Security Researcher at Dynatrace specializing in cloud native security and runtime threat detection.
- π― Focus Areas: Vulnerability Analysis, Kubernetes Security, Runtime Detection, AI/ML for Threat Detection
- π οΈ Daily Tools:
Kubernetes,Tetragon,Python,Go,eBPF - π¬ Research: Identity Attacks, IoT Security, Container Security, Exploitation Frameworks
- π» Current Work: Building open source security tools, cloud threat detection systems, vulnerability testing frameworks
- π± Contributing: Cilium Tetragon ecosystem, cloud security projects
|
Container misconfigurations β From theory to exploitation Practical exploration of container vulnerabilities and exploitation techniques
|
Kubernetes misconfiguration attack paths Attack vectors stemming from K8s misconfigurations and defensive approaches
|
|
Understanding Kubernetes security misconfigurations Foundation of Kubernetes configuration security issues
|
Apache Struts CVE-2024-53677 Analysis Vulnerability analysis and detection indicators
|
| π Key Publications | π Patent Portfolio |
|---|---|
| Machine Learning Model for Classifying Unsolicited IoT Devices 14th International Wireless Communications & Mobile Computing Conference (IWCMC), 2018 |
System and Method for Cybersecurity Reconnaissance, Analysis, and Score Generation US Patent 11,297,109 Β· 11,924,251 Β· 12,335,317 |
| Internet of Malicious Things: Correlating Active and Passive Measurements IEEE Communications Magazine, Vol. 56(9), pp. 170-177, 2018 |
Detecting and Mitigating Golden SAML Attacks Against Federated Services US Patent 11,552,968 Β· 11,818,150 |
| Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution IEEE/IFIP Network Operations and Management Symposium (NOMS), 2023 |
Cybersecurity Analysis and Protection Using Distributed Systems US Patent 11,968,235 Β· 12,267,369 |
π¬ Open to collaborations on security research and cloud native security projects


