University of Cincinnati - Cincinnati Area since Oct 2007
Graduate Researcher
Cincinnati Children's Hospital Medical Center - Cincinnati Area since Jul 2012
Application Developer
Erebus Labs Ltd. - Ohio, Wyoming since Jun 2011
R&D Lead
University of Cincinnati - Cincinnati Area Jun 2009 - Jul 2012
NSF GK-12 Fellow and Grants Coordinator
University of Cincinnati Mar 2011 - Jun 2012
Adjunct Instructor
Education:
University of Cincinnati 2007 - 2013
Doctor of Philosophy (Ph.D.), Computer Science and Engineering, VLSI Systems
University of Cincinnati 2002 - 2007
BS, Computer Engineering, VLSI, Mathematics
Skills:
C++ Algorithms Python Software Engineering Perl Programming Matlab Research Latex Statistics Machine Learning Cryptography Engineering C Computer Science Data Analysis Vlsi Distributed Systems Unix Mentoring Simulations Linux Teaching Physics Optimization Team Management Vhdl Php Project Management Software Development Mysql R High Performance Computing Signal Processing Computer Architecture Embedded Systems R&D Javascript Parallel Computing Numerical Analysis Research and Development Mongodb Hardware Security Large Scale Data Analysis Sql Security Research Eda Formal Methods Microsoft Office
Interests:
Data Analytic Cryptography Proof of Concept Development Environment Education Autonomous Systems Cycling Algorithms Science and Technology Running Stem Integration Novel Solution Space Exploration Data Isolation Dataextraction
Languages:
English French
Certifications:
R Programming Statistical Inference Reproducible Research Exploratory Data Analysis The Data Scientist’s Toolbox A Crash Course In Data Science License 2Grfwhubcw License 4Cfgyygfts License 873Tuj3Dwv License F3Xnk3Ad5L License F6M9Jm95Dj License Erkanlh2Yzrj
Philip A. Wilsey - Cincinnati OH, US Roy Brian Anderson - Cincinnati OH, US Mike Borowczak - North Canton OH, US
Assignee:
CLIFTON LABS, INC. - Cincinnati OH
International Classification:
G06F 12/00
US Classification:
711163, 711E12093
Abstract:
Described are a self-protecting storage device and method that can be used to monitor attempts to access protected information. Access is allowed for authorized host systems and devices while unauthorized access is prevented. Authorization use includes inserting a watermark into access commands, such as I/O requests, sent to the storage device. The access commands are verified before access is permitted. In one embodiment, block addresses in I/O requests are encrypted at the host device and decrypted at the self-protecting storage device. Decrypted block addresses are compared to an expected referencing pattern. If a sufficient match is determined, access to the stored information is provided. Self-protection can be provided to a range of storage devices including, for example, SD flash memory, USB thumb drives, computer hard drives and network storage devices. A variety of host devices can be used with the self-protecting storage devices, such as cell phones and digital cameras.