0% found this document useful (0 votes)
56 views11 pages

Yan Shoshitaishvili - CV

Uploaded by

anagrace901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views11 pages

Yan Shoshitaishvili - CV

Uploaded by

anagrace901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Yan Shoshitaishvili yans@asu.

edu
(520) 305-9267
Pushing forward the world of Cybersecurity. @Zardus

Education
2017 PhD in Computer Science from the University of California, Santa Barbara.
Advisors: Giovanni Vigna and Christopher Kruegel
Dissertation: Building a Base for Cyber-autonomy

2006 BS in Computer Science from Rensselaer Polytechnic Institute.

Professional Appointments
2017 - Present Assistant Professor, Arizona State University.

2022 - Present Acting and Associate Director, Center for Cybersecurity and Trusted
Foundations, Arizona State University.

Research Funding
DARPA YFA (Young Faculty Award): Shining Light on Occluded Vulnerabilities,
2022-2025 $996,241, PI.

NSF CICI: TCR: Improving the Robustness of Cyberinfrastructure via Scalable


2022-2024 Vulnerability Discovery and Mitigation on "Big Binaries". co-PI (w/ Fish
Wang). $599,999 share.

DARPA EURYALE: Combating Emergent Execution with a GLANCE, $3,769,730, co-PI


2022-2026 (w/ Adam Doupe, Tiffany Bao, Fish Wang, Stephanie Forrest, Giulia Pedrielli).
$628,782 share.

DARPA VOLT: A Viscous, Orchestrated Lifting and Translation Framework,


2020-2024 $6,678,767, co-PI (w/ Fish Wang, Adam Doupe, Tiffany Bao, Stephanie
Forrest, Sandeep Gupta, Georgios Fainekos), $1,001,815 share.

DoD Human-Assisted Cyber Reasoning Systems and Oppositional Human


2019-2024 Factors, $5,598,443.00, PI (w/ Adam Doupe).

DARPA CHESS: CHECRS — Cognitive Human Extensions for Cyber Reasoning


2019-2022 Systems, $11,730,557, co-PI (w/ Ruoyu Wang, Adam Doupe, Tiffany Bao,
Chitta Baral, Stephanie Forrest), $1,707,216 share.

DARPA HACCS: Puppeteer — Achieving Remote Control Over Complex Systems,


2018-2022 $7,474,245, PI (w/ Adam Doupe).

ONR Binary Trimming for Improved Security, $1,990,042, co-PI (w/ Giovanni Vigna,
2017-2022 Christopher Kruegel), $653,464 share.

MITRE LATCH: Live Binary Analysis and Patching, $150,000, PI (w/ Ruoyu Wang).
2020-2021

Selected Conference Publications


Top-tier (30):
Usenix Security (10), ACM CCS (7), IEEE Security & Privacy (7), NDSS (4), MobiSys (1), ASPLOS (1)

◌ Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel,
Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupe. Toss a Fault to Your Witcher:
Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command
Injection Vulnerabilities. IEEE Security and Privacy 2023.

◌ Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Behrens, Zion Leonahenahe Basque,
Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn,
Adam Doupe. I’m SPARTACUS, No, I’m SPARTACUS: Proactively Protecting Users From
Phishing by Intentionally Triggering Cloaking Behavior. ACM CCS 2022.

◌ Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier Jeremy Maso, Erik Trickel,
Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupe, Jason Polakis. Unleash the Simulacrum:
Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. USENIX Security
2022.

◌ Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupe, Yan Shoshitaishvili,
Tiffany Bao. Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit
Reliability. USENIX Security 2022.

◌ Jayakrishna Menon Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna
Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu
Wang, Christophe Hauser, Yan Shoshitaishvili. Arbiter: Bridging the Static and Dynamic
Divide in Vulnerability Discovery on Binary Programs. USENIX Security 2022.

◌ Ananta Soneji, Faris Bugra Kokulu, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan
Shoshitaishvili, Adam Doupe. “Flawed, but like democracy we don’t have a better system”:
The Experts’ Insights on the Peer Review Process of Evaluating Security Papers. IEEE
Security and Privacy 2022.
◌ Haehyun Cho, Jinbum Park, Adam Oest, Tiffany Bao, Ruoyu (Fish) Wang, Yan
Shoshitaishvili, Adam Doupe, Gail-Joon Ahn. ViK: Practical Mitigation of Temporal Memory
Safety Violations through Object ID Inspection. ACM ASPLOS 2022.

