Computer engineering researcher, startup co-founder, and operations-focused engineer with a deep background in computer architecture, systems programming, computer security, distributed systems, and tons of other random things. Hardcore nerd that believes in the K.I.S.S. principle, Worse is Better, the UNIX philosophy, minimalism, and everything Fred Brooks and Dijkstra ever wrote about software development.
Deterministic Security, Llc
-
Co-FounderDeterministic Security, Llc Jun 2017 - PresentColumbia, MdAlong with Dr. Julian Grizzard, I co-founded Deterministic Security, LLC (DTRSEC) to commercialize the REnigma technology we invented at APL. Since 2017, we have worked with defense contractors and cybersecurity companies to help our users better understand how malware works.REnigma is an interactive malware analysis sandbox that records everything that happens on a system at full speed and allows it to be perfectly replayed at a later time. During replay, REnigma can see everything: system calls, DLLs, user space functions, network traffic, data structures in memory, register states, and all instructions. To make sense of the vast amount of data available, REnigma includes analyzers that automate the tedious and repetitive parts of tearing apart malware. You can also easily share the recording with others to perform collaborative analysis and help inform your friends of the latest malware threats with greater detail than any current threat intelligence sharing infrastructure.Fundamentally, DTRSEC is about lowering the cost of malware analysis for your organization and making your team more effective. We will help you set up a world-class and secure malware analysis environment that is resilient against the most advanced threats, integrate it with your other technology investments, and train your team to perform fast, safe, and complete analysis, allowing you to better defend your network against APTs and criminals.
-
Cyber Security ResearcherThe Johns Hopkins University Applied Physics Laboratory Jun 2013 - Jun 2017Laurel, MdAt APL, I invented Guard Lines, a CPU-based memory corruption detection capability with minimal performance overhead. This patented technology ("Hardware-Enforced Prevention of Buffer Overflow" US 9804975) enables CPUs to directly detect buffer overflow and use-after-free bugs as soon as they occur and prevent attackers from exploiting these bugs. Additionally, I was the co-principal investigator of REnigma. REnigma is a tool to analyze and reverse engineer advanced malware; it is based on APL's Virtual Machine Record and Replay (RnR) dynamic analysis technology developed by Dr. Julian Grizzard. The underlying RnR engine allows REnigma to record the malware's execution at full speed and perform in-depth analysis and forensics during replay. In 2015, REnigma was selected to participate in the Department of Homeland Security's Transition To Practice (TTP) program and is currently seeking government and private sector partners for early stage pilot deployments. In early 2016, REnigma was deployed in operations to defend APL's internal network against cyber attacks.I have also worked on research, development, test, and evaluation projects in other areas of cyber security, software assurance, homeland security, space exploration, and air/missile defense.
Jim Stevens Skills
Jim Stevens Education Details
-
Computer Science -
Computer Science -
Computer Engineering -
De Soto High School (De Soto, Ks)High School Diploma
Frequently Asked Questions about Jim Stevens
What company does Jim Stevens work for?
Jim Stevens works for Deterministic Security, Llc
What is Jim Stevens's role at the current company?
Jim Stevens's current role is Co-founder at Deterministic Security, LLC.
What schools did Jim Stevens attend?
Jim Stevens attended University Of Maryland College Park, University Of Arkansas, The University Of Kansas, The University Of Kansas, De Soto High School (De Soto, Ks).
What skills is Jim Stevens known for?
Jim Stevens has skills like Computer Architecture, Cpu Design, Compiler Design, Operating System Design, Memory Controller Design, Virtualization, Parallel Programming, Linux Kernel, Windows Kernel, Computer Security, Reverse Engineering, Virtual Machine Introspection.
Not the Jim Stevens you were looking for?
-
3jimstevens.org, giftstogive.org, giftstogive.org
4 +161724XXXXX
-
Jim Stevens
Morrisville, Nc3lenovo.com, lenovo.com, lenovo.com2 +191960XXXXX
-
2sbcglobal.net, arrow.com
-
Jim Stevens
Denver, Co6ball.com, ball.com, floridarent.com, honeywell.com, ball.com, floridarent.com6 +130374XXXXX
-
Jim Stevens
United States3gmail.com, shi.com, hpe.com3 +178173XXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial