I graduated in March 2019. I am currently (unless stated otherwise), working at some company in the Valley. I love computer security, and it leads me to tinkering with cryptic software. Reverse engineering interesting bits of malware is always a good time for me.
I worked extensively on Artifice, helping design and implement the storage model, including but not limited to the I/O engine, the module structure, and the metadata structures.
I also worked with James Hughes to develop a novel system to generate high entropy true random numbers using camera sensors.
Another project I looked into was the secure execution of protected binaries on systems that can be classified as secure. There is a lot of research into protecting a system from a harmful binary, but not nearly enough on protecting a binary from a malicious system. My research included a design that allowed only approved machines to execute a protected binary, aka, binary level entitlements.
|Austen Barker, Yash Gupta, Sabrina Au, Eugene Chou, Ethan L. Miller, Darrell D. E. Long, "Artifice: Data in Disguise", Proceeding of the Conference on Mass Storage Systems and Technologies (MSST '20), October 2020.|
|Austen Barker, Staunton Sample, Yash Gupta, Ana McTaggart, Ethan L. Miller, Darrell D. E. Long, "Artifice: A Deniable Steganographic File System", Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI '19), August 2019.|
|James Hughes, Yash Gupta, "The Collector — Gigabit True Random Number Generator Using Image Sensor Noise", Usenix HotSec '18, August 2018.|