Search

Mark E Scott-Nash

from Boulder, CO

Also known as:
  • Mark Edward Scott-Nash

Mark Scott-Nash Phones & Addresses

  • Boulder, CO

Work

  • Company:
    Snow dragon cyber security research
    Sep 2016
  • Position:
    Freelance cyber security researcher

Education

  • Degree:
    Bachelors, Bachelor of Science
  • School / High School:
    University of Colorado Boulder

Skills

Security Architecture Design • Cryptography • Encryption • System Architecture • Firmware • Debugging • Perl • Embedded Systems • C • Arm • Unix • Linux • Fpga • Soc • Scsi • Python • C++ • Java • Android Development • Physics • Published Author • Electronics Hardware Design • Software Design • Embedded Software • Computer Security • Threat Modeling • Side Channel Analysis and Mitigation • Reverse Engineering • Public Key Cryptography

Ranks

  • Certificate:
    Amateur Radio Extra Class

Interests

Disaster and Humanitarian Relief

Industries

Computer & Network Security

Us Patents

  • Storage Drive Based Antimalware Methods And Apparatuses

    view source
  • US Patent:
    20120159041, Jun 21, 2012
  • Filed:
    Dec 17, 2010
  • Appl. No.:
    12/971670
  • Inventors:
    Paritosh Saxena - Portland OR, US
    Nicholas D. Triantafillou - Portland OR, US
    Paul J. Thadikaran - Rancho Cordova CA, US
    Mark E. Scott-Nash - Boulder CO, US
    Sanjeev N. Trika - Portland OR, US
    Akshay Kadam - Bangalore, IN
    Karthikeyan Vaidyanathan - Bangalore, IN
    Richard Mangold - Forest Grove OR, US
  • International Classification:
    G06F 12/14
    G06F 12/02
  • US Classification:
    711103, 711163, 711E12008, 711E12093
  • Abstract:
    An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.
  • Certification Of A Virtual Trusted Platform Module

    view source
  • US Patent:
    20140006776, Jan 2, 2014
  • Filed:
    Jun 29, 2012
  • Appl. No.:
    13/537329
  • Inventors:
    Mark Scott-Nash - Boulder CO, US
    Alberto Munoz - Los Altos CA, US
    Simon Johnson - Beaverton OR, US
    Asher Altman - Bedford MA, US
  • International Classification:
    G06F 21/00
    H04L 29/06
  • US Classification:
    713156, 713189
  • Abstract:
    A technique includes on a physical platform, providing a supervisor to manage a lifecycle of a virtual trusted platform module. The technique includes using the supervisor to sign a certificate for an attestation identity key used by the virtual trusted platform module.
  • Virtual Trusted Platform Module

    view source
  • US Patent:
    20140007087, Jan 2, 2014
  • Filed:
    Jun 29, 2012
  • Appl. No.:
    13/537347
  • Inventors:
    Mark Scott-Nash - Boulder CO, US
    Alberto Munoz - Los Altos CA, US
    Asher Altman - Bedford MA, US
  • International Classification:
    G06F 9/455
  • US Classification:
    718 1
  • Abstract:
    A technique includes providing a virtual trusted platform module for a virtual machine and containing the virtual trusted platform module within a secure enclave of a physical platform.
  • Encryption / Decryption In Parallelized Data Storage Using Media Associated Keys

    view source
  • US Patent:
    20100128874, May 27, 2010
  • Filed:
    Nov 25, 2008
  • Appl. No.:
    12/323316
  • Inventors:
    Mark E. Scott-Nash - Boulder CO, US
  • International Classification:
    H04K 1/00
  • US Classification:
    380255
  • Abstract:
    A method and system to allow encryption/decryption to be performed substantially in parallel using one or more media associated keys. The system has an input buffer to store a plurality of media data from a plurality of media channels. A plurality of cryptographic engines is coupled with the input buffer to obtain a plurality of cipher keys and each cipher key is associated with one or more of a plurality of media channels The system encrypts or decrypts, substantially in parallel, each of the plurality of media data with a cryptographic algorithm using one or more of the obtained cipher keys.
  • Digital Brokerage Service For Iot Micro Compute Services

