[
Home |
CV |
Research |
Fun |
Contact
]
CV---Sean W. Smith
Education
B.A., 1987.
Mathematics ,
Princeton University, .
Magna cum laude, Phi Beta Kappa, Sigma Xi.
Advisor: Andrew Appel
Thesis: The Apparent Link Between Typability and Computational Complexity
in Lambda-Calculus
M.S., 1988. Ph.D., 1994.
Computer Science ,
Carnegie Mellon University.
Advisor: Doug Tygar .
Thesis: Secure Distributed Time for Secure Distributed Protocols
Employment
Los Alamos National Laboratory.
Post-doctoral Research Associate, 1994-1996.
Technical Staff Member, 1996-1996.
Computer Research and Applications Group (CIC-3)
IBM T.J. Watson Research Center.
Research Staff Member, 1996 - present.
Secure Systems and Smart Cards
Refereed Papers
Early complexity work:
Security and privacy aspects of thesis work:
Fault tolerance aspects of thesis work:
Research suggested by my Los Alamos analyses:
Secure coprocessing work at Watson:
-
The design space, if one wants to build a generic secure coprocessor platform:
S.W. Smith, E. Palmer, S.H. Weingart.
"Using a High-Performance, Programmable Secure Coprocessor."
2nd International Conference on Financial Cryptography. (Springer-Verlag LNCS.) February 1998.
PDF (167K),
PS (164K) .
-
Our preliminary formal modeling strategy:
S.W. Smith, V. Austel.
"Trusting Trusted Hardware: Towards a Formal Model for Programmable
Secure Coprocessors."
3rd USENIX Workshop on Electronic Commerce. August 1998.
PDF (233K),
PS (243K).
-
The security architecture:
S.W. Smith, S.H. Weingart.
"Building a High-Performance, Programmable Secure Coprocessor."
Computer Networks (Special Issue on Computer Network Security.)
31: 831-860. April 1999.
Draft: PDF (192K),
PS (471K).
-
Tales of the world's first FIPS 140-1 Level 4 validation:
S.W. Smith, R. Perez, S.H. Weingart, V. Austel.
"Validating a High-Performance, Programmable Secure Coprocessor."
22nd National Information Systems Security Conference. October 1999.
PDF (96K),
PS (94K).
-
What's in our system software layer, and why:
J. Dyer, R. Perez, S.W. Smith, M. Lindemann.
"Application Support Architecture for a High-Performance, Programmable
Secure Coprocessor."
22nd National Information Systems Security Conference. October 1999.
PDF (91K),
PS (141K).
Selected Technical Reports and Analyses
CMU technical reports:
- S.W. Smith, J.D. Tygar.
Signed Vector Timestamps: A Secure Protocol for Partial Order Time.
Computer Science Technical Report CMU-CS-93-116.
Carnegie Mellon University. October 1991 (version of February 1993).
PDF (177K),
PS (172K).
- S.W. Smith, C. Sturtivant.
Fixed Points in Spectral Complexity.
Computer Science Technical Report CMU-CS-92-190.
Carnegie Mellon University. October 1992.
PDF (167K),
PS (166K).
- S.W. Smith.
A Theory of Distributed Time.
Computer Science Technical Report CMU-CS-93-231.
Carnegie Mellon University. December 1993.
PDF (704K),
PS (1.1M).
- S.W. Smith.
Secure Distributed Time for Secure Distributed Protocols
(Ph.D. Thesis.) Computer Science Technical Report CMU-CS-94-177.
Carnegie Mellon University. September 1994.
PDF (1.1M) ,
PS (2.4M) .
Security handbooks:
-
J. Hochberg, S.W. Smith, et al.
Kiosk Security Handbook.
Los Alamos Unclassified Release LA-UR-95-1657, 1995. 150+ pp.
(Distributed by the U.S. Department of Energy and the U.S. Postal Service.)
Project lead, for second half.
-
S.W. Smith, G. Christoph.
Internet Security Handbook.
Los Alamos Unclassified Release LA-UR-97-1050, 1997. 150+ pp.
(Distributed by the U.S. Department of Energy)
Project lead.
Security analyses for e-government and e-commerce:
Taxonomy of applications that secure coprocessing might enable:
-
S.W. Smith.
"Secure Coprocessing Applications and Research Issues."
Los Alamos Unclassified Release LA-UR-96-2805, 1996.
PDF (81K) ,
PS (175K) .
Selected IBM reports:
-
S.W. Smith, et al.
IBM 4758 Miniboot Documentation for FIPS.
IBM Confidential, August 1998, 500+ pp.
Technical lead, primary author.
-
S.W. Smith.
IBM 4758 Outbound Authentication API.
May 1999.
Architect, lead programmer (and manual writer).
-
S.W. Smith, et al.
IBM 4758 CP/Q++ Documentation for FIPS.
(in progress)
Technical lead, primary author.
Patents
9 pending, on computer security technology and applications.
3 more to be filed 2Q2000
Mathematics tutor, Princeton.
Teaching assistant, Carnegie Mellon:
- Theory Qualifier (CS Ph.D. Program)
- Introductory Data Structures and Programming (Undergraduate Program)
- Distributed Systems (Master's in Information Networking Program)
Multi-day internet security seminars for various gov't clients. 1995-1996.
(with G. Christoph and M. Neumann)
Customer training seminars, IBM.
Talks
Over two dozen external talks in the last five years, including:
-
University of California at San Diego, November 1997.
-
University of Michigan, April 1998.
-
Purdue University, April 1998.
-
MITRE/Jason, June 1998.
-
Harvard University, 1998 (panel).
-
Columbia University, November 1998.
-
National Security Agency, July 1999.
-
Naval Postgraduate School, August 1999.
Honors
- SSA Deputy Commissioner's Citation (with team). January 1996.
-
IBM Research Division Technical Group Award (with team). September 1997.
-
IBM First Plateau Invention Achievement Award. November 1997.
-
IBM Outstanding Innovation Award. June 1999.
-
IBM Academy of Technology, Security Consultancy. August 1999.
-
NIST Award for Validation of Cryptographic Module (with team). October 1999.
-
IBM Second Plateau Invention Achievement Award. November 1999.
-
IBM Outstanding Accomplishment Award, for FIPS 140-1 Level 4 Validation (with team). December 1999.
-
Bronze Patch, U.S.
Orienteering Federation. January 2000.
[
Home |
CV |
Research |
Fun |
Contact
]