Cyber Network Operations Developer Intern
Current– Automated abstraction of programs into control flow graphs to facilitate analysis– Developed queries to identify unsigned to signed integer and mutex lock vulnerabilities by reverse engineering binaries using BinaryNinja– Tested queries using Pytest on custom vulnerable binaries based on Juliet vulnerability dataset– Designed high-level class diagram.