    view source
  • US Patent:
    20180096412, Apr 5, 2018
  • Filed:
    Sep 30, 2016
  • Appl. No.:
    15/282719
  • Inventors:
    Mark E. Scott-Nash - Arvada CO, US
    Howard C. Herbert - San Tan Valley AZ, US
  • International Classification:
    G06Q 30/06
    H04L 29/06
    G06Q 20/12
  • Abstract:
    In some embodiments, the disclosed subject matter involves a digital brokerage service to match data, services and compute capacity of subscribers and publishers in a trusted execution environment (TEE). In an embodiment, data is generated by an Internet of Things IoT device. Publishers register available resources with the digital brokerage service, including TEE capabilities. Subscribers request data or services with a quality of service or service level agreement requirements and define required TEE capabilities. Other embodiments are described and claimed.
  • Pourable Smart Matter

    view source
  • US Patent:
    20170284797, Oct 5, 2017
  • Filed:
    Mar 31, 2016
  • Appl. No.:
    15/087264
  • Inventors:
    - Santa Clara CA, US
    Mark E. Scott-Nash - Boulder CO, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    G01B 21/02
    E21B 47/00
  • Abstract:
    There is disclosed in an example, a pourable smart matter having a plurality of compute nodes, the compute nodes having: a mechanical structure having a plurality of faces, the faces having abutting face detectors; a network interface; and one or more logic elements comprising a positional engine to: identify a neighbor compute node abutting at least one of the faces; and build an individual positional profile based at least in part on the identifying. The pourable smart matter may be used, for example, to determine the geometry or volume of a container.
  • Trusted Computing Resource Meter

    view source
  • US Patent:
    20170177417, Jun 22, 2017
  • Filed:
    Dec 22, 2015
  • Appl. No.:
    14/977952
  • Inventors:
    - Santa Clara CA, US
    Jennifer Eligius Mankin - San Jose CA, US
    Simon Hunt - Naples FL, US
    Venkata Ramanan Sambandam - Sunnyvale CA, US
    Mark E. Scott-Nash - Boulder CO, US
    Katalin Klara Bartfai-Walcott - El Dorado Hills CA, US
    Rameshkumar Illikkal - Folsom CA, US
  • Assignee:
    McAfee, Inc. - Santa Clara CA
  • International Classification:
    G06F 9/50
    H04L 12/911
  • Abstract:
    In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave; execute the external workload within the TCM enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a TCM agent, and a method of providing a TCM agent.
  • Roots-Of-Trust For Measurement Of Virtual Machines

    view source
  • US Patent:
    20150286582, Oct 8, 2015
  • Filed:
    May 29, 2015
  • Appl. No.:
    14/725903
  • Inventors:
    - SANTA CLARA CA, US
    Mark E. Scott-Nash - Boulder CO, US
  • International Classification:
    G06F 12/14
    G06F 9/455
    G06F 21/64
  • Abstract:
    Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.

Resumes

Mark Scott-Nash Photo 1

Senior Firmware Engineer

view source
Location:
Denver, CO
Industry:
Computer & Network Security
Work:
Snow Dragon Cyber Security Research
Freelance Cyber Security Researcher

Intel Corporation Mar 2008 - 2016
Security Researcher and Architect

Broadcom Apr 2007 - Feb 2008
Systems Engineer, Data Security

Cornice May 2005 - Apr 2007
Principal Firmware Engineer and Security Architect

Blockchain Startup (Stealth Mode) May 2005 - Apr 2007
Senior Firmware Engineer
Education:
University of Colorado Boulder
Bachelors, Bachelor of Science
Skills:
Security Architecture Design
Cryptography
Encryption
System Architecture
Firmware
Debugging
Perl
Embedded Systems
C
Arm
Unix
Linux
Fpga
Soc
Scsi
Python
C++
Java
Android Development
Physics
Published Author
Electronics Hardware Design
Software Design
Embedded Software
Computer Security
Threat Modeling
Side Channel Analysis and Mitigation
Reverse Engineering
Public Key Cryptography
Interests:
Disaster and Humanitarian Relief
Certifications:
Amateur Radio Extra Class
License Ak0Rn
Federal Communications Commission, License Ak0Rn

Get Report for Mark E Scott-Nash from Boulder, CO
Control profile