◌ Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang,
Ziming Zhao, Yan Shoshitaishvili, Adam Doupe, Gail-Joon Ahn. Having Your Cake and
Eating It: An Analysis of Concession-Abuse-as-a-Service, USENIX Security 2021.

◌ Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman,
Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili,
Adam Doupé, Gail-Joon Ahn. CrawlPhish: Large-scale Analysis of Client-side Cloaking
Techniques in Phishing. IEEE Security and Privacy 2021 - Best Student Paper Award.

◌ Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos,
Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili. Favocado:
Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases,
NDSS 2021.

◌ Efren Lopez-Morales, Carlos E. Rubio-Medrano, Tiffany Bao, Adam Doupe, Yan


Shoshitaishvili, Ruoyu Wang, Gail-Joon Ahn. HoneyPLC: A Next-Generation Honeypot for
Industrial Control Systems. ACM CCS 2020.

◌ Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan
Shoshitaishvili, Adam Doupé, Gail-Joon Ahn. PhishTime: Continuous Longitudinal
Measurement of the Effectiveness of Anti-phishing Blacklists. USENIX Security 2020.

◌ Haehyun Cho, Jinbum Park, Donguk Kim, Ziming Zhao, Yan Shoshitaishvili, Adam Doupe,
Gail-Joon Ahn. SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on
the ARM Architecture, ACM MobiSys 2020.

◌ Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan
Shoshitaishvili, Giovanni Vigna, Christopher Kruegel. KARONTE: Detecting Insecure
Multi-binary Interactions in Embedded Firmware, IEEE Security and Privacy 2020.

◌ Faris Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé,
Gail-Joon Ahn. Matched and Mismatched SOCs: A Qualitative Study on Security Operations
Center Issues, ACM CCS 2019.

◌ Vaibhav Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon
Ahn. AIM-SDN: Attacking Information Mismanagement in SDN-datastores, ACM CCS 2018.

◌ Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel,
Giovanni Vigna. Heaphopper: bringing bounded model checking to heap implementation
security, Usenix Security 2018.

◌ Hui Peng, Yan Shoshitaishvili, Mathias Payer. T-Fuzz: fuzzing by program transformation.
IEEE Security and Privacy 2018.

◌ Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang,
Christopher Kruegel, Giovanni Vigna. Rise of the HaCRS: Augmenting Automated Cyber
Reasoning Systems with Human Assistance. ACM CCS 2017.

◌ Jacob Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao,
Christopher Kruegel, Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
ACM CCS 2017.

◌ Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric
Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. BootStomp: On
the Security of Bootloaders in Mobile Devices. Usenix Security 2017.

◌ Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley. Your Exploit is Mine:
Automatic Shellcode Transplant for Remote Exploits. IEEE Security and Privacy 2017.

◌ Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul
Grosen, Christopher Kruegel, Giovanni Vigna. Ramblr: Making Binaries Great Again. NDSS
2017 - Distinguished Paper Award.

◌ Yan Shoshitaishvili, Ruoyu Wang, Chris Salls, Nick Stephens, Mario Polino, Audrey Dutcher,
John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, Giovanni Vigna. SoK:
(State of the) Art of War: Offensive Techniques in Binary Analysis. IEEE Security and
Privacy 2016.

◌ Nick Stephens, John Grosen, Chris Salls, Audrey Dutcher, Ruoyu Wang, Jacopo Corbetta,
Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. Driller: Augmenting Fuzzing
Through Symbolic Execution. NDSS 2016.

◌ Alessandro Di Federico, Amat Cama, Yan Shoshitaishvili, Christopher Kruegel, Giovanni


Vigna. How the ELF Ruined Christmas. Usenix Security 2015.
◌ Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. Portrait of a Privacy Invasion -
Detecting Relationships Through Large-scale Photo Analysis. PETS 2015.
◌ Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna.
Firmalice: Detecting Authentication Bypass Vulnerabilities in Embedded Devices. NDSS
2015.
◌ Yan Shoshitaishvili, Luca Invernizzi, Adam Doupe, Christopher Kruegel, Giovanni Vigna. Do
You Feel Lucky? A Large-Scale Analysis of Risk-Reward Trade-Offs in Cyber Security. ACM
SAC 2014.
◌ Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. Steal this Movie -
Automatically Bypassing DRM Protection in Streaming Media Services. Usenix Security
2013.
◌ Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni
Vigna. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
Usenix Security 2013.
◌ Antonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. Blacksheep:
Detecting Compromised Hosts in Homogeneous Crowds. ACM CCS 2012.

