SlideShare a Scribd company logo
1 of 4
Download to read offline
Khaled Serag
Email: kserag1@binghamton.edu
412 Breckenridge drive, apt 15, 35802 Huntsville, AL USA.
(347) 766-1152 (cell)
Qualifications:
o Cyber Security Researcher at Boeing Research and Technology
o Information Assurance industry experience obtained through position at Boeing and two internships
o Research Experience obtained through position at Boeing and Master’s Degree research
o Diverse Background in Electrical Engineering, Computer Engineering, Network Engineering, and Information
Assurance
o Cisco Certified Network Associate (CCNA)
o Certified Ethical Hacker (CEH)
o Export Control Friendly, Security Clearance Pending (Secret)
Education:
State University of New York at Binghamton
The Thomas J. Watson School of Engineering
Master of Science in Electrical and Computer Engineering December 2015
Specialization: Information Assurance
Cumulative GPA (3.9125)
Ain Shams University, Cairo, Egypt
Bachelor of Science in Electrical Engineering September 2012
General Grade (G.)
Major Grade (V.G.)
Certifications:
Cisco Certified Network Associate (CCNA) December 2013
Certified Ethical Hacker (CEH) July 2016
Skills:
Programming and Scripting: PHP, JavaScript, HTML, CSS, JQuery, AJAX, C, C++, Python, Tcl, Bash Scripting, Matlab,
PLC Ladder Programming
Networks and Security: Cryptography, Linux, Windows, Wireshark, VMware, Network Troubleshooting, Subnetting,
Network Security, IPV4, IPV6, MIL-STD-1553, MySQL, PHPMyAdmin, SQL Injection, FreeRadius Authentication, Multi-
Factor Authentication, Syslog Servers, Vulnerability Assessment, Nessus, Penetration Testing, Metasploit, DNS
Computer Engineering: Digital Systems Design, Computer Design, System on a Chip, CMOS, Verilog, Synopsis
Electrical Engineering Skills: Power Electronics, Power distribution, Classic Control Circuits, PLC, Power Transmission,
Power generation, Electrical Machines, AutoCAD
Languages: English & Arabic Fluency, Above Intermediate French
Citizenship and Visa Status:
U.S. Citizen
Related Professional Experience:
Software Engineer (Cyber Security Researcher)
Boeing Research and Technology, Huntsville, Alabama, USA February 2016 - Present
MIL-STD-1553 Guard/Monitor Design (Multiple Patents Disclosed)
February 2016- Present
o Collaborate with team to design a guard for MIL-STD-1553 systems using off-the-shelf components
o Researched what existing solutions could be deployed
o Researched what existing components could be incorporated into the guard design (Processors, 1553 Controllers)
o Researched what approaches could be followed for the guard design to meet the Electrical, Physical, and Latency
requirements
o Investigated the impact of installing a guard between the protected payload and the bus on the system’s latency
o Investigated the various types of attacks that could take place on a 1553 bus system, and investigated the
counter-measures
o Collaborated with team to specify the electrical requirements of the guard
o Participated in outlining the system’s architecture (Processors, Memory, DMA, Hypervisors, 1553 Controllers…
etc.)
o Collaborate with team to implement a secure booting process
o Cooperate with team to implement a configuration process
Multiple Independent Layers of Security for MIL-STD-1553 Systems
September 2016 - Present
o Collaborate with two team-mates to design a Multiple Single Levels of Security architecture for multiple 1553
busses running on a shared hardware
o Work with team to design an interface that maintains the separation between different security levels of each bus
o Investigate the best way to maintain separation between security domains (Hypervisors, RTOS)
o Research the system’s time analysis, how to minimize the delays of an interface serving multiple systems
Common Open Research Emulator (CORE) API Development
September 2016 - Present
o Collaborate with team Develop CORE’s API to incorporate more protocols/standards
o Develop CORE’s API to be able to communicate with more network emulation open source software
o Investigate ways to develop a complete framework for wireless communications
o Develop CORE’s software to facilitate the interaction between CORE and EMANE (Extendable Mobile Ad-hoc
Network Emulator)
Cyber Risk Intern
Deloitte, New York City, New York, USA June 2015 - July 2015
o Collaborated with team to develop SIEM content for The State of Connecticut
o Created 8 Qradar reports based on 6 use cases
o Concluded with a final presentation during the Weekly Status Meeting
Information Security Engineering Intern
Security Meter, Giza, Egypt October - December 2013
o Applied (SIEM) solutions for both Linux & windows computers of Banque Misr Using Qradar & Tenable
o Collaborated with 2 Engineers to apply Freeradius server authentication on the computers of Banque Misr
o Participated in multiple projects to develop two factor authentication( using Entrust) plans for several
organizations
Academic Research & Projects:
Research
Distributed Web Crawling System September - December 2015
o Used Python and Selenium to control Google Chrome browser to interface with pages, and gather data in real
time
o Wrote a Crawling algorithm that allows for the specification of the crawling depth, and whether crawling should
be recursive or iterative
o Created a virtual machine, dedicated for crawling
o Ran several instances of the crawler virtual machines
o Created a central control unit, responsible for delegating tasks to virtual machines and switching them on and off
o Created a database that collects the data gathered from running crawlers and keeps track of the visited URLs
o Created a mechanism that checks whether a given link has already been visited before
o Used Chrome internals to get each page’s memory overhead
o Cooperated with a colleague to extend the usage of the system to find ways to detect intrusion attempts caused
by specific webpages
o Used Gephi to visualize the crawling operation in real time, draw relationships between links, and represent each
link as a node, whose size is dependent upon its memory consumption
Privacy Assurance on Facebook January - May 2015
o Collaborated with my professor to find better ways to protect personal information on Facebook
o Collaborated with two students to use Steganography to embed secret pictures in cover pictures
o Created a Facebook App. to upload pictures, create stego keys pertinent to each user, store them in a central
database, and distribute them later upon request
o Investigated whether using Homomorphic Encryption, or Partially Homomorphic Encryption is viable
o Investigated whether Partially Homomorphic Encryption (Additively, Multiplicatively) could be beneficial if used
to encrypt keys in the database
o Created an external authentication server, responsible for distributing the keys based on the requester’s identity
o Collaborated with a team member to write a JavaScript Plugin, that requests keys from the authentication server,
extracts the secret image, and displays it below the cover image for allowed users
Projects
Security Testing For LSBM Steganography December 2015
o Wrote a Matlab routine to define the pixel embedding costs for a given cover image
o Used the cost routine, LSBM, and 1000 Cover Images to embed 6 different payloads in each cover image, and
generate 6000 stego images
o Computed the KB features for all cover and stego images
o Steganalyzed each payload using the Ensemble Classifier
Dual Core Processor Design Using Verilog May 2014
o Collaborated with two team-mates to design a simple dual core processor
o Wrote the code for the Caches, ALU’s, And buffers
o Cooperated with team to outline the system’s architecture
o Synthesized the code using Synopsys
Patents:
Transparent Mode for MIL-STD-1553 Data Guards Disclosed*: October 2016
File-Driven Data Filtering and Monitoring for MIL-STD-1553 Disclosed*: October 2016
Monitor for MIL-STD-1553 with MILS Disclosed*: October 2016
(*): Patent filed and submitted to the Patent Portfolio Management Organization within the company, pending the company’s approval to be submitted to the USPTO
Other Work Experience:
Site Engineer
Telecomax Networks, Cairo, Egypt September - December 2012
o Oversaw the construction of four cell phone towers on one project site
o Planned, Outlined & Managed the project timeline, ensuring project was kept on schedule
o Ensured appropriate resources were sourced
o Attended the process of Construction of 3 Sites as a trainee
Hobbies:
Traveling, Languages, Literature, History, Philosophy, Playing Oud (Musical Instrument)

