identification
Internet of Things
Wireless Systems
Embedded System Security
Wireless System Security
Digital Hardware Design
Computer Architecture

Teaching Interests

Computer Organization
Digital Logic
Computer Architecture
Digital Hardware Design and Implementation
Radio Frequency Identification

Publications

Journal Articles

  • Hawrylak, Peter et al. “The Access of Things: Spatial Access Control For.” Handbook of Research on Progressive Trends in Wireless Communications and Networking (2014): 189. Print.

  • Hawrylak, Peter et al. “Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure.” Critical Information Infrastructure Protection and Resilience in the ICT Sector (2013): 173. Print.

  • A. Ogirala, P. Hawrylak, and M. Mickle, “Interoperability Verification in ISO 18000-7 Active RFID Systems: Experimental Setup and Results,” Wireless Personal Communications, vol. 68, no. 3, pp. 619–635, 2013.

  • [1]
    HawrylakP., SchimkeN., HaleJ., and PapaM., “Security Risks Associated with Radio Frequency Identification in Medical Environments”, vol. 36, pp. 3491–3505, 2012.
  • [1]
    HawrylakP., SchimkeN., HaleJ., and PapaM., “RFID in E-Health: Technology, Implementation”, Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments, 2012, p. 347.
  • [1]
    OgiralaA., “Ultra High-Speed and Low-Power Flexible Architecture Using State Transition Matrix Model For EPC Gen-2 Communication Protocol Processor”, vol. 32, pp. 198-205, 2012.
  • [1]
    OgiralaA., HawrylakP., and MickleM., “Interoperability Test Methodology for ISO 18000-7 Active RFID”, vol. 65, pp. 253-271, 2012.
  • [1]
    HawrylakP. and HartC., “Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security”, vol. 3, pp. 10-26, 2012.
  • [1]
    RavillaS., OgiralaA., MurariA., HawrylakP., and MickleM., “Anti-collision policy for RFID systems: fast predict tags in field algorithm”, vol. 3, pp. 215-228, 2011.
  • [1]
    OgiralaA., “Impact of ISO 18000 Series RF Signals On CRMDs: A Unified Approach”, vol. 31, pp. 250-258, 2011.
  • [1]
    MaillartL., KamraniA., NormanB., RajgopalJ., and HawrylakP., “Optimizing RFID tag-inventorying algorithms”, vol. 42, pp. 690-702, 2010.
  • [1]
    SunY., HawrylakP., MaoZ.-H., and MickleM., “Collision resolution in ISO 18000-6c passive RFID”, vol. 25, pp. 239-262, 2010.
  • [1]
    JonesA., “Radio Frequency Identification Prototyping”, vol. 13, pp. 29:1–29:22, 2008.
  • [1]
    HawrylakP., CainJ., and MickleM., “Analytic modelling methodology for analysis of energy consumption for ISO 18000-7 RFID networks”, vol. 1, pp. 371-400, 2007.
  • [1]
    JonesA., “Passive active radio frequency identification tags”, vol. 1, pp. 52-73, 2006.
  • [1]
    HawrylakP., MatsL., CainJ. T., JonesA., TungS., and MickleM., “Ultra Low-Power Computing Systems for Wireless Devices”, vol. 1, pp. 1-10, 2006.

Conference Proceedings

  • [1]
    WestJ., HaleJ., PapaM., and HawrylakP., “Automatic Identification of Critical Digital Assets”, in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), 2019, pp. 219-224.
  • [1]
    LiM., HawrylakP., and HaleJ., “Concurrency Strategies for Attack Graph Generation”, in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), 2019, pp. 174-179.
  • [1]
    HillZ., HaleJ., PapaM., and HawrylakP., “Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols”, in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), 2019, pp. 82-88.
  • [1]
    HillZ., HaleJ., PapaM., and HawrylakP., “Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor”, in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), 2019, pp. 22-27.
  • [1]
    LiM., HawrylakP., and HaleJ., “Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster”, in Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (Learning), 2019, p. 5:1-.
  • [1]
    HawrylakP., LouthanG., HaleJ., and PapaM., “Practical Cyber-Security Solutions for the Science DMZ”, in Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (Learning), 2019, p. 50:1-.
  • W. Nichols, P. Hawrylak, J. Hale, and M. Papa, “Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor,” in 2018 Resilience Week (RWS), 2018, pp. 84–87.

  • W. Nichols, Z. Hill, P. Hawrylak, J. Hale, and M. Papa, “Automatic Generation of Attack Scripts from Attack Graphs,” in 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 267–274.

  • R. Raval, A. Maskus, B. Saltmiras, M. Dunn, P. Hawrylak, and J. Hale, “Competitive Learning Environment for Cyber-Physical System Security Experimentation,” in 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 211–218.

  • [1]
    “Time delay tags for commercial ground penetrating radars”, in 2018 IEEE Radar Conference (RadarConf18), 2018, pp. 1466-1471.
  • [1]
    HillZ., ChenS., WallD., PapaM., HaleJ., and HawrylakP., “Simulation and Analysis Framework for Cyber-physical Systems”, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017, pp. 7:1–7:4.
  • [1]
    HawrylakP., HaleJ., and PapaM., “Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce”, in Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact, 2017, pp. 53:1–53:4.
  • [1]
    HillZ., NicholsW., PapaM., HaleJ., and HawrylakP., “Verifying attack graphs through simulation”, in 2017 Resilience Week (RWS), 2017, pp. 64-67.
  • [1]
    NicholsW., HawrylakP., HaleJ., and PapaM., “Introducing Priority into Hybrid Attack Graphs”, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017, pp. 12:1–12:4.
  • [1]
    SmithB., CaruthersW., StewartD., HawrylakP., and HaleJ., “Network Modeling for Security Analytics”, in Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016, pp. 22:1–22:4.
  • [1]
    CookK., ShawT., HawrylakP., and HaleJ., “Scalable Attack Graph Generation”, in Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016, pp. 21:1–21:4.
  • Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

  • [1]
    “HydroSense: A self-powered wireless device for monitoring water usage in hotel showers”, in Global Humanitarian Technology Conference (GHTC), 2015 IEEE, 2015, pp. 314-320.
  • [1]
    LouthanG., HaneyM., HardwickeP., HawrylakP., and HaleJ., “Hybrid Extensions for Stateful Attack Graphs”, in Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 101–104.
  • [1]
    NivethanJ., PapaM., and HawrylakP., “Modeling and Simulation of Electric Power Substation Employing an IEC 61850 Network”, in Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 89–92.
  • [1]
    “Modular Actution Systems: A Scalable Solution for Delivering Robotic Performance”, in Proceeding of the Robot Makers Workshop: The Future of Digital Rapid Design and Fabrication of Robots (RoMa), Robotics: Science and Systems Conference, 2014, pp. 1–2.
  • [1]
    NivethanJ., PapaM., and HawrylakP., “Estimating Link Availability and Timing Delays in Ethernet-based Networks”, in Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013, pp. 46:1–46:4.
  • [1]
    ButlerM., ReedS., HawrylakP., and HaleJ., “Implementing Graceful RFID Privilege Reduction”, in Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013, pp. 54:1–54:4.
  • [1]
    HawrylakP., HaneyM., PapaM., and HaleJ., “Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid”, in Resilient Control Systems (ISRCS), 2012 5th International Symposium on, 2012, pp. 161-164.
  • [1]
    ButlerM., HawrylakP., and HaleJ., “Graceful Privilege Reduction in RFID Security”, in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, pp. 47:1–47:1.
  • [1]
    LouthanG., HardwickeP., HawrylakP., and HaleJ., “Toward Hybrid Attack Dependency Graphs”, in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, pp. 62:1–62:1.
  • [1]
    SunY., HawrylakP., and MickleM., “Application of ICA in Collision Resolution for Passive RFID Communication”, 2009, pp. 1292-1297.
  • [1]
    HawrylakP., OgiralaA., CainJ., and MickleM., “Automated Test System for ISO 18000-7 – Active RFID”, in RFID, 2008 IEEE International Conference on, 2008, pp. 9-18.
  • [1]
    MatsL., HawrylakP., and MickleM., “In-Situ characterization of passive rfid tag performance at absolute minimum power levels”, in Antennas and Propagation Society International Symposium, 2007 IEEE, 2007, pp. 2741-2744.

Book Chapters

  • P. Hawrylak and J. Hale, “Medical Data Privacy Handbook,” A. Gkoulalas-Divanis and G. Loukides, Eds. Springer International Publishing, 2015, pp. 549–567.

  • P. Hawrylak and J. Hale, “The use of Body-Area Networks and Radio Frequency Identification in Healthcare,” in Encyclopedia of Information Science and Technology, no. 3rd Edition, M. Khosrow-Pour, Ed. IGI Global, 2015, pp. 6318–6326.

