Available for opportunities

Cybersecurity Researcher

Ph.D. candidate specializing in IoT security, drone vulnerabilities, and firmware analysis. Discovering CVEs and building secure systems.

$ whoami
sandesh.more@florida-tech
$ cat research_focus.txt
IoT Security
Drone Vulnerabilities
Firmware Extraction
$ grep -c "CVE" discoveries.log
2
$ echo $STATUS
🔓 actively_researching
2
CVEs Discovered
3+
Publications
100+
Students Mentored
36th
NCL Ranking

Breaking systems to make them stronger

I'm a Ph.D. candidate in Computer Science at Florida Institute of Technology, driven by a passion for uncovering and mitigating vulnerabilities in emerging technologies. My research focuses on the intersection of IoT security, drone systems, and firmware analysis.

With hands-on expertise in penetration testing, digital forensics, and reverse engineering, I combine academic rigor with real-world applications. I've discovered two CVEs in consumer drone systems and published research on attack vectors that impact everyday devices.

Beyond research, I'm dedicated to educating the next generation of security professionals, having mentored over 100 students and designed capture-the-flag challenges that make learning security engaging and practical.

🔬

Research Focus

IoT Security, Drone Vulnerabilities, Firmware Analysis, AI/ML Security

🎯

Current Work

Multi-interface firmware extraction methodologies for consumer drones

🏆

Achievements

NCL Top 40 rank, 2 CVEs discovered, CompTIA CySA+ & CNPen certified

📍

Location

Melbourne, Florida, USA

Professional journey

MAY 2023 - PRESENT

Graduate Student Assistant

Florida Institute of Technology
  • Developed course content integrating 15 real-world case studies, achieving 95% student satisfaction
  • Designed CTF challenges and managed FITSEC club events, increasing engagement by 85%
  • Created automated grading systems for CSE4080 lab assignments
  • Tutored 100+ students in Python, Operating Systems, and Data Mining
JAN 2023 - MAY 2023

Graduate Research Assistant

Florida Institute of Technology
  • Led research in Cyber Forensics, detecting and neutralizing 20+ malware instances
  • Created forensic images for compromised systems, improving incident response by 40%
  • Designed datasets for disk forensics and contributed to 2 research projects
JAN 2021 - JAN 2022

Cybersecurity Intern

IRT Technologies Pvt. Ltd., India
  • Engineered automation tools enhancing threat detection capabilities by 40%
  • Conducted penetration testing, identifying and mitigating 12+ vulnerabilities
  • Performed security audits eliminating 15 high-risk vulnerabilities
  • Gained hands-on experience with Splunk, Wazuh, ELK Stack, and IBM QRadar

Technical arsenal

⚔️ OFFENSIVE SECURITY
Metasploit Burp Suite Nmap Nessus OWASP ZAP ffuf dirbuster Kiterunner
🔍 FORENSICS & REVERSING
Ghidra Radare2 Volatility FTK Imager Autopsy Belkasoft X Sleuthkit
📊 SIEM & MONITORING
Splunk Wazuh ELK Stack IBM QRadar Zeek Snort Wireshark
💻 DEVELOPMENT
Python C/C++ JavaScript React SQL Docker Git
☁️ CLOUD & INFRASTRUCTURE
AWS Azure VMware VirtualBox Kali Linux Ubuntu CentOS
📋 FRAMEWORKS
MITRE ATT&CK OWASP Top 10 NIST ISO 27001 SCAP

Research & development

SECURITY RESEARCH

Drone Security Knowledge Base

Full-stack cybersecurity research platform aggregating 50+ drone/UAV vulnerabilities mapped to OWASP Drone Top 10 and MITRE ATT&CK frameworks. Features automated CVE pipeline via GitHub Actions fetching real-time data from NVD API.

React Python GitHub Actions NVD API
View project →
VULNERABILITY ASSESSMENT

Holy Stone Drone Security Assessment

Comprehensive security assessment through reverse engineering and network security analysis. Discovered critical vulnerabilities leading to 2 CVEs and proposed 9 security guidelines reducing potential breaches by 45%.

SPI JTAG SWD UART
Read thesis →
VISUALIZATION TOOL

IoT Privacy Risk Visualizer

Interactive tool featuring sensor detection for 15+ types, data destination mapping, and risk scoring algorithms. Built with D3.js for comprehensive privacy risk visualization.

D3.js JavaScript IoT Analysis
Explore tool →
DIGITAL FORENSICS

ForensicFusion

Automated tool for memory analysis in digital forensics investigations. Streamlines the detection and analysis of malware artifacts in memory dumps.

Python Volatility Memory Analysis
Learn more →

Research publications

ICCWS 2025

Comprehensive Security Assessment of Holy Stone Drones: Examining Attack Vectors

More, S. et al. (2025) — International Conference on Cyber Warfare and Security, 20(1), pp. 574–583

doi.org/10.34190/iccws.20.1.3286 ↗
INTED 2025

Enhancing Cybersecurity Education: The Impact of Simulated Learning and Interactive Tutorials on Student Performance and Anxiety Reduction

Panakkadan, R.R. et al. (2025) — 19th International Technology, Education and Development Conference, Valencia, Spain

doi.org/10.21125/inted.2025.0528 ↗
MASTER'S THESIS

Security Analysis of HolyStone Drones: Examining Attack Vectors and Data Extraction Techniques

More, S.A. — Florida Institute of Technology

repository.fit.edu/etd/1381 ↗

CVE disclosures

CVE-2023-49199

Vulnerability discovered in Holy Stone drone systems through comprehensive security assessment and reverse engineering analysis.

CVE-2023-49200

Security flaw identified affecting consumer drone firmware, demonstrating attack vectors for wireless exploitation.

Professional credentials

🛡️
CompTIA CySA+
CompTIA
🔓
Certified Network Pentester
CNPen
📚
Advanced Level Tutor
National Tutoring Association

Let's connect

I'm always interested in discussing research collaborations, security consulting, or opportunities in cybersecurity. Feel free to reach out!