High Assurance Booting for i.MX6 Tablet
Modified kernel and bootloader of Genode OS to include HAB for secure booting. Part of secure tablet development used in defense research projects.
Modified kernel and bootloader of Genode OS to include HAB for secure booting. Part of secure tablet development used in defense research projects.
Contributed defensive filters for Content Security Policy (CSP) directives in Firefox to better comply with HTTP specifications and improve security.
Isolation technique to isolate data in secure private compartments using Intel MPK, static analysis and a hypervisor. Implemented prototype demonstrating intra-process isolation.
LSTM model to classify phishing sites using HTML content and TLS certificate analysis. Achieved accuracy of ~77% (HTML) and ~98% (TLS features).
Contributed primarily to TLS and JWT authentication filters in Envoy. Work focused on improving authentication paths and mTLS integration used by internal services.
Published in ICCCSP 2017. Work focused on deploying honeypots to mitigate DoS attacks on IoT networks and evaluating effectiveness.
Publication in Springer: “Advances in Intelligent Systems and Computing” (2018). Describes optimisation strategies for PKI models in vehicular ad-hoc networks using clustering and polling techniques.
Published in IEEE Intelligent Systems (2018). Implemented a voice-controlled robotic manipulator leveraging decision trees and contour identification techniques.
Master’s thesis describing an extended LSTM-based intrusion detection system with active and distributed learning techniques.
Conducted cryptanalysis research and implemented prototype attacks while surveying literature on zero-knowledge proofs.
Built and shipped a production web service to improve logging and alerting for Alexa APIs used across multiple subteams.
Worked on threat-detection systems focused on detecting ransomware and anomalous lateral movement in enterprise networks.
Built and maintained secure access infrastructure for Bloomberg engineers, focusing on Zero Trust, identity-aware reverse proxies, and a company VPN client.