Computer engineer and information security expert specializing in the secure design of embedded computing devices and their networks. White hat hacker who uses penetration testing, reverse engineering techniques, and disassemblers such as IDA Pro to identify and close security holes in mobile, embedded, and cloud computing systems to prevent hacking and cyberattacks. With substantial engineering design experience from the hardware level up through the entire software stack, has designed and developed FPGAs in VHDL, debugged electronics with oscilloscopes and logic analyzers, developed firmware in C and assembly for real-time operating systems, developed low-level device drivers for Linux and Windows, developed custom networking protocols, developed GUIs in high-level languages, and developed web-based applications using a range of web technologies. Holds a security clearance and has consulted within the U.S. intelligence community.
Formal Education
- M.S. in Electrical and Computer Engineering, Johns Hopkins University
- B.S. in Computer Engineering, Messiah College
Career Highlights
- Founded a collaborative, cloud-based reverse engineering platform capable of disassembling binary software including malware
- Designed and developed features for the disassembler across the full stack of software components from backend (Django/Python/C) to web frontend (JavaScript/Angular/CSS)
- Certified Forensic Analyst, Penetration Tester, and Cisco CCNA
- Performed vulnerability research and software security audits on optical and copper networking devices
- Conducted software security audits of SCADA electrical power critical infrastructure systems, including development of proof-of-concept hacks to demonstrate the severity of uncovered weaknesses as well as advisement of available risk mitigations
- Reverse engineered proprietary network protocols and developed Wireshark dissectors to parse them to identify security weaknesses in the protocols and develop proof-of-concept attack simulations
- Designed and developed a portable architecture for a non-multitasking kernel comprising a device driver framework, network stack, and filesystem ported to a variety of embedded networking platform
- Developed and deployed fuzzers against networking platforms to identify potential security weaknesses in protocol implementations
- While a computer engineer for a branch of the U.S. military, developed a variety of Windows and mainframe-based applications in C, C++, C#, and Visual Basic to support the infrastructure of a flight simulation laboratory and integrated radar and infrared image generators with aircraft avionics
Related Experts
- Power Electronics and Motor Drive Expert Profile
- Electrical Fire and Battery Failure Expert Profile
- Crystalline Coatings and Optical Cavity Systems Expert Profile
- Embedded Firmware and Digital Signal Processing Expert Profile
- Real-Time Embedded Systems and Firmware Expert Profile
Frequently Asked Questions
What types of cases can this expert support?
This expert can support cases involving embedded systems, mobile apps, cloud infrastructure, and network security. They have hands-on experience auditing critical infrastructure like SCADA electrical power systems and optical/copper networking devices. They can also assist with cases requiring reverse engineering, penetration testing, or proof-of-concept demonstrations of security vulnerabilities.
What is this expert's technical background?
They hold a master's degree in electrical and computer engineering from Johns Hopkins and a bachelor's from Messiah College. They founded a cloud-based reverse engineering platform and have developed full-stack software components in Python, Django, C, JavaScript, and Angular. They're also certified as a Forensic Analyst, Penetration Tester, and CCNA, with prior work in the U.S. intelligence community.
What technologies does this expert specialize in?
They're proficient in C, C++, C#, Python, JavaScript, Java, and assembly, with VHDL experience for FPGA design. They work across Android, Linux, Windows, and real-time operating systems. Their specialized areas include cryptography, embedded systems, reverse engineering, penetration testing, military radar systems, and network protocol analysis.
