Oct. 2010

Network Analysis & Probing Variants

Indiana University

Constructed a multi-threaded network probe similar to Nmap implementing stealthy scanning techniques as well as a network dump analyzer mimicking the usage of WireShark, both written in C.

Aug. 2010

Memory Corruption Exploits & Prevention Techniques

Indiana University

Independent Study completed with Dr. Steven Myers to identify flaws that create vulnerabilities and code that leverages them; includes code review, exploit design, and implementations within a secure environment.

Primarily focused efforts on stack overflows, heap overflows, return-to-libc exploits, format string vulnerabilities, as well as address space layout randomization (ASLR) and other major prevention variants (PAX, NX).