Andrea Mambrei Politecnico di Milano NECSTLab Phone: +39 392/0354113 Address: Via Galileo Galilei Costa Masnaga 23845 Italy Email: mmbr@gmail.com : hp://www.andreamambrei.com Twier: @mmbr GitHub: mmbr@github Linkedin: mmbr@linkedin Born: November , —Como, Italy Nationality: Italian Synopsis I’m a master Student at Politecnico di Milano in Italy, nd year. Currently I’m involved in several projects. e most important are the creation of an internal cloud, for our department, based on OpenNebula and an LLVM pass to analyze and get stronger cryptoalgorithms at compile time. My main interests are in computer security and operating systems (eg. linux kernel hacking). Since , I have been working at NECST research laboratory with professors Stefano Zanero, Federico Maggi and Marco Domenico Santambrogio Recently, I joined the Northeastern section of the SecLab laboratory as visiting student and here I’m working on my master thesis. I used to have fun playing CTFs (such as ruCTF, ICTF, DefCon als) with the polimi hacking team “Tower of hanoi”. Current position Visiting Student, Northeastern University, Boston Areas of specialization Computer Security Operating Systems Distributed Systems Compilers Programming Languages Mainly I used to write programs in C and Java. I have experienced also bash, C++, assembly ( and x). For my programming classes I have seen, at a basic level, functional languages such as Erlang, Haskell, Scheme (Racket dialect) and Prolog. On my own I saw python, jsp, php and others. Always I’m trying to be language indipendent. Education -present - - MS in Computer Science Engineering, Politecnico di Milano B in Computer Science Engineering, Politecnico di Milano D in Computer Science. ITIS Badoni Languages Italian English Mother tongue TOEIC - B Summer Schools SysSec ”Reverse Engingeering” Summer School, Amesterdam Publications talks T MIT Meeting, Massachussets Istitute of Technology, ”AndROMeda, Analyzer of Android (custom) ROM in the wild” Computer Security Course, Politecnico di Milano, ”Introduction to assembly exploiting” Poul Workshop, Politecnico di Milano, ”Reverse engineering applied to Malware Analysis” NecstSummerWorkShop edition, Goglio di Baceno, ”Reverse engineering for fun and profit” Last updated: September ,
© Copyright 2024 Paperzz