Journal, Magazine, and Book Chapter Publications


◌ Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman,
Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili,
Adam Doupé, Gail-Joon Ahn. CrawlPhish: Large-scale Analysis of Client-side Cloaking
Techniques in Phishing. IEEE Security and Privacy Magazine 2022.

◌ Tiffany Bao and Yan Shoshitaishvili. Cyber Autonomy in Software Security: Techniques and
Tactics (Book Chapter). In Game Theory and Machine Learning for Cyber Security, 2021.

◌ Yan Shoshitaishvili, et al. Cyber Grand Shellphish. Phrack Volume 70, 2021.

◌ Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn.
Mitigating the CACHEKIT Attack. Frontiers in Hardware Security and Trust: Theory,
Design and Practice 2020.

◌ Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta,
Francesco Disperati, Audrey Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Chris
Salls, Nick Stephens, Ruoyu Wang, Giovanni Vigna. Mechanical Phish: Resilient
Autonomous Hacking. IEEE Security and Privacy Magazine 2018.

◌ Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. Portrait of a Privacy Invasion -


Detecting Relationships Through Large-scale Photo Analysis. Proceedings on Privacy
Enhancing Technologies 2015.

Awards
🥇 ASU's Fulton Schools of Engineering awarded me the Top 5% Teaching Award for the
2021-2022 school year!

🥇 The IEEE Security and Privacy 2021 program committee awarded CrawlPhish: Large-scale
Analysis of Client-side Cloaking Techniques in Phishing the Best Student Paper award.

🥇 Our paper, How Shall We Play a Game?, won the 2018 NSA Cybersecurity paper
competition.

🥇 I received the UC Santa Barbara Computer Science Department's Outstanding Dissertation


Award for my graduate studies.
🥇 We received a Distinguished Paper award for our paper, Ramblr, at NDSS 2017.
🥇 I led my team, Shellphish, to a 3rd place victory (and another $750,000 prize) in the DARPA
Cyber Grand Challenge.

🥇 I led Shellphish to qualify for the DARPA Cyber Grand Challenge (and win a $750,000
prize). 7 teams qualified out of more than 100 entrants.

🥇 Before passing on the mantle, I led Shellphish through a number of CTF victories and
other finalist finishes in many competitions around the world, over the course of most of a
decade.

Open Source Contributions


angr.io I led the design and development of angr, a next-generation binary analysis
framework developed at UC Santa Barbara, and oversaw its open source
release. I also managed the details of many sub-projects using and supporting
angr.

pwn.college I created pwn.college, a curated, comprehensive cybersecurity education


platform, upon which I built my security courses at ASU. Pwn.college is based
on the concept of "practice makes perfect" along with a new style of
"walkthrough" CTF challenges.

github.com/ As one of the leaders of the Order of the Overflow, I organize the DEF CON CTF,
o-o-overflow the "world championship" of cybersecurity competitions. The challenges and
infrastructure we open source end up here.

github.com/ With the rest of my hacking team, Shellphish, I released various tools and
shellphish educational materials relating to security. For example, how2heap, a set of
heap exploitation tutorials, is one of our popular projects.

github.com/ My hacking team, Shellphish, open-sourced our CRS, the Mechanical Phish,
mechaphish which won third place at the DARPA Cyber Grand Challenge.

openglad.org I co-led the effort to port and improve a game called Gladiator for modern
platforms under the name Openglad. This has involved releases on every
major OS and Android.

github.com/ I enjoy solving problems in original ways. When I solve an interesting problem
zardus or just create something nice, I open source it. There's a fair bit of useful
security software here: preeny, ctf-tools, memcurses, idalink, kuboid, and
others.
Invited Talks and Presentations

Panelist. Quo vadis Cyber Security? Are we really building defense systems, or are we all just into
attacks for fun and profit?. NSF SaTC PI Meeting 2022.

Keynote. How Cyber Reasoning Systems Stub Their Toes. EUROSEC 2022.

Keynote. Potential of CTF as Educational Opportunity / Teaching Material for Information


Security. SECCON 2020.

Invited Talk. pwn.college: The Cybersecurity Dojo for Binary Analysis. CODE BLUE 2020.

Panelist. Talent Cultivation, the post-pandemic talent cultivation challenges and opportunity.
HITCON 2020.

Invited Lecture. Cyber Autonomy: Theory to Practice. QualComm 2020.

Invited Talk. Theory to Practice: Applying Academic Program Analysis Advances in the Real
World. Disclosure 2020.

Keynote. Wax on, wax off: educating the next generation of hackers! HITCON 2019.

Panelist. Panel on Cybersecurity Education. HITCON 2019.

Keynote. The Dangers of the Subconscious Mind (of Cyber Reasoning Systems). Artificial
Intelligence and Cybersecurity Workshop 2019.

Invited Talk. Master and Automation in Cybersecurity. Tsinghua Inforsec Workshop 2019.

Invited Seminar. How to Train Your Dragon: The Quest Toward Master and Automation in
Cybersecurity. Rensselaer Polytechnic Institute 2019.

Invited Talk. The Rise, Tribulations, and Promises of the HaCRS. NSA Research 2018.

Distinguished Seminar. The Long Road to Cyber Autonomy. CMU Cylab 2018.

Keynote. All our Powers Combined: Connecting Academics, Engineers, and Hackers. HITCON
2017.

Panelist. Panel on International Cybersecurity. HITCON 2017.

Invited Talk. The Long Road to Cyber Autonomy. Cyberchess 2017.

Keynote. Reaching for Cyber Autonomy - From the Cradle to the Server Room. Samsung Security
Forum 2017.
Panelist. Panel on Shifting the Balance in the Attack-Defend Cycle. HotSoS 2017.

Blue-team member. Workshop on Dangers of AI. ASU Origins 2017.

Panelist. Panel on National Privacy Research Strategy. ACSAC 2016.

Tutorial Instructor. ACSAC Tutorial - angr. ACSAC 2016.

Invited Talk. Through the Cyber Grand Challenge and Beyond. DHS/SRI Infosec Technology
Transition Council Meeting 2016.

Invited Seminar. From the Lab to the Cyber Grand Challenge. ASU Center for Cybersecurity and
Digital Forensics Seminar Series 2016.

Invited Talk. Cyber Grand Shellphish. DEFCON 2016.

Invited Talk. Letting angr drive your actions. 0CON 2016.

Invited Talk. Towards the DARPA Cyber Grand Challenge: A Dozen Years of Shellphish. SECCON
2015.

Keynote. Binary Analysis in the Wild West. ACSAC PPREW 2015.

Invited Talk. A Dozen Years of Shellphish - From Defcon to the DARPA Cyber Grand Challenge.
HITCON CMT 2015.
Invited Talk. Angry Hacking - The Next Generation of Binary Analysis. DEFCON 2015.
Invited Talk. Dark Side of the ELF - Leveraging Dynamic Loading to pwn noobs. DEFCON 2015.
Invited Talk. Using Static Binary Analysis to Find Vulnerabilities and Backdoors in Firmware.
Blackhat 2015.
Tool Presentation. CTF Tools - Taking the Headache out of Security Tool Installation. Blackhat
Arsenal 2015.
Tool Presentation. Preeny - LD_PRELOAD for Security Analysis. Blackhat Arsenal 2015.

Service

U.S. CISA Technical Advisory Council. 2022.


DEF CON CTF organizer. 2018-2021.
Conference Program Committees: NDSS (2023), Usenix Security (2022), IEEE Security and
Privacy (2020–2022), ACM CCS (2020), ACM AsiaCCS (2020), DIMVA (2018, 2021), RAID (2018,
2021).
Workshop Program Committees: NDSS Workshop on Binary Analysis Research (2017–2022),
ACM CCS Workshop on Forming an Ecosystem Around Software Transformation (2018,2019),
ACM Workshop on Automotive Cybersecurity (2018), ISSTA TECPS (2017).
Steering Committee. NDSS Workshop on Binary Analysis Research 2017-2022.
Workshop Program Committee Chair. NDSS Workshop on Binary Analysis Research (2018), ACM
CCS Workshop on Forming an Ecosystem Around Software Transformation (2018).
ASU SCAI Committees. CS Graduate Program Committee (2019-2022), Faculty Search
Committee --- Cybersecurity (2017, 2019-2021), Faculty Search Committee --- Biodesign (2017,
2018), New Faculty Onboarding Committee (2022).
ASU SCAI Committee Chairships. New Faculty Onboarding Committee (2022), CS Graduate
Program Committee (2019, 2021), Faculty Search Committee --- Cybersecurity (2019-2021), New
Faculty Onboarding Committee (2022).
NSF SaTC Panel Reviewer. 2018-2020.
Track Lead. SCORE C3E 2017.
Program Committee, Session Chair. Usenix Enigma 2017.

