Chris Roberts Email and Phone Number
Chris Roberts work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
Chris Roberts personal email
- Valid
Business and technical leader with 20+ years of experience guiding teams in embedded device cybersecurity and offensive security. As head of the Atlanta office, I focus on and strategic growth and direction for vulnerability discovery in support of DoD/IC initiatives and FDA 510(k) compliance for medical devices. My team and I specialize in zero-day hunting, vulnerability assessment, reverse engineering, wireless attacks, and uncovering critical issues in embedded and cyber-physical systems.Specialties: Reverse Engineering Embedded Firmware, Vulnerability Analysis and Exploitation, Reverse Engineering of Electronics, Cyber Security, Electronic Warfare, Cyber Warfare, RF, Ghidra, Ida Pro
-
Caesar Creek Software, Inc.Smyrna, Ga, Us -
Principal EngineerCaesar Creek Software, Inc. Jul 2022 - PresentMiamisburg, Ohio, Us -
Principal Research EngineerGeorgia Tech Research Institute Jul 2021 - Jul 2022Atlanta, Georgia, Us -
Ece FellowGeorgia Tech Research Institute Feb 2020 - Jul 2022Atlanta, Georgia, UsGoing to do some cool stuff around cyber and building management systems -
Branch Chief, Embedded Cyber TechniquesGeorgia Tech Research Institute Feb 2019 - Jul 2022Atlanta, Georgia, Us -
Senior Research EngineerGeorgia Tech Research Institute Jun 2012 - Jul 2021Atlanta, Georgia, Us• Technical expertise covers RF system design, electronic and cyber warfare, hardware and firmware reverse engineering, vulnerability assessments of embedded systems and assessment of system vulnerability to wireless cyber-attacks.• Concentrated on exploitation and reconstruction of information in the form of signals, communication protocols, and application and embedded binaries. • Determine hardware and software vulnerabilities and reconstructs signals to determine overt and covert methods of exploitation. • Embedded Software reverse engineering and vulnerability analysis – Experience with bare metal firmware microcontrollers. • Experienced in analyzing vulnerabilities to attacks such as replay attacks, spoofing attacks or attacks that exploit device weaknesses in authentication or encryption.• Design and testing of embedded circuit boards using sophisticated test and measurement instrumentation.• Primary author or co-author for dozens of technical reports, published multiple conference presentations and numerous IRAD exhibitions.• Codeveloped a three day professional education course focused on Digital Forensics of Weapon Systems.• Regularly teach and develop material for Cyber-EW professional education course.• Developed and teach a course at the ECE school titled Embedded System Cyber Security. -
Associate Techniques Branch HeadGeorgia Tech Research Institute May 2017 - Feb 2019Atlanta, Georgia, Us• Performs financial, personnel and technical management for the Branch. • Responsible for business development including capability briefs, white paper creation, and proposal writing.• Coordination of personnel assignments to align technical and leadership skillsets to meet project needs and to establish, maintain and forecast staffing. • Provides oversight to major programs technical direction and Subject Matter Expertise across GTRI.• Responsible for setting up and managing physical laboratory space including procurement and management of test and measurement equipment.• Coordinates with Georgia Tech and GTRI Labs to provide expertise and staffing support from the Techniques Branch. -
Course Instructor - Embedded System Cyber SecurityGeorgia Tech Vip Program Aug 2017 - Jul 2022Atlanta, Ga, UsThe goal of the Embedded System Cyber Security course is to examine and assess the existence of cyber security issues found within IoT hardware devices. These devices range from in home security cameras, police cameras, smart garage doors and building management systems. In order to achieve this, we will implement a multi-domain investigation through the use of hardware reverse engineering, software/firmware reverse engineering, and RF analysis along with static and dynamic testing through instrumentation. Finally, any identified vulnerabilities in the devices' cyber security protection will be tested and demonstrated. -