More Related Content

What's hot

Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...Jennifer Burns
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE - ATT&CKcon
 
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...MITRE - ATT&CKcon
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian MalwareKaspersky
 
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...MITRE - ATT&CKcon
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the emailGianni Fiore
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in ActionJosh Sokol
 
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...MITRE - ATT&CKcon
 
Reduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security VulnerabilitiesReduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security VulnerabilitiesProtecode
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualizationamiable_indian
 
MITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - OctoberMITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - OctoberMITRE - ATT&CKcon
 
MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...
MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...
MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...MITRE - ATT&CKcon
 
Vulnerability Detection Based on Git History
Vulnerability Detection Based on Git HistoryVulnerability Detection Based on Git History
Vulnerability Detection Based on Git HistoryKenta Yamamoto
 
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE - ATT&CKcon
 

What's hot (20)

Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
 
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian Malware
 
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
 
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
 
Reduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security VulnerabilitiesReduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security Vulnerabilities
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
 
Encryption
EncryptionEncryption
Encryption
 
System Security @ NECSTLab
System Security @ NECSTLabSystem Security @ NECSTLab
System Security @ NECSTLab
 
MITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - OctoberMITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - October
 
MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...
MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...
MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira ...
 
Vulnerability Detection Based on Git History
Vulnerability Detection Based on Git HistoryVulnerability Detection Based on Git History
Vulnerability Detection Based on Git History
 
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
 

Viewers also liked

Abiel compu
Abiel compuAbiel compu
Abiel compuwwiirroo
 
Read short a for apple words
Read short a for apple wordsRead short a for apple words
Read short a for apple wordslerisha7
 
Liquefaction and liquefaction potential
Liquefaction and liquefaction potentialLiquefaction and liquefaction potential
Liquefaction and liquefaction potentialMahesh Raj Bhatt
 
Sensibilidad Y Especificidad Del Ultrasonido Fast En La DeteccióN De LíQuido...
Sensibilidad Y Especificidad Del Ultrasonido Fast  En La DeteccióN De LíQuido...Sensibilidad Y Especificidad Del Ultrasonido Fast  En La DeteccióN De LíQuido...
Sensibilidad Y Especificidad Del Ultrasonido Fast En La DeteccióN De LíQuido...Gaspar Alberto Motta Ramírez
 

Viewers also liked (8)

CV atin
CV atinCV atin
CV atin
 
Abiel compu
Abiel compuAbiel compu
Abiel compu
 
Read short a for apple words
Read short a for apple wordsRead short a for apple words
Read short a for apple words
 
Gatot Trimulyadi- Grafting by irradiation for ion exchange
Gatot Trimulyadi- Grafting by irradiation for ion exchangeGatot Trimulyadi- Grafting by irradiation for ion exchange
Gatot Trimulyadi- Grafting by irradiation for ion exchange
 
Short a words
Short   a  wordsShort   a  words
Short a words
 
Liquefaction and liquefaction potential
Liquefaction and liquefaction potentialLiquefaction and liquefaction potential
Liquefaction and liquefaction potential
 
Dry Stack Tailings Overview
Dry Stack Tailings OverviewDry Stack Tailings Overview
Dry Stack Tailings Overview
 
Sensibilidad Y Especificidad Del Ultrasonido Fast En La DeteccióN De LíQuido...
Sensibilidad Y Especificidad Del Ultrasonido Fast  En La DeteccióN De LíQuido...Sensibilidad Y Especificidad Del Ultrasonido Fast  En La DeteccióN De LíQuido...
Sensibilidad Y Especificidad Del Ultrasonido Fast En La DeteccióN De LíQuido...
 

