security
Posts
a slightly critical summary of Bitcoin's proof-of-work algorithm written by a student who took one (1) blockchain class
exploring how to maintain privacy at untrusted edges as part of CICS's undergraduate volunteer research program (URV)
Projects
Cybersecurity CTF (Capture-The-Flag) Training Platform
A cybersecurity Capture-The-Flag (CTF) training platform dedicated to enhancing cybersecurity education and fundamental skills within the industry.
Elliptic Curve Cryptography Diffie-Hellman Key Exchange Calculator
A simple calculator for calculating the order of a specified custom elliptic curve which also allows for simulation of a Diffie-Hellamn Key Exchange (DHKE) using that EC.
Enabling Trust in ML Models on Untrusted Edges
Worked alongside PhD mentor in Winter 2022-2023. Proposed a long short-term split (LSTM-SPLIT) machine learning model to help obfuscate private data sent between client-server models on untrustworthy edge nodes.
Using Your Head: Identifying Windows Malware by Deep Learning on PE Headers
An analysis into utilizing deep learning NN models like multi-layer perceptrons and fully-connected nets to learn if certain features in Windows PE header files are indicative of malware or not.
Research into ransomware, poking through the codebase of the infamous ransomware WannaCry to understand the inner mechanisms of it.