Participation Recognition
The TCG Annual Award Program Honorees for 2025 were acknowledged during the TCG Annual Members Meeting.
2025 Frank Molsberry Distinguished Service Award
Chris Fenner, Google

Chris Fenner is a Staff Software Engineer at Google working on datacenter platform security. His main projects are (1) attestation systems for production, and (2) driving alignment with external standards for the systems in (1). He co-chairs the TPM working group and represents Google on TCG’s Technical Committee. Most recently, he has been working on streamlining TCG’s document authoring workflows and adding ML-DSA and ML-KEM to the TPM 2.0 Specification, to help TCG and its customers defend themselves from quantum-capable adversaries. He considers himself an “applied applied cryptographer” and one day aspires to reach the level of “applied cryptographer.”
2025 Leadership Award
Ga-Wai Chin, Infineon

Ga-Wai is a Principal Product Definition Engineer at Infineon Technologies working on TPM and other security products.
She joined the TCG in 2011 and is an active member and contributor to the Technical Committee, TPM, Security Evaluation and Server Workgroup, where she served as editor of TCG’s TPM Communication over SPDM Secure Session specification.
Guy Fedorkow, HPE

Guy C. Fedorkow received his BASc and MASc in Engineering at University of Toronto and went on to develop both packet-switching technology and high-throughput parallel computer architectures at Bolt, Beranek and Newman in Cambridge, MA. At Cisco Systems, he contributed to hardware design and system architecture for cell-switching and high-scale internet service provider routers. Continuing at Juniper Networks, he has served as system architect for high-throughput Internet service provider products. Guy is currently working on trusted computing technologies to protect underlying computational infrastructure in router, switch and firewall products at Juniper Networks and Hewlett Packard Enterprise and is a Fellow in the MIT Connection Sciences group.
2025 Key Contributors
Fabien Arrive, STMicroelectronics

Fabien ARRIVE is a Senior Software Architect working at STMicroelectronics for 12 years in the development of secure software for TPM1.2 and TPM2.0 products. He has contributed to the development and the certifications (FIPS 140-2/3, ESV and CC) of the ST33TPHF2E / ST33TPHF2X / ST33KTPM2X products family from STMicroelectronics. His skills cover different domains related to TPMs like secure software development, cryptography, firmware upgrade architecture and FIPS 140-2/3 certifications.
He regularly participates in different TCG WGs and has notably contributed to the FIPS 140-2 and 140-3 guidances documents (SEWG) or more recently to proposals of add-ons in the ISO 15118-20 for Ed448 support (VSWG) or amendments in the TCG SPDM specification (ServerWG).
Before STMicroelectronics, Fabien had been working for 10 years on 2G/3G/4G technologies as software developer at ST-Ericsson and signal processing engineer at Motorola Inc. He holds an engineering degree in Electronics and Communication Systems from the National Institute of Applied Sciences (INSA) of Rennes, France. He is author and co-author of 3 patents.
Eric Hibbard, Samsung

Eric A. Hibbard is the Director, Product Planning – Security at Samsung Semiconductor, Inc. and a cybersecurity and privacy leader with experience in industry, U.S. Government, and academia. This experience includes architecting and auditing information and communications technology (ICT) infrastructures and solutions associated with a wide range of technologies (IoT, cloud, storage, big data, AI, smart cities, blockchain) in organizations throughout the world.
Mr. Hibbard holds leadership positions in standards development organizations including ISO/IEC, INCITS/Cybersecurity & Privacy, and IEEE Cybersecurity & Privacy Standards Committee. He has served in an editorship role for the ISO/IEC 22123 (Cloud computing) series, the ISO/IEC 27050 (Electronic discovery) series, ISO/IEC 27040 (Storage security), ISO/IEC PAS 20648 (TLS for storage systems), ISO/IEC 27404 (Consumer IoT labeling framework), ISO/IEC 19086-4 (Cloud SLA Framework – Security and privacy), IEEE 1619-2018 (XTS-AES), and IEEE P3454 (Cloud operational resilience framework).
Mr. Hibbard has been involved with the Trusted Computing Group, starting in 2004. His focus has been in the Storage WG where he is currently serving as the editor for multiple specifications. He is also an active member of the DICE and Attestation WGs.
Mr. Hibbard possesses a unique set of professional credentials that includes the (ISC)2 CISSP-ISSAP, ISSMP, and ISSEP certifications; IAPP FIP, CIPP/US, and CIPT certifications; ISACA CISA and CDPSE certifications; and CSA CCSK certification. He has a BS in Computer Science.
Michael Eckel, Fraunhofer SIT

Michael is deputy head of department and a cybersecurity researcher at Fraunhofer SIT and recently completed his doctoral degree in Computer Science, specializing in cybersecurity. He is also a certified TeleTrusT Information Security Professional (T.I.S.P.). His professional background includes working as a security engineer at Huawei Technologies, as well as a mobile, web, and software developer for several companies and as an independent freelancer. He currently serves as co-chair of the Trusted Computing Group’s Network Equipment Work Group, where he focuses on securing vulnerable network infrastructures, and contributes to several other TCG work groups.
Beyond TCG, he is active in the IETF with contributions as editor, author, and contributor to RFCs and Internet-Drafts. He has been lecturing on cybersecurity and software engineering for more than seven years at three universities. In the open-source domain, he is the founder and maintainer of CHARRA (Challenge-Response based Remote Attestation with TPM 2.0) and has contributed to widely used projects such as tpm2-tss. He also regularly reviews for leading international security conferences.