Similar to Linkedin

Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksVaidas Brundza
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppIRJET Journal
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMIRJET Journal
 
Educause Annual 2007
Educause Annual 2007Educause Annual 2007
Educause Annual 2007Neil Matatall
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET Journal
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 

Similar to Linkedin (20)

mitra_resume-2
mitra_resume-2mitra_resume-2
mitra_resume-2
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area Networks
 
resume4
resume4resume4
resume4
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android App
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
 
Educause Annual 2007
Educause Annual 2007Educause Annual 2007
Educause Annual 2007
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
journal in research
journal in research journal in research
journal in research
 
journal published
journal publishedjournal published
journal published
 
J017236366
J017236366J017236366
J017236366
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 

Linkedin

  • 1. Khaled Serag Email: kserag1@binghamton.edu 412 Breckenridge drive, apt 15, 35802 Huntsville, AL USA. (347) 766-1152 (cell) Qualifications: o Cyber Security Researcher at Boeing Research and Technology o Information Assurance industry experience obtained through position at Boeing and two internships o Research Experience obtained through position at Boeing and Master’s Degree research o Diverse Background in Electrical Engineering, Computer Engineering, Network Engineering, and Information Assurance o Cisco Certified Network Associate (CCNA) o Certified Ethical Hacker (CEH) o Export Control Friendly, Security Clearance Pending (Secret) Education: State University of New York at Binghamton The Thomas J. Watson School of Engineering Master of Science in Electrical and Computer Engineering December 2015 Specialization: Information Assurance Cumulative GPA (3.9125) Ain Shams University, Cairo, Egypt Bachelor of Science in Electrical Engineering September 2012 General Grade (G.) Major Grade (V.G.) Certifications: Cisco Certified Network Associate (CCNA) December 2013 Certified Ethical Hacker (CEH) July 2016 Skills: Programming and Scripting: PHP, JavaScript, HTML, CSS, JQuery, AJAX, C, C++, Python, Tcl, Bash Scripting, Matlab, PLC Ladder Programming Networks and Security: Cryptography, Linux, Windows, Wireshark, VMware, Network Troubleshooting, Subnetting, Network Security, IPV4, IPV6, MIL-STD-1553, MySQL, PHPMyAdmin, SQL Injection, FreeRadius Authentication, Multi- Factor Authentication, Syslog Servers, Vulnerability Assessment, Nessus, Penetration Testing, Metasploit, DNS Computer Engineering: Digital Systems Design, Computer Design, System on a Chip, CMOS, Verilog, Synopsis Electrical Engineering Skills: Power Electronics, Power distribution, Classic Control Circuits, PLC, Power Transmission, Power generation, Electrical Machines, AutoCAD Languages: English & Arabic Fluency, Above Intermediate French Citizenship and Visa Status: U.S. Citizen
  • 2. Related Professional Experience: Software Engineer (Cyber Security Researcher) Boeing Research and Technology, Huntsville, Alabama, USA February 2016 - Present MIL-STD-1553 Guard/Monitor Design (Multiple Patents Disclosed) February 2016- Present o Collaborate with team to design a guard for MIL-STD-1553 systems using off-the-shelf components o Researched what existing solutions could be deployed o Researched what existing components could be incorporated into the guard design (Processors, 1553 Controllers) o Researched what approaches could be followed for the guard design to meet the Electrical, Physical, and Latency requirements o Investigated the impact of installing a guard between the protected payload and the bus on the system’s latency o Investigated the various types of attacks that could take place on a 1553 bus system, and investigated the counter-measures o Collaborated with team to specify the electrical requirements of the guard o Participated in outlining the system’s architecture (Processors, Memory, DMA, Hypervisors, 1553 Controllers… etc.) o Collaborate with team to implement a secure booting process o Cooperate with team to implement a configuration process Multiple Independent Layers of Security for MIL-STD-1553 Systems September 2016 - Present o Collaborate with two team-mates to design a Multiple Single Levels of Security architecture for multiple 1553 busses running on a shared hardware o Work with team to design an interface that maintains the separation between different security levels of each bus o Investigate the best way to maintain separation between security domains (Hypervisors, RTOS) o Research the system’s time analysis, how to minimize the delays