Electrical Engineer IiiScientific Research Corporation Apr 2007 - May 2012Atlanta, Ga, UsReverse engineering and troubleshooting of a VXI based dual down conversion super-heterodyne receiver used on a cryptologic communications system for the Navy. Developed the test to fully characterize each unit to identify potential problems and reverse engineered the receivers down to the schematic level. Created spread sheets to collect the data taken and identify trends in. Led and trained a team of engineers to streamline the characterization, identification, and repair of each receiver. Worked with technicians to replace failing parts to reach the continued goal of getting each unit working properly and back in the field.Lead engineer to produce an expanded version of a threat analysis program based on and originating from my thesis work as mentioned above. JACKAL (Joint Analysis Countermeasures Knowledge Assessment Library) was a requirements study for an application to share EW capabilities in order to improve aircraft survivability. Using JACKAL, a user can identify alternative solutions to a specific EW system shortfall by leveraging information on fielded systems and/or new technology development across the DoD. JACKAL would act as a single access point for existing DoD EW data sources, including system capabilities, characteristics, operational assessments and information POCs. This study provided me the opportunity to attend multiple EW conferences across the country and to visit multiple EW organizations across the DoD. A major component of this study required us to interview EW experts (RF/EO/IR) to gather requirements for a final product.A demo version of this software tool was created and delivered to the Air Force. My role included ensuring all the requirements were met, the tool was functional, and to develop the math formula for the interactions between the entities. -
Electrical Engineer IiScientific Research Corporation Apr 2006 - Apr 2007Atlanta, Ga, UsDesigned and built multiple lab test stations to allow for these systems to be fully operational inside of the lab therefore providing the ability to perform integration testing and troubleshooting at the unit level. Monitoring and sampling of signals was made available so both the control signals and the RF signals (threat and jamming response) signals could be monitored without interruption.These systems represent a jammer, a receiver, and a system that is both transmit and receive. My role on this task was the lead engineer which consisted of the overall system design, assisting junior engineers with the details, managing the BOM and ensuring cost and schedule were met.Lead an effort to find a replacement for a detector and amplifier section of a direct tune RF receiver. I fully characterized and specified the requirements for this section of the receiver. In my research I found that it would be more cost effective and require less maintenance if we combined multiple circuit boards into a COTS detector log video amplifier (DLVA). The new unit far exceeds the requirements based on the legacy design and is currently deployed in multiple aircraft. -
Electrical Engineer IScientific Research Corporation Apr 2004 - Apr 2006Atlanta, Ga, UsSupported multiple projects in their attempt to pass MIL-STD 810 environmental and MIL-STD 461 EMI/EMC testing. Roles have included writing and proofreading test plans, creating schedules, executing the tests, troubleshooting and repairing units that fail. -
Engineering InternPanasonic Jan 2002 - Dec 2002Newark, Nj, UsIntern at a speaker plant.
Chris Roberts Skills
Chris Roberts Education Details
-
Mercer UniversityElectrical Engineering -
Georgia Institute Of TechnologyElectrical Engineering -
University Of West Georgia
Frequently Asked Questions about Chris Roberts
What company does Chris Roberts work for?
Chris Roberts works for Caesar Creek Software, Inc.
What is Chris Roberts's role at the current company?
Chris Roberts's current role is Business & Technical Leader | Embedded Device Cybersecurity | DoD/IC & FDA 510(k) Vulnerability Discovery | Zero-Day Hunter.
What is Chris Roberts's email address?
Chris Roberts's email address is ch****@****ech.edu
What schools did Chris Roberts attend?
Chris Roberts attended Mercer University, Georgia Institute Of Technology, University Of West Georgia.
What are some of Chris Roberts's interests?
Chris Roberts has interest in Electronics, Right, Photography, Sports, Self Improvement, Dave Ramsey.
What skills is Chris Roberts known for?
Chris Roberts has skills like Radar, Testing, Electronics, Rf, Engineering, Electrical Engineering, System Design, Systems Design, Embedded Systems, Signal Processing, Dod, Integration.
Who are Chris Roberts's colleagues?
Chris Roberts's colleagues are Keeton Feavel, Joshua Vonseggern, Brian D., Tom D, Joshua Caudill, Luke Giannoutsos, Daniel Lee.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial