security

Posts

  • proof-of-work | 2025.11.19

    a slightly critical summary of Bitcoin's proof-of-work algorithm written by a student who took one (1) blockchain class

  • urv | 2023.08.22

    exploring how to maintain privacy at untrusted edges as part of CICS's undergraduate volunteer research program (URV)

  • Projects

  • Cybersecurity CTF (Capture-The-Flag) Training Platform

    A cybersecurity Capture-The-Flag (CTF) training platform dedicated to enhancing cybersecurity education and fundamental skills within the industry.

  • Elliptic Curve Cryptography Diffie-Hellman Key Exchange Calculator

    A simple calculator for calculating the order of a specified custom elliptic curve which also allows for simulation of a Diffie-Hellamn Key Exchange (DHKE) using that EC.

  • Enabling Trust in ML Models on Untrusted Edges

    Worked alongside PhD mentor in Winter 2022-2023. Proposed a long short-term split (LSTM-SPLIT) machine learning model to help obfuscate private data sent between client-server models on untrustworthy edge nodes.

  • Using Your Head: Identifying Windows Malware by Deep Learning on PE Headers

    An analysis into utilizing deep learning NN models like multi-layer perceptrons and fully-connected nets to learn if certain features in Windows PE header files are indicative of malware or not.

  • WannaCry Research

    Research into ransomware, poking through the codebase of the infamous ransomware WannaCry to understand the inner mechanisms of it.