Eoin Carroll joined Toyota in Feb 2022 to provide expertise in platform security architecture for Vehicle Security standards and research. He has been a Co-Chair of the TCG Vehicle Services Working Group (VSWG) for the past 3 years representing Toyota. Carroll’s expertise is in analyzing the security models of emerging platforms and protocols against the current and future threat landscape. He has 1 issued patent on NFC communications from McAfee. He discovered and disclosed a new Windows Endpoint Security evasion technique called “Process Reimaging” at Hack in Paris 2019. He supports local universities to keep their security curriculum relevant to industry needs and regularly speaks at universities and STEM events to inspire the next generation of security talent.
Carroll has over 22 years of diverse experience, from electronic engineering to a variety of offensive and defensive security roles, working across the full stack from silicon to web. Prior to Toyota, Carroll worked as a Principal Engineer for McAfee’s Office of CTO and Advanced Threat Research Team, serving as the resident expert for the Windows OS platform and networking protocols, reverse engineering critical industry vulnerabilities and designing exploit protections. Prior he was Endpoint Security Architect Lead responsible for Product Security and Red Teaming where he aligned McAfee with the MITRE ATT&CK industry benchmark. He was also a Staff IT Security Engineer at Qualcomm where he was responsible for leading and performing the penetration testing of critical web and mobile applications. Prior he was a Product Test Engineer at Xilinx, Intel and Boston Scientific where he was Product owner responsible for FPGA, Chipset and Defibrillator functionality verification respectfully.
Carroll holds an MSc Networking and Security from Munster Technological University.

John Mathews is a Software Engineer at Solidigm Technology with experience in embedded security and software development, focusing on advanced development and pathfinding. He has made many contributions to data-at-rest security, particularly in Opal and Key Per IO technologies. John is also a co-chair of the TCG Storage Workgroup.

Liran Perez is a security firmware architect at Intel Corporation, with over 13 years of experience in security firmware development, validation, and architecture. He works on the architecture and development of Intel PTT (Platform Trust Technology – Intel CSME chipset-integrated TPM) and Intel ODCA (On-Die Certificate Authority). He helps define and integrate security solutions like TPM, DICE, Attestation, and SPDM across various Intel security IPs, including CSME, ISSE, IPSE (Pluton), S3M, and Intel discrete graphics.
Liran has been an active member of the Trusted Computing Group (TCG) for over 10 years, participating mainly in the TPM and TPM DDWG, and also following and participating in the DICE, Infrastructure, Attestation, Compliance, Server, and recently re-joined the IoT & Embedded Work Groups to help re-create the embedded TPM profile. He has contributed to several TCG specifications, including the TPM 2.0 Library, TPM PTP, Device Driver Design Principles, and TPM Bus Protection guidance work. He has been involved in the development of the CRB protocol and contributed to defining the CRB protocol’s PQC readiness within DDWG. His work also includes contributions to TPM feature extensions such as support for Symmetric Block Cipher MACs (i.e. AES CMAC) and Attached Component. He has helped identify and address TPM-related vulnerabilities with TCG’s Vulnerability Response Team (VRT), contributing to industry-level solutions and recovery strategies.
Matthew Yang, HPE

Matthew Yang is the Director of Product Security Office at HPE, responsible for elevating the security posture of HPE products and services. His organization champions industry-leading product security processes and technologies, including those of TCG. At TCG, he has co-chaired the Vulnerability Response Team since its inception. Matthew has more than 25 years of industry experiences in various engineering and executive roles and has worked at multiple TCG member companies, including Dell and HPE. He holds a Master’s degree in Computer Science from University of North Carolina at Chapel Hill.
Dr.KuniyasuSuzaki, Institute Information Security

Dr. Suzaki is a professor at the Institute of Information Security in Japan, specializing in system and hardware security, including trusted execution, TPMs, and confidential computing. He has led research on secure virtualization, RISC-V architecture, and IoT device trust, and has contributed extensively to trusted computing standards and open-source projects. Dr. Suzaki previously worked at Japan’s National Institute of Advanced Industrial Science and Technology (AIST) and has been recognized for his leadership in advancing secure system design and implementation.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+specifications and guidance documents to help build a trusted computing environment.
Stay current with Trusted Computing Group (TCG) activities, including recent case studies, press releases, industry news and upcoming events via the TCG Newsletter!
Trusted Computing Group Administration
3855 SW 153rd Drive Beaverton, Oregon 97003