Projects
A curated list of offensive security work and applied security research.
Offensive Security
Mobile Application Security Testing Automator
Automation tool for Android and iOS testing with repeatable static checks and runtime probes. Produces a quick triage bundle that guides deeper manual work.
Analysis of Return Oriented Programming (ROP)
Study of ROP gadget discovery tools and automation workflows. Reviewed common defenses and where automation tends to break down.
Memory Corruption Vulnerabilities
Hands on labs covering memory corruption primitives and exploitation basics. Practiced stack, heap and format string cases with ret2libc.
Shellshock Vulnerability: Implementation and Remediation Techniques
Recreated Shellshock in a controlled lab and tested common remediation steps. Extended the setup using SEED Labs and a malicious DHCP scenario.
Security Research
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures
Thesis project on checking restricted zone violations without revealing the drone location. Uses private set intersection to detect a violation while keeping both sides private.
QSS-Based Keyless Titanium Secure (TitaniumSec) Email Application
Research internship project that delivered a keyless secure email web app using quasigroups and secret sharing. Covered design, implementation and evaluation with a small team.
Secure Cloud Backup using Secret Sharing Schemes
Cloud backup prototype using secret sharing for confidentiality and resilience. Includes small demonstrations to explain secret sharing and JPEG steganography with simple threat models.
Understanding Privacy Risks on Android
Short research review on data collection behavior in Android apps and user impact. Connected findings to consent patterns and privacy regulation.
Privacy-Preserving Matching & Encrypted Analytics
Prototypes for matching and analytics on protected data. Implemented license plate matching and document similarity without exposing the raw values. Explored homomorphic encryption and practical performance tradeoffs.