  • Hawrylak, Peter et al. “The Access of Things: Spatial Access Control For.” Handbook of Research on Progressive Trends in Wireless Communications and Networking (2014): 189. Print.

  • [1]
    HawrylakP., ReedS., ButlerM., and HaleJ., “The Access of Things: Spatial Access Control for the Internet of Things”, in Handbook of Research on Progressive Trends in Wireless Communications and Networking, IGI Global, 2014, pp. 189-207.
  • [1]
    HartC. and HawrylakP., “Using Radio Frequency Identification Technology to Store Patients’ Medical Information”, in Handbook of Research on Patient Safety and Quality Care through Health Informatics, IGI Global, 2014, pp. 159-178.
  • [1]
    HawrylakP., NivethanJ., and PapaM., “Automating Electric Substations Using IEC 61850”, in Optimization and Security Challenges in Smart Power Grids, Springer Berlin Heidelberg, 2013, pp. 117-140.
  • [1]
    BrundageM., MavridouA., JohnsonJ., PapaM., and HawrylakP., “Distributed monitoring: A framework for securing data acquisition”, Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 2013, pp. 144-167.
  • [1]
    HawrylakP., HartneyC., HaneyM., HammJ., and HaleJ., “Techniques to model and derive a cyber-attacker’s intelligence”, Efficiency and Scalability Methods for Computational Intellect, 2013, pp. 162-180.
  • Hawrylak, Peter et al. “Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure.” Critical Information Infrastructure Protection and Resilience in the ICT Sector (2013): 173. Print.

  • [1]
    HawrylakP., OgiralaA., NormanB., RajgopalJ., and MickleM., “Enabling Real-Time Management and Visibility with RFID”, in Management Engineering for Effective Healthcare Delivery: Principles and Applications, IGI Global, 2012, pp. 172-190.
  • [1]
    HawrylakP., SchimkeN., HaleJ., and PapaM., “RFID in E-Health: Technology, Implementation”, Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments, 2012, p. 347.
  • [1]
    HawrylakP., SchimkeN., HaleJ., and PapaM., “RFID in E-Health: Technology, Implementation, and Security Issues”, in Telemedicine and E-Health Services, Policies and Applications: Advancements and Developments, IGI Global, 2012, pp. 347-368.
  • [1]
    HawrylakP., HaleJ., and PapaM., “Security Issues for ISO 18000-6 Type C RFID: Identification and Solutions”, in Developments in Wireless Network Prototyping, Design and Deployment: Future Generations, IGI Global, 2012, pp. 38-55.
  • G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

  • G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

  • [1]
    HawrylakP., CainJ., and MickleM., “Analysis Methods for Sensor Networks”, in Guide to Wireless Sensor Networks, Springer London, 2009, pp. 635-658.
  • [1]
    HawrylakP. and MickleM., “EPC Gen-2 Standard for RFID”, in RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, Taylor & Francis Group, CRC Press, 2009, pp. 97-123.
  • [1]
    MickleM., MatsL., and HawrylakP., “Resolution and integration of HF and UHF”, in RFID Technology and Applications, Cambridge University Press, 2008, pp. 47-60.
  • [1]
    HawrylakP., CainJ. T., and MickleM., “RFID Tags”, in The Internet of Things: from RFID to Pervasive Networked Systems, Taylor & Francis Group, 2008, pp. 1-32.
  • [1]
    TungS., “Layers of Security for Active RFID Tags”, in RFID Handbook: Applications, Technology, Security, and Privacy, CRC Press, Taylor and Francis Group, 2008, pp. 603-630.
  • [1]
    JonesA., “Minimum Energy/Power Considerations”, in RFID Handbook: Applications, Technology, Security, and Privacy, CRC Press, Taylor and Francis Group, 2008, pp. 199-230.
  • [1]
    MickleM., MatsL., and HawrylakP., “Physics and Geometry of RFID”, in RFID Technologies and Applications, Technology, Security, and Privacy, CRC Press, Taylor and Francis Group, 2008, pp. 3-16.

Courses Taught

  • Research and Dissertation
  • Computer Architecture
  • Advanced Hardware Architecture
  • Computer Engineering
  • Computer Hardware Techniques
  • Research and Thesis

Professional Affiliations

  • IEEE Computer Society
  • IEEE

Awards & Honors

  • Ted Williams Award
  • Zelimir Schmidt Award for Outstanding Researcher