Bio
Security Researcher with 4+ years of hands-on experience in reverse engineering, malware analysis, and embedded systems. As part of my research, developed techniques to bypass ML-based security models, uncovered flaws in decompilers, and re-hosted and analyzed embedded firmware at scale.
Education
-
PhD / Doctor of Philosophy | Sungkyunkwan University in South Korea
2023-present | Computer Science and Engineering -
Master of Science | Sungkyunkwan University in South Korea
2021-2023 | Computer Science and Engineering
Relevant Experience
-
Research Assistant | SoftSec, Sungkyunkwan University
03.2024 – Present | full time | Gyeonggi, Suwon, South Korea1
2
3
4
5
6
7
8
9
10Research Area:
Software security, Firmware analysis
Technical tools:
QEMU, Unicorn Engine for emulation and analysis
Ghidra, angr for binary reverse engineering
Responsibilities:
Analyzing firmware
Identifying and debugging issues in decompilers toolchains -
Research Assistant | InfoLab, Sungkyunkwan University
09.2021 – 02.2024 | full time | Gyeonggi, Suwon, South Korea1
2
3
4
5
6
7
8
9
10Research Area:
Software security, Malware analysis
Technical tools:
QEMU for CPU emulation
Linux sandboxes for IoT malware analysis
Responsibilities:
Analyzing large-scale IoT malware and ransomware samples
Identifying behavioral strategies and temporal trends
Building sandboxes across ARM, I386, MIPS, SPARC, and PPC architectures
Publications
-
A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis (NDSS'26)
Awards & certificates
- Silver Award in Bug Bounty 2022 –
Sungkyunkwan University, Gyeonggi, Suwon - Big Data 2020 -
Huawei, National Telecommunication Institute Egypt - Data Analysis Professional 2020 -
Udacity - Problem Solving 2020 -
HackerRank