I'm a Master's graduate working with Stefan Savage, Geoff Voelker and Kirill Levchenko. My research interests are in systems, security, and networks. I'm a member of The Center for Evidence-based Security Research, The Center for Networked Systems and The Center for Automotive Embedded Systems Security. I completed my undergrad at UCSD where I founded the undergraduate information security club Eve. I also maintain the UCSD Git server.
Bypassing Corporate Controls on Mac Devices
DEFCON 32, Red Team Village, August 2024
DNS is Still Lame: Why it’s a problem and what we can do about it
ShmooCon 2024, January 2024
What Even is the Internet, Really?
HushCon West 2023, December 2023
The TLDr on TLDs: What happens when Top Level Domains leave the lights on with nobody home
HushCon East 2022, June 2022
Lost and Found Certificates: dealing with residual certificates for pre-owned domains
ToorCon XX, September 2018
DEF CON 26, August 2018
CertGraph: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency
ShmooCon 2018, January 2018
Silent Protest
SHA2017, August 2017
CRACK.SH
DEF CON 25 Demo Labs, July 2017
CertGraph
HushCon East 2017, June 2017
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
ACM Conference on Computer and Communications Security, October 2015
Fast and Vulnerable: A Story of Telematic Failures
ToorCon 17, October 2015
Workshop On Offensive Technologies (WOOT), August 2015
SMTP [in]Security
ToorCamp, July 2014
In the Line of Fire: Risks of DPI-triggered Data Collection,
Ariana Mirian,
Alisha Ukani,
Ian Foster,
Gautam Akiwate,
Taner Halicioglu,
Cynthia T. Moore,
Alex C. Snoeren,
Geoffrey M. Voelker,
and Stefan Savage,
16th Cyber Security Experimentation and Test Workshop (CSET), Marina Del Rey, California, August 2023.
Unresolved Issues: Prevalence, Persistence and Perils of Lame Nameservers,
Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Ian Foster, Stefan Savage, Geoffrey M. Voelker, and kc Claffy,
Proceedings of the ACM Internet Measurement Conference, Pittsburgh, Pennsylvania (via the Internet), October 2020.
Exploring Controller Area Networks,
Ian Foster and Karl Koscher,
USENIX ;login:, December 2015, Vol. 40, No. 6.
Security by Any Other Name: On the Effectiveness of Provider Based Email Security,
Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko,
Proceedings of the ACM Conference on Computer and Communications Security, Denver, Colorado, October 2015.
Presnetation Slides
From .academy to .zone: An Analysis of the New TLD Land Rush,
Tristan Halvorson, Matthew F. Der, Ian Foster, Stefan Savage, Lawrence K. Saul, and Geoffrey M. Voelker,
Proceedings of the ACM Internet Measurement Conference, Tokyo, Japan, October 2015.
Who is .com? Learning to Parse WHOIS Records,
Suqi Liu, Ian Foster, Stefan Savage, Geoffrey M. Voelker, and Lawrence K. Saul,
ACM Internet Measurement Conference, Tokyo, Japan, October 2015.
Fast and Vulnerable: A Story of Telematic Failures,
Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage,
Proceedings of Workshop On Offensive Technologies (WOOT), Washington, D.C, August 2015.
Presnetation Slides
DNS Baseline Dynamics,
Gautam Akiwate, Mattijs Jonker, Ian Foster, Stefan Savage, and Geoffrey M. Voelker,
ACM Internet Measurement Conference, Amsterdam, Netherlands, October 2019
CVE-2017-0554
Android Elevation of Privilege Vulnerability in Telephony Component
CVE-2015-2906,
CVE-2015-2907,
CVE-2015-2908
Mobile Devices C4 ODB2 CAN bus dongle contains multiple vulnerabilities
My current research projects include: secure email, monitoring DNS, WHOIS analysis, car telematics, and more.
CSE 127 Computer Security, Fall 2014
In my iota of free time I enjoy hiking, Geocaching, reading, and enjoying good movies.