of an interface serving multiple systems Common Open Research Emulator (CORE) API Development September 2016 - Present o Collaborate with team Develop CORE’s API to incorporate more protocols/standards o Develop CORE’s API to be able to communicate with more network emulation open source software o Investigate ways to develop a complete framework for wireless communications o Develop CORE’s software to facilitate the interaction between CORE and EMANE (Extendable Mobile Ad-hoc Network Emulator) Cyber Risk Intern Deloitte, New York City, New York, USA June 2015 - July 2015 o Collaborated with team to develop SIEM content for The State of Connecticut o Created 8 Qradar reports based on 6 use cases o Concluded with a final presentation during the Weekly Status Meeting Information Security Engineering Intern Security Meter, Giza, Egypt October - December 2013 o Applied (SIEM) solutions for both Linux & windows computers of Banque Misr Using Qradar & Tenable o Collaborated with 2 Engineers to apply Freeradius server authentication on the computers of Banque Misr o Participated in multiple projects to develop two factor authentication( using Entrust) plans for several organizations
  • 3. Academic Research & Projects: Research Distributed Web Crawling System September - December 2015 o Used Python and Selenium to control Google Chrome browser to interface with pages, and gather data in real time o Wrote a Crawling algorithm that allows for the specification of the crawling depth, and whether crawling should be recursive or iterative o Created a virtual machine, dedicated for crawling o Ran several instances of the crawler virtual machines o Created a central control unit, responsible for delegating tasks to virtual machines and switching them on and off o Created a database that collects the data gathered from running crawlers and keeps track of the visited URLs o Created a mechanism that checks whether a given link has already been visited before o Used Chrome internals to get each page’s memory overhead o Cooperated with a colleague to extend the usage of the system to find ways to detect intrusion attempts caused by specific webpages o Used Gephi to visualize the crawling operation in real time, draw relationships between links, and represent each link as a node, whose size is dependent upon its memory consumption Privacy Assurance on Facebook January - May 2015 o Collaborated with my professor to find better ways to protect personal information on Facebook o Collaborated with two students to use Steganography to embed secret pictures in cover pictures o Created a Facebook App. to upload pictures, create stego keys pertinent to each user, store them in a central database, and distribute them later upon request o Investigated whether using Homomorphic Encryption, or Partially Homomorphic Encryption is viable o Investigated whether Partially Homomorphic Encryption (Additively, Multiplicatively) could be beneficial if used to encrypt keys in the database o Created an external authentication server, responsible for distributing the keys based on the requester’s identity o Collaborated with a team member to write a JavaScript Plugin, that requests keys from the authentication server, extracts the secret image, and displays it below the cover image for allowed users Projects Security Testing For LSBM Steganography December 2015 o Wrote a Matlab routine to define the pixel embedding costs for a given cover image o Used the cost routine, LSBM, and 1000 Cover Images to embed 6 different payloads in each cover image, and generate 6000 stego images o Computed the KB features for all cover and stego images o Steganalyzed each payload using the Ensemble Classifier Dual Core Processor Design Using Verilog May 2014 o Collaborated with two team-mates to design a simple dual core processor o Wrote the code for the Caches, ALU’s, And buffers o Cooperated with team to outline the system’s architecture o Synthesized the code using Synopsys
  • 4. Patents: Transparent Mode for MIL-STD-1553 Data Guards Disclosed*: October 2016 File-Driven Data Filtering and Monitoring for MIL-STD-1553 Disclosed*: October 2016 Monitor for MIL-STD-1553 with MILS Disclosed*: October 2016 (*): Patent filed and submitted to the Patent Portfolio Management Organization within the company, pending the company’s approval to be submitted to the USPTO Other Work Experience: Site Engineer Telecomax Networks, Cairo, Egypt September - December 2012 o Oversaw the construction of four cell phone towers on one project site o Planned, Outlined & Managed the project timeline, ensuring project was kept on schedule o Ensured appropriate resources were sourced o Attended the process of Construction of 3 Sites as a trainee Hobbies: Traveling, Languages, Literature, History, Philosophy, Playing Oud (Musical Instrument)