research intern, max planck institute for security and privacy

[Fall 2023]

I worked on rehosting firmware extracted from an embedded device to be able to run it with a fuzzer. I used Ghidra, C/C++, and fuzzware.

software engineering intern, micron

[Summer 2023]

At Micron, I worked on the Advanced Memory Systems team to optimize workloads for use with CXL memory. I worked with C/C++, Bash, and LLVM/Clang.

undergraduate teaching assistant, ut austin

[Spring 2021, Fall 2021]

As a TA for CS349 Contemporary Issues in Computer Science, I graded assignments and held office hours for 40+ students.

security engineering intern, mozilla

[Summer 2020]

I was part of the Firefox Operations Security team, where I worked on Dependency Observatory, a tool that allows developers to check how secure an NPM package is before using it in their project. I researched how vulnerable top packages in NPM, PyPI and Cargo are to attack, and used those findings to tweak the algorithm used to "score" packages' safety in Dependency Observatory. I worked with Python, k8s, Docker, Flask, and GraphQL.

undergraduate teaching assistant, ut austin

[Spring 2019, Fall 2019]

As a TA for CS361 Intro to Security, I created and graded security-focused assignments for 80+ students, lectured on various topics in security like ​cryptography​ and ​forensics​, and held office hours every week. I also wrote and ran a Capture the Flag (CTF) competition that was used for the students' final exam last semester.

security analyst intern, electronic arts

[Summer 2019]

As part of the Enterprise Security team, I wrote programs in ​Python​ to automate validating the results from CASB scans. The programs conduct port scans and send GET/HEAD requests to cloud service instances, then export the results to a JSON file, Google Sheet and MySQL database. It also sent out emails to the owner of those accounts to share and explain the findings. I also created a dynamic warning page to place in front of non-approved websites as categorized by the firewall.