Completed Mentorship

MS Thesis Committee Co-Chair. Jaswant Pakki (graduated).


MS Thesis Committee Co-Chair. Ashwin Sudhir (graduated).
MS Thesis Committee Co-Chair. William Gibbs (graduated).
MS Thesis Committee Co-Chair. Connor Nelson (graduated).
MS Thesis Committee Co-Chair. Vaibhav Dixit (graduated).
MS Thesis Committee Member. Zachary Crosley (graduated).
Undergraduate Advisor. Kevin Stevens (graduated).
Undergraduate Co-Advisor. Jaswant Pakki (graduated).
Undergraduate Co-Advisor. William Gibbs (graduated).
Apprenticeship Mentor. Akshay Ajayan.
Apprenticeship Mentor. John Andrews.
Apprenticeship Mentor. Salah Baddou.
Apprenticeship Mentor. Xingman Chen.
Apprenticeship Mentor. Osi Ikharebha.
Apprenticeship Mentor. Xavier Maso.
Apprenticeship Mentor. Rana Pourmohamad.
Apprenticeship Mentor. Pradeep Soundrapandian (completed 2020).
Apprenticeship Mentor. Chien-Yuan Wang (completed 2019).
Apprenticeship Mentor. Ryo Ichikawa (completed 2018).
Apprenticeship Mentor. Jack Phillips (completed 2018).
Apprenticeship Mentor. Ange Andries (completed 2019).
Apprenticeship Mentor. Gokul Menon (completed 2019).
Apprenticeship Mentor. Jay Menon (completed 2019).
Apprenticeship Mentor. Sung Ta (completed 2019).
Apprenticeship Mentor. Zhenpeng Lin (completed 2019).
Apprenticeship Mentor. Nipun Gupta (completed 2019).
Apprenticeship Mentor. Fangzhou Dong (completed 2019).
Apprenticeship Mentor. Aaron Branch (completed 2019).
Apprenticeship Mentor. Bader AlBassam (completed 2019).

Teaching

F2022: CSE 598: Emerging Techniques in Cybersecurity (newly developed).


F2020, S2021, F2021, F2022: CSE 591/691: Current Topics in Cybersecurity (newly developed).
F2018, F2019, F2020, F2021, F2022: CSE 466: Computer Systems Security (newly developed)
S2021: CSE 598: Applied Vulnerability Research (newly developed).
S2021: CSE 598: Accelerated Applied Security (newly developed).
F2020. ASU 101: The ASU Experience.
S2017: CSE 591: Automated Binary Code Analysis (newly developed).

Endeavors
◌ I am a leader of the Order of the Overflow, the organizers of the DEF CON CTF, the world
championship of cybersecurity competitions, from 2018 through 2021.
◌ I was the captain for Shellphish's participation in the DARPA Cyber Grand Challenge. We
finished in 3rd place, of 7 finalists (out of over 100 teams). We were the top-placing
"unfunded" team, the top-placing academic team, and the only team to open-source our
Cyber Reasoning System.
◌ I have competed on the UCSB Security Lab team (team Shellphish) at the DEFCON CTF
from 2009 through 2017, leading it from 2011 through 2017. In 2015, our team ranked 4th
worldwide.
◌ I have been a leading or core member of the organization team behind the 2011 through
2016 UCSB iCTF Computer Security competitions.
◌ I organized and taught at the UCSB Hacking Club meetings from 2011 to 2017.
◌ I danced Ballroom Dance competitively through college, and continue to dance West
Coast Swing.
◌ I hold a black belt in Taekwondo from two studios.

You might also like