Bio
Security Researcher with 4+ years of hands-on experience in embedded systems, reverse engineering, and malware analysis. As part of my research, I re-hosted satellite firmware, uncovered flaws in decompilers, and developed techniques to bypass ML-based security models. My work bridges low-level system internals with practical security applications, driven by a deep curiosity about system internals, vulnerabilities, and how to build more secure systems.
Education
-
PhD / Doctor of Philosophy | Sungkyunkwan University in South Korea
2023-present | Computer Science and Engineering
-
Master of Science | Sungkyunkwan University in South Korea
2021-2023 | Computer Science and Engineering
Relevant Experience
-
Research Assistant | SoftSec, Sungkyunkwan University
03.2024 – Present | full time | Gyeonggi, Suwon, South Korea
1
2
3
4
5
6
7
8
9
10Research Area:
Software security, Firmware analysis
Technical tools:
QEMU, Unicorn Engine for emulation and analysis
Ghidra, angr for binary reverse engineering
Responsibilities:
Rehosting satellite firmware targeting RTEMS on SPARC
Dynamic vulnerability assessment and block emulation
Identifying and debugging issues in decompilers and toolchains -
Research Assistant | InfoLab, Sungkyunkwan University
09.2021 – 02.2024 | full time | Gyeonggi, Suwon, South Korea
1
2
3
4
5
6
7
8
9
10Research Area:
Software security, Malware analysis
Technical tools:
QEMU for CPU emulation
Linux sandboxes for IoT malware analysis
Responsibilities:
Analyzing large-scale IoT malware and ransomware samples
Identifying behavioral strategies and temporal trends
Building sandboxes across ARM, I386, MIPS, SPARC, and PPC architectures
Awards & certificates
- Silver Award in Bug Bounty 2022 –
Sungkyunkwan University, Gyeonggi, Suwon
- Big Data 2020 -
Huawei, National Telecommunication Institute Egypt
- Data Analysis Professional 2020 -
Udacity
- Problem Solving 2020 -
HackerRank