I am a Staff Software Engineer at Google in Platforms Infrastructure Engineering (PIE) working on the OpenTitan project.
My experience lies in the development of Root-of-Trust hardware for the purpose of securing data center and client devices to power the AI revolution. For the past four years I have been part of the core team developing the first ever open source hardware Root-of-Trust/secure element: OpenTitan. I am the most active software contributor on the OpenTitan project, and have led several work streams that resulted in the first successful tapeout and bring-up last year. I have deep experience in embedded systems software development, DICE attestation, secure boot, code-signing/HSMs, secure hardware provisioning, fuzzing, and even IC design (from development and verification to tapeout and bringup). I also have a background in low-level security research, where I have published several top-tier conference papers (e.g, USENIX, Oakland, CHES).
Computer Science & Engineering
University of Michigan
Computer Science & Engineering
University of Michigan
Computer Engineering
Purdue University
Category: IT/Electrical
Project:
Defensive Wire Routing for Unstrusted IC Fabrication
Press:
R&D World,
MIT News,
Lincoln Laboratory News
Project: Smart Microwave
Category: Cellular and Molecular Biology
Project: Low-Cost Electroporator
Minor Planet named after me by MIT Lincoln Laboratory LINEAR
Link (search “Timtrippel”)
Project: Low-Cost Electroporator
2024 - First OpenTitan Tapeout |
|
---|---|
Nuvoton | "Nuvoton Develops OpenTitan® based Security Chip as Next Gen Security Solution for Chromebooks" |
lowRISC | "OpenTitan® Partnership Makes History" |
Google Open Source Blog | "OpenTitan RTL Freeze" |
2020 - Defensive Wire Routing for Unstrusted IC Fabrication |
|
---|---|
R&D World | "Defensive Wire Routing for Untrusted Integrated Circuit Fabrication " |
MIT News | "Eight Lincoln Laboratory technologies named 2020 R&D 100 Award winners" |
MIT Lincoln Laboratory News | "Lincoln Laboratory technologies named 2020 R&D 100 Award winners" |
2017 - Spoofing MEMS Accelerometers with Acoustics |
|
---|---|
New York Times | "It’s Possible to Hack a Phone With Sound Waves, Researchers Show" |
CNBC | "Hacking With Sound" |
University of Michigan News | "Sonic cyber attack shows security holes in ubiquitous sensors" |
EE Journal | "Cracking a WALNUT: A Novel Physical Attack on Accelerometers" |
IEEE Spectrum | "Smartphone Accelerometers Can Be Fooled by Sound Waves" |
Science Friday | "Hacking Via Sound" |
Gizmodo | "Hackers Can Now Use Sound Waves to Take Control of Your Smartphone" |
Fortune | "You Can Hack Fitbits and Smart Phones Using Sound, Researchers Say" |
CNET | "These researchers can hack your phone with sound waves" |
Tom's Hardware | "'Walnut' Attack Uses Sound To Trick Sensors In Cars, Phones, And Other Devices" |
The Register | "Boffins Rickroll smartphone by tickling its accelerometer" |
Engineering.com | "Hacking Sensors with Sound Waves" |
Hacker News | "WALNUT Attack on MEMS Accelerometers" |
If you like this site and are looking for a simple static site generator written in Python, checkout the source code hosted on GitHub. It's contains a BSD 3-clause license and is 100% free to copy/use/modify!