Mark Nelson, Founder & Chief Architect
Mark Nelson is a computer engineer, security researcher, and Navy veteran with more than 40 years of experience designing and securing complex systems. His work spans data warehouse design and administration, national security, teaching university-level cybersecurity classes for NATO, the FBI and NSA; networking, VoIP, and systems design and programming. Applied Enclaves is the culmination of a lifetime of work — a reimagination of how software works.
Mark began his career in the U.S. Navy as a Bosun’s Mate Seaman Apprentice (E1). He left the Navy as a Chief Cryptologic Technician, specializing in signals intelligence and secure systems at global scale. After his military service, he joined Hewlett-Packard’s Networking Division as a Lab Manager and later served as a contract engineer at Intel, gaining a deep understanding of processor architecture, microcode behavior, memory models, and the complex handshake between hardware and operating systems.
Over the last decade, Mark has become a respected teacher and researcher in cybersecurity. He served for six years as a Visiting Professor at the University of Hawaiʻi at Mānoa’s College of Engineering, where he taught secure systems, offensive operations, and advanced network defense. He currently teaches Offensive Cyber Operations and serves as Research Liaison at NSA–Hawaii, bridging academic research, emerging hardware capabilities, and operational cyber defense.
Mark’s doctoral research focuses on one of the most fundamental blind spots in modern computing: the total lack of trusted boundaries inside a process. His work explores how TEEs, compilers, loaders, and runtime modules can be combined to create enforceable sub-process isolation — a concept he calls Trust-by-Choice execution. His 2025 IEEE publication, Reimagining the Usermode Process Space by Utilizing Hardware-Enforced Sub-Process Isolation, establishes the academic foundation for this new execution architecture and directly supports several patent filings at the U.S. Patent & Trademark Office.
This research ultimately led to the founding of Applied Enclaves, created to commercialize a new class of enclave-aware toolchains that enforce trust at the executable boundary. Mark’s invention introduces the Enclave Binary Interface (eABI), encrypted inter-enclave messaging, compiler-supported private memory, and a loader capable of making cryptographic trust decisions before software runs. These capabilities create a zero-trust process model enforced not by policy, but by hardware.
Mark’s background gives him an unusually holistic perspective:
- From cryptography to compilers
- From process architecture to national-security threats
- From classroom instruction to real-world cyber operations
- From low-level assembly to high-level system design
This combination uniquely positions him to reshape how the world approaches software trust.
Mark holds degrees in Computer Information Systems and Computer Science and is completing his Ph.D. in Computer Science at the University of Hawaiʻi at Mānoa. He has trained military and intelligence personnel in the U.S. and internationally, including at the NATO School in Germany and the FBI in Quantico. His research and inventions form the technical backbone of Applied Enclaves and represent a significant step toward a safer, more resilient computing ecosystem.
When he is not writing compilers or teaching cyber operations, Mark lives in Honolulu, where he is active in the local tech and entrepreneurial community and serves as a mentor to students pursuing careers in cybersecurity and trusted computing.
While Mark is excited about his chosen profession, his pride-and-joy is his son and his first priority is to his beloved wife.
Founder’s Message
“For 40 years, we have accepted that libraries, plug-ins, and third-party code should have full access to everything inside a process. That model no longer works. Attackers aren’t getting better — our architecture is just overdue for an upgrade.
Applied Enclaves exists to reimagine the most fundamental trust boundary in computing: The process space.”
— Mark Nelson
Press & Speaking
Mark is available for technical briefings, research discussions, investment conversations, and industry collaborations.
- Conference Talks: IEEE CSR, HICS, national security and cyber operations venues
- Expertise: TEEs, SGX, compiler internals, secure execution, supply-chain security, enclave modeling, offensive cyber
- Academic & Government Engagements
For inquiries: [email protected]