Curriculum Vitae - Andrea Mambretti

Andrea Mambrei
Politecnico di Milano
Phone: +39 392/0354113
Via Galileo Galilei 
Costa Masnaga 23845 Italy
Email: mmbr
: hp://www.andreamambre
Twier: @mmbr
GitHub: mmbr@github
Linkedin: mmbr@linkedin
Born: November , —Como, Italy
Nationality: Italian
I’m a master Student at Politecnico di Milano in Italy, nd year. Currently I’m involved
in several projects. e most important are the creation of an internal cloud, for our
department, based on OpenNebula and an LLVM pass to analyze and get stronger cryptoalgorithms at compile time. My main interests are in computer security and operating
systems (eg. linux kernel hacking). Since , I have been working at NECST research
laboratory with professors Stefano Zanero, Federico Maggi and Marco Domenico Santambrogio
Recently, I joined the Northeastern section of the SecLab laboratory as visiting student
and here I’m working on my master thesis.
I used to have fun playing CTFs (such as ruCTF, ICTF, DefCon als) with the polimi
hacking team “Tower of hanoi”.
Current position
Visiting Student, Northeastern University, Boston
Areas of specialization
Computer Security
Operating Systems
Distributed Systems
Programming Languages
Mainly I used to write programs in C and Java. I have experienced also bash, C++, assembly ( and x). For my programming classes I have seen, at a basic level, functional
languages such as Erlang, Haskell, Scheme (Racket dialect) and Prolog. On my own I saw
python, jsp, php and others. Always I’m trying to be language indipendent.
MS in Computer Science Engineering, Politecnico di Milano
B in Computer Science Engineering, Politecnico di Milano
D in Computer Science. ITIS Badoni
Mother tongue
TOEIC  - B
Summer Schools
SysSec ”Reverse Engingeering” Summer School, Amesterdam
Publications  talks
MIT Meeting, Massachussets Istitute of Technology, ”AndROMeda, Analyzer of Android
(custom) ROM in the wild”
Computer Security Course, Politecnico di Milano, ”Introduction to assembly  exploiting”
Poul Workshop, Politecnico di Milano, ”Reverse engineering applied to Malware Analysis”
NecstSummerWorkShop  edition, Goglio di Baceno, ”Reverse engineering for fun and
Last updated: September , 