I'm a security engineer at Samsung Research America (SRA), specializing in Android security. I perform penetration testing on mobile devices, fuzz Trusted Applications running within the TrustZone, and design advanced attack scenarios to proactively identify and mitigate vulnerabilities in Samsung Knox.
I graduated with a Master's in Computer Science from Arizona State University in Spring 2025. During my time at ASU, I did security research at SEFCOM lab with a group of amazing cybersecurity researchers. My primary advisor was Dr. Ruoyu (Fish) Wang, I also used to work closely with Dr. Yan Shoshitaishvili, Dr. Adam Doupé and Dr. Tiffany Bao. My research focused on system security, especially on program analysis, reverse engineering and vulnerability discovery. I've found bugs in the Linux Kernel, NTFS-3G, and Pillow.
I interned at Microsoft during Summer 2024 where I got an opportunity to work with an awesome group of security researchers and engineers. During the internship, I developed a framework to automatically fix C/C++ static analysis warnings usings LLMs.
I play CTFs with Shellphish, my hacker handle is r00tus3r. I used to play with team bi0s during my undergrad. I primarily focus on reverse engineering challenges, but I occasionally try out some binary exploitation challenges as well.
You can find my resume here.