Sasha Romanosky, PhD
A passion for research

Publications | Presentations | Industry Projects 

Greetings!

I research topics on the economics of security and privacy, AI, cyber crime, cyber insurance, and national security. I am a Senior Policy Researcher at the RAND Corporation, a faculty member of the Pardee RAND Graduate School, and an affiliated faculty in the Program on Economics & Privacy at the Antonin Scalia Law School, George Mason University. My research has appeared in journals such as the Journal of Policy Analysis and Management, the Journal of Empirical Legal Studies, the Journal of Cybersecurity, the Journal of National Security Law and Policy, the Berkeley Technology Law Journal, International Journal of Intelligence and CounterIntelligence, and ACM's Digital Threats: Research and Practice (DTRAP).

I earned a Ph.D. in Public Policy and Management from Carnegie Mellon University and a B.S. in Electrical Engineering from the University of Calgary, Canada. I was a Microsoft research fellow in the Information Law Institute at New York University School of Law, and a security professional for over 10 years in the financial and e-commerce industries. In addition, I am one of the original authors of the Common Vulnerability Scoring System (CVSS), an international standard for scoring computer vulnerabilities, and a co-creator of the Exploit Probability Scoring System (EPSS), an emerging standard for estimating the probability of a vulnerability being exploited in the wild.

It was my pleasure and honor to serve as a Cyber Policy Advisor in the Office of the Secretary of Defense for Policy (OSDP) at the Pentagon, where I oversaw the Defense Department's Vulnerability Equities Process (VEP), the Vulnerability Disclosure Program (VDP), and other cyber policy matters, for which I received the Defense Medal for Exceptional Public Service.

I was also appointed to DHS's Data Privacy and Integrity Committee (DPIAC), which advised the Secretary of Homeland Security and DHS's Chief Privacy Officer on policy, operational, and technology issues.


I can be reached at sasha.romanosky [at] gmail.com.

Academic Research

My research is motivated by cybersecurity and ways to understand and mitigate cyber risks for network defenders and policymakers. Specifically, my efforts concern the following areas: AI risks, cyber insurance, cybercrime, and software vulnerability scoring.

Managing Vulnerabilities in AI Systems.
Generative AI tools (including LLMs) are showing amazing capabilities for personal and professional uses. However, they also present unique risks due to the stochastic nature of the transformer and neural network. These systems produce vulnerabilities that — unlike typical software vulnerabilities — are fundamentally unpatchable, such as jailbreaking, direct and indirect prompt injections, and other vulnerabilities that enable evasion and extraction attacks. I have a great interest in understanding these vulnerabilities, and developing ways to assess and manage their risks. In effect, this is about building a Vulnerability Management framework for AI systems.
In addition, these tools have the capability to change the cyber offense-defense balance. On one hand, they may be able to find vulnerabilities at scale, while on the other hand, they may also be able to autonomously exploit each of these vulnerabilities. While AI systems aren’t quite capable of this at scale, my research seeks to better capture and track these capabilities, which may help serve as early warning systems to inform policymakers, developers, and users.

Cyber Insurance.
Cyber insurance is such an interesting field, in part because of the evolving nature of the attack surface (more applications, with more vulnerabilities, and more connected devices), as well as an evolving set of threat actors developing new techniques to exploit victim networks. Together this creates more opportunities for attritional (day to day) and catastrophic cyber incidents. Understanding the role of cybersecurity controls, as well as policy interventions to both reduce and manage losses from these events is becoming increasingly important. For example, a pressing issue is the role of the federal government in facilitating an insurance response that can be invoked to ensure continuity of both the private economy and government functions. See here, here, and here.

Cybercrime.
I built a semi-automated pipeline that can identify the universe of federal crimes, collect their docket filings, and apply natural language processing (NLP), network analysis, and regression methods to understand the features and communities of cases and related charges. I applied this pipeline to federal cyberstalking cases and our research team was able to identify some wonderful insights. See here and here.

Software Vulnerability Scoring.
I am also very proud to be part of volunteer and standards-building efforts to study software vulnerabilities and develop tools to measure their severity and exploitation. For example, I am one of the original authors of the Common Vulnerability Scoring System (CVSS) in the early 2000s, which has long been an international standard (ITU X.1521). See https://www.first.org/cvss for more information.

In addition, I am one of the creators of the Exploitation Prediction Scoring System, EPSS. In recent years, it became apparent that CVSS was a poor measure of real-world exploitation. That limitation led us to build an entirely data-driven, machine-learning model for estimating the probability of any vulnerability being exploited in the wild. Much as with other standards like CVE, CWE, and CVSS, EPSS filled a specific gap, and I’m happy to see it quickly gaining wide adoption. See https://ieeexplore.ieee.org/document/10190703. Also, for anyone interested in learning more about exploitation or contributing to this standard, please join the working group at https://www.first.org/epss/.


Publications (click to expand)

Presentations (click to expand)

Industry Projects (click to expand)

Publications | Presentations | Industry Projects