The TCG Annual Award Program Honorees for 2022 were acknowledged during the TCG Annual Members Meeting.
Jim Hatfield has been in the computer storage industry since 1978, as a general programmer, software engineer, firmware engineer, and most recently, standards representative.
He has made significant contributions to the SATA and NVMe storage interfaces, and their respective standards communities. In the storage security realm, Jim has been contributing since 2002, starting with proprietary security for ATA storage devices. In addition to TCG, he made substantial contributions to security standards in SNIA, and IEEE. Jim is one of the chief champions of storage sanitization, including the recently published IEEE 2883 Standard for Sanitizing Storage.
Jim became involved with TCG through a colleague in 2005, and has been an active contributor and co-chair of the Storage WG, contributor to the Organizational Efficiency Committee (OEC), and several others as they periodically interacted with the Storage WG. Jim served as a Contributor Advisor in 2019.
Jim is retired, and was formerly employed by Seagate Technologies. Nonetheless, he continues to be involved in storage security standards in TCG and IEEE.
Paul has been active in the field of hardware-based security and Trusted Computing for more than 20 years. He introduced the concepts of attestation, sealing, and PCRs to the original TPM specification, and led the Microsoft team that delivered the TPM2.0 specification and reference implementation. He is also the original author of the TPM tester and TPM software-bindings for several programming languages.
Paul has led or contributed to many related technologies, including DRTM, and various flavors of secure and authenticated boot. Paul also co-designed or advocated for many of the processor based “enclave” security isolation technologies we use today. Paul also developed the DICE concept, which is now standard in many microprocessors. Most recently he has been developing technology for improved device recovery and resilience, both in TCG and other venues.
Paul works with teams across Microsoft to deliver products and features based on hardware security innovations. This has included Bitlocker, Windows Hello, and extensive use of DICE in our data center infrastructure.
Most recently, Paul has been working on developing provenance technologies for digital media, partly as a hedge against deep fakes and other sorts of misinformation.
Paul leads a team of security researchers and engineers in Microsoft Research. He has a Ph.D in condensed matter physics and is a member of the National Academy of Engineering.
Ned is a Principal Engineer in the System Security Privacy and Mitigation group. He leads the Attestation Core Team which is a cross-Intel team that addresses architectural and design challenges for attestation and hardware roots of trust.
He co-chairs the Remote Attestation Procedures (RATS) working group in the Internet Engineering Task Force (IETF) and the Attestation Working Group (ATWG) in the Trusted Computing Group (TCG). Ned has also held chair positions in the TCG’s Infrastructure and Trusted Network Connect working groups. Ned has authored more than 30 industry standards related to trusted computing, device identity, network security, IoT security and attestation. He received the 2019 Key Contributor and 2022 Leadership awards from the TCG.
He has contributed to several key Intel technologies including Intel vPro, Intel Authenticate, Intel CSME, Intel Trusted Execution Technology, Intel Platform Trust Technology, Intel Anti-theft Technology, Intel Software Guard Extension, Intel Trust Domain Extensions, Device Identity Composition Engine, and Intel Key Generation Facility. He has contributed to several Intel Technical Strategic Long-Range Plans (TSLRP) including the 2022 Cloud to Edge Security topic. He holds 354 US patents, has received 6 Top Inventor awards and three division recognition awards. He co-authored a book on IoT security, “Demystifying Internet of Things Security,” APress Publishers, August 2019. He has 8 peer reviewed academic publications and is an associate editor for IEEE Consumer Electronics Magazine.
Dr. Joshua Schiffman is a senior security researcher and Master Technologist in HP Inc., where he leads HP Labs’ research strategy for lifetime device management and supply chain security. Schiffman has over 16 years of experience in systems security academic and industrial research with over 27 peer reviewed publications and 17 granted patents. He is also Co-Chair of the Trusted Computing Group’s Technical Committee, which is the oversight body for technical standards development. His current research focus is on supply chain security, cryptographic device and component identities, and fleet-wide device monitoring and integrity verification. Schiffman completed his PhD in computer security at Penn State and was previously at AMD’s security architecture group.
Chris is working on completing his TCG Pokedex, but currently focuses his efforts in TPM (as a workgroup chair), Compliance PC-TPM, and the Technical Committee. His current special projects are post-quantum cryptography and TPM firmware self-attestation.
After graduating from the University of Oklahoma, Chris fell in love with the Pacific Northwest and moved to Seattle. He got his start in Trusted Computing nine years ago as an intern at Microsoft, and now works at Google on datacenter platform security and boot attestation.
Chris lives in Kirkland, Washington with his wife, Anna, and their two dogs, Jock and Matilda. If he’s not doing something weird with a TPM, he’s probably trapped in either an escape room or an 8-hour-long board game.
Mr. Kuroishi has been a Security Architect in Fujifilm (ex Xerox) since 1997. He has been engaged in research and development of various controllers in multi-function printers and copiers for over a quarter century. In particular, he has been developing the skills and knowledge of their security as well as network infrastructure. He designed some controllers to get “Hard Copy Device Protection profile” certification by IPA (Information-Technology Promotion Agency, Japan), which made Fujifilm compliant with NIST standards.
Recently, he realized the value of global standardization in the security area and have adopted TPM chip in the security architecture design for controllers. He also pushed his company to participate in TCG, in order to make their products more secure. Mr. Kuroishi’s contributions towards JRF/TCG include studying TCG’s working groups, summarizing their activities, focuses, and statuses, and compiling the information into a single document, encouraging greater participation amongst JRF members. He has also identified crucial technology for Japanese companies to promote their expertise in the security industry during JRF’s annual Security Open Workshop.
Festus Hategekimana is an SSD security architect at Solidigm Technology and is currently serving in TCG storage workgroup as the editor of the TCG Key Per IO SSC specification. Festus holds a PhD in computer engineering from the University of Arkansas where he focused on developing isolation security frameworks for enabling secure FPGA sharing in multi-tenants cloud systems.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.