Portfolio

A list of past and current projects, papers, and talks

CloudSecList

CloudSecList

2019 - ongoing
CloudSecDocs

CloudSecDocs

2020 - ongoing
Technical Reviewer

Technical Reviewer

2014 - ongoing
Lead the Future

Lead the Future

2022 - ongoing
Identity Federation for CI on AWS

Identity Federation for CI on AWS

2022 - ongoing
Build, sign, and compute the SBOM of a container image

Build, sign, and compute the SBOM of a container image

2022 - ongoing
Cloud Security Roadmap

Cloud Security Roadmap

2021 - ongoing
AWS Security Reviewer

AWS Security Reviewer

2021
CNCF Security Technical Advisory Group (STAG)

CNCF Security Technical Advisory Group (STAG)

2020 - ongoing
k8s-lab-plz: A modular Kubernetes Lab

k8s-lab-plz: A modular Kubernetes Lab

2020 - ongoing
CNCF Security Certification (CKS) Creation

CNCF Security Certification (CKS) Creation

2020
Kritis

Kritis

2019 - 2020
Cartography

Cartography

2019 - ongoing
GoScan: An Interactive Network Scanner

GoScan: An Interactive Network Scanner

2018 - 2019
Offensive ELK: Elasticsearch for Offensive Security

Offensive ELK: Elasticsearch for Offensive Security

2018
Needle: The iOS Security Testing Framework

Needle: The iOS Security Testing Framework

2016 - 2018
Offensive iOS Exploitation Training Course

Offensive iOS Exploitation Training Course

2016 - 2018
OWASP

OWASP

2013 - 2018
Social Authentication: Vulnerabilities, Mitigations, and Redesign [MSc Thesis]

Social Authentication: Vulnerabilities, Mitigations, and Redesign [MSc Thesis]

2011 - 2013
Cartography: using graphs to improve and scale security decision-making

Cartography: using graphs to improve and scale security decision-making

2020-11-17
Needle v1.0.0: new native agent and CI integration

Needle v1.0.0: new native agent and CI integration

2017-07-27
Mobile Security for Enterprises

Mobile Security for Enterprises

2017-01-26
Offensive iOS Exploitation

Offensive iOS Exploitation

2016-11-08
Needle

Needle

2016-11-03
Needle: Finding Issues within iOS Applications

Needle: Finding Issues within iOS Applications

2016-10-14
Needle

Needle

2016-08-03
Enhancing Mobile Malware: an Android RAT Case Study

Enhancing Mobile Malware: an Android RAT Case Study

2014-11-22
Social Authentication: Vulnerabilities, Mitigations, and Redesign (short version)

Social Authentication: Vulnerabilities, Mitigations, and Redesign (short version)

2014-06-06
In Depth Security (Proceedings of the DeepSec Conferences)

In Depth Security (Proceedings of the DeepSec Conferences)

2016-01-07
Social Authentication: Vulnerabilities, Mitigations, and Redesign

Social Authentication: Vulnerabilities, Mitigations, and Redesign

2014-11-21
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

2014-11-03
All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

2012-12-02