Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Security Leadership
Industry
Technology / Software / Internet
Tags
security
public key cryptography
cryptography
cryptanalysis
rsa
number theory
mathematics
hacking
algebra
software architecture
group theory
exploitation
diffie-hellman
flight software
quality
software engineering
model based testing
reverse engineering
demo
extended euclidean algorithm
secure programming
factoring
algorithms
design
computer science
public key
software testing
modular arithmetic
testing
ethical hacking
experiments
traceability
random number
chosen ciphertext attack
python
testability
security assurance
software test case generation
model-based testing
design for security
software analysis
no padding
shared rsa modulus
key exchange
mbt
cyber security
linux
requirements
test case generation
secure coding
automated test case generation
integer security
threat modeling
integer
smt solvers
security research
information security
owasp
symmetric encryption
c and c++
web server
client-server architecture
metrics
patching
unix
penetration testing
information technology
vulnerability research
http
load-time hacking
architecture
medical device
code quality
industrial systems
ground software
software quality
architecture maintenance and evolution
software testability
software product line
software architecture style
nasa software
runtime analysis
static analysis
dynamic analysis
api
safety
security bugs
threats
publish-subscribe
design-for-security
migitation
hackers
vulnerabilities
remote code execution
stack canary
remote buffer overflow
operating system security
address space randomization
side-channel attacks
patterns
programming
software bus
square root
cyclic group
quantum
wiener
short secret exponent
continued fractions
binary search
bigdecimal
biginteger
parity
games
homomorphism
chosen plaintext attack
textbook rsa
raw rsa
meet-in-the-middle attack
java
rsa numbers
integer factorization
deserialization
.net
program understanding
relational algebra
random
trapdoor
cyclic attack
e
public exponent
hastad
chinese-remainder theorem
authentication
password
srp
active attack
applied algebra
math
file i/o
privilege escalation
discrete log algorithm
baby-step gaint-step
dependencies
code architecture
case study
documentation
code view
code analysis
modular view
design for testing
system of systems
architectural views
architectural style
program analysis
computer arithmetic
denial of service
verification
counterexample
theorem provers
reliability
automation
links
test cases
source code
documents
searching
vector space
secure communication
prime number
industry
fermat
euler
euclid
common factor attack
pki
key derivation
intractable
discrete math
model
See more
Presentations
(48)Likes
(10)How to Release Rock-solid RESTful APIs and Ice the Testing BackBlob
Bob Binder
•
10 years ago
Current State and Challenges for Model-Based Security Testing
University of Innsbruck, Blekinge Institute of Technology
•
9 years ago
Michael.aguilar
NASAPMC
•
13 years ago
Richard Johnson, high performance fuzzing
PacSecJP
•
9 years ago
Dive into ROP - a quick introduction to Return Oriented Programming
Saumil Shah
•
12 years ago
LD_PRELOAD Exploitation - DC9723
Iftach Ian Amit
•
14 years ago
Symbolic Execution And KLEE
Shauvik Roy Choudhary, Ph.D.
•
15 years ago
In the lands of corrupted elves - Breaking ELF software with Melkor fuzzer
Alejandro Hernández
•
10 years ago
How Spotify Does Test Automation - Kristian Karl
SmartBear
•
12 years ago
Netflix API - Separation of Concerns
Daniel Jacobson
•
11 years ago
Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Security Leadership
Industry
Technology / Software / Internet
Tags
security
public key cryptography
cryptography
cryptanalysis
rsa
number theory
mathematics
hacking
algebra
software architecture
group theory
exploitation
diffie-hellman
flight software
quality
software engineering
model based testing
reverse engineering
demo
extended euclidean algorithm
secure programming
factoring
algorithms
design
computer science
public key
software testing
modular arithmetic
testing
ethical hacking
experiments
traceability
random number
chosen ciphertext attack
python
testability
security assurance
software test case generation
model-based testing
design for security
software analysis
no padding
shared rsa modulus
key exchange
mbt
cyber security
linux
requirements
test case generation
secure coding
automated test case generation
integer security
threat modeling
integer
smt solvers
security research
information security
owasp
symmetric encryption
c and c++
web server
client-server architecture
metrics
patching
unix
penetration testing
information technology
vulnerability research
http
load-time hacking
architecture
medical device
code quality
industrial systems
ground software
software quality
architecture maintenance and evolution
software testability
software product line
software architecture style
nasa software
runtime analysis
static analysis
dynamic analysis
api
safety
security bugs
threats
publish-subscribe
design-for-security
migitation
hackers
vulnerabilities
remote code execution
stack canary
remote buffer overflow
operating system security
address space randomization
side-channel attacks
patterns
programming
software bus
square root
cyclic group
quantum
wiener
short secret exponent
continued fractions
binary search
bigdecimal
biginteger
parity
games
homomorphism
chosen plaintext attack
textbook rsa
raw rsa
meet-in-the-middle attack
java
rsa numbers
integer factorization
deserialization
.net
program understanding
relational algebra
random
trapdoor
cyclic attack
e
public exponent
hastad
chinese-remainder theorem
authentication
password
srp
active attack
applied algebra
math
file i/o
privilege escalation
discrete log algorithm
baby-step gaint-step
dependencies
code architecture
case study
documentation
code view
code analysis
modular view
design for testing
system of systems
architectural views
architectural style
program analysis
computer arithmetic
denial of service
verification
counterexample
theorem provers
reliability
automation
links
test cases
source code
documents
searching
vector space
secure communication
prime number
industry
fermat
euler
euclid
common factor attack
pki
key derivation
intractable
discrete math
model
See more