Ph.D. candidate specializing in IoT security, drone vulnerabilities, and firmware analysis. Discovering CVEs and building secure systems.
I'm a Ph.D. candidate in Computer Science at Florida Institute of Technology, driven by a passion for uncovering and mitigating vulnerabilities in emerging technologies. My research focuses on the intersection of IoT security, drone systems, and firmware analysis.
With hands-on expertise in penetration testing, digital forensics, and reverse engineering, I combine academic rigor with real-world applications. I've discovered two CVEs in consumer drone systems and published research on attack vectors that impact everyday devices.
Beyond research, I'm dedicated to educating the next generation of security professionals, having mentored over 100 students and designed capture-the-flag challenges that make learning security engaging and practical.
IoT Security, Drone Vulnerabilities, Firmware Analysis, AI/ML Security
Multi-interface firmware extraction methodologies for consumer drones
NCL Top 40 rank, 2 CVEs discovered, CompTIA CySA+ & CNPen certified
Melbourne, Florida, USA
Full-stack cybersecurity research platform aggregating 50+ drone/UAV vulnerabilities mapped to OWASP Drone Top 10 and MITRE ATT&CK frameworks. Features automated CVE pipeline via GitHub Actions fetching real-time data from NVD API.
Comprehensive security assessment through reverse engineering and network security analysis. Discovered critical vulnerabilities leading to 2 CVEs and proposed 9 security guidelines reducing potential breaches by 45%.
Interactive tool featuring sensor detection for 15+ types, data destination mapping, and risk scoring algorithms. Built with D3.js for comprehensive privacy risk visualization.
Automated tool for memory analysis in digital forensics investigations. Streamlines the detection and analysis of malware artifacts in memory dumps.
Vulnerability discovered in Holy Stone drone systems through comprehensive security assessment and reverse engineering analysis.
Security flaw identified affecting consumer drone firmware, demonstrating attack vectors for wireless exploitation.
I'm always interested in discussing research collaborations, security consulting, or opportunities in cybersecurity. Feel free to reach out!