[ Home | CV | Research | Fun | Contact ]


Research Statement---Sean W. Smith



From Arpanet to the Internet to the Web to pervasive computing, the world is changing rapidly. Computation, increasingly complex and distributed, continually penetrates into new areas of society and life. These changes raise challenges:

Since society tends to adopt new technology whether or not the security issues have been identified and addressed, these challenges become especially urgent.

I want to make a difference. This focus emerged in my early research: in graduate school, theoretical systems and security work; at Los Alamos, real-world security analysis for e-commerce and e-government.

This early work led me to three realizations:

My subsequent work at IBM Watson eliminated this barrier:

My research is now being used in thousands of installations worldwide, to secure applications ranging from banking, to postal meters, to movie and music distribution.

In my future work, I want to keep making a difference. I plan to demonstrate the potential (and limits) of the secure coprocessing technology I have already created, as well as to identify and rectify new security and privacy problems that are emerging.


Carnegie Mellon

In graduate school, my thesis work under Doug Tygar focused on some theoretical aspects of time and security in distributed systems. The traditional notion of time as a linear order on events may be appropriate for a uniprocessor, although some prior work had explored using partial orders for distributed systems---since if two events could not have influenced each other, their real-time order is irrelevant. My work had theory, algorithms, and security aspects: My work also used the technology of secure coprocessors to construct sealed vector timestamps, which addressed even more of these problems.

(In my advisor's lab, we had a handful of coprocessor prototypes from IBM, and had been considering the implications such technology could have, should it ever exist in a form that could be widely deployed.)

My formal research at CMU was complemented by my more immediate, hands-on work: with my advisor and fellow students, I assisted the U.S. Postal Inspection Service in analyzing vulnerabilities of postal franking systems---where fraud was costing the U.S. public an estimated $200 million annually.

Also, I served as a teaching assistant for three semesters, for three different levels of material---even though only one semester was required.


Los Alamos

After CMU, I received a post-doctoral appointment in the Computer Research and Applications Group (CIC-3) at Los Alamos National Laboratory (and subsequently earned conversion to permanent staff member).

In CIC-3, I joined a diverse team containing academic researchers---in security, distributed systems, and applied mathematics---as well as senior personnel directly involved in defending the Laboratory's extensive (and targeted) computing infrastructure. Besides pursuing our individual research, our team also undertook a series of consulting engagements for various government and private-sector entities who were migrating their operations into new computational and Web environments, and turned to us for education, security analysis, and design advice.

This work extended my experience about design, attack, and defense of real systems, and clarified for me the urgency of the security and privacy problems created by society's migration to e-commerce and e-government.

As part of this work:

As noted earlier, I distilled from this work that a fundamental problem in many of the e-commerce and e-government settings was the dissociation of dependency from control, and that secure coprocessors---like the IBM prototypes we had back at CMU---could provide a way to systematically address these problems. As a result, I developed a proposal to explore the use of secure coprocessors to address some security and authentication problems at the Laboratory. I promptly ran into an impasse:




IBM Watson

In an attempt to correct the lack of a secure coprocessor platform for real applications, I contacted IBM Watson (the source of early hand-built prototypes we had at CMU). They responded by hiring me as a Research Staff Member, and chartering me to change the state of the art: (The team had already begun a basic hardware design: physical security; 486-class CPU; DES, RNG, and modular math hardware.)

My research work had five main parts.




What's Next

I joined Watson---and built and validated a generic secure coprocessor platform---because, in 1996, I believed this technology could solve many of the trust problems emerging in the Internet, e-commerce, and e-government. (This report documents the taxonomy of potential applications I perceived then.)

In 2000, I still believe this. As part of my future work, I want to finish the work I outlined in that tech report: in particular,

(I have several exciting applications in progress.)

However, I also want to move into new terrain, and to identify and characterize new security and privacy problems that are emerging with new technology. One area that is particularly promising is Pervasive Computing: scientists at IBM, MIT, and elsewhere are proposing visions of small portable devices that become a user's universal portal for communication and computation.

Roughly speaking, the proposed Pervasive Computing world is much like the current Web infrastructure, only more so. Consider all the daily tasks for which one currently uses a browser; Pervasive Computing proposes even more tasks, more connectivity, and more executable content, from a larger network.

Each of these amplified areas raises new security risks. For example:

At Carnegie Mellon, I learned how to do research; at Los Alamos, I learned the urgency of e-commerce and e-government problems; and at IBM Watson, I was able to carry out research that, in conjunction with a product effort, did something about some of these problems. I plan to keep making a difference.


Recommended Papers

The detailed security architecture:

Tales of the world's first FIPS 140-1 Level 4 validation:

An overview of the design issues facing someone who wants to build a generic secure coprocessor platform:

















[ Home | CV | Research | Fun | Contact ]