-
π I am an independent security researcher currently trying to navigate the security startup realm by building tools and solutions engaging various methodologies. Besides I am also working as a vulnerability researcher and bounty hunter for my livelihood and to support my startups at the same time focusing on the Web and the hypervisors & Containers, mostly .
-
π Academically I am inclined towards language based security and designing programming language technologies that can be used for security analysis and deals with things like memory safety.
-
β¨ I am an early adapter of Rust (2015). Besides I am using Python and Clojure for my mundane tasks. Did I mention Weird Machines??
-
π I pretty much obsessed with Startups. Having said all of that, I am a huge fan of electronic music and might also become an electronic musician one day.
-
π± Thank you for your kind visit! :D Have a nice day!
π€
Focusing
program analysis || large-scale system analysis
saifnoorprottoy@infosec.exchange
- Milky Way
- @saifnoorprottoy
Pinned Loading
-
Usage of Formal Verification in Indu...
Usage of Formal Verification in Industry/ Industrial Producs 1This is an list of advanced PL research / FV research or the use of FV research or implementation of FV in the industry. This will be upgrated timely.
23-----------------------------------------------------------------------------------------------------------------
45Starter: Who is verifying their cryptographic protocols? https://galois.com/blog/2021/05/who-is-verifying-their-cryptographic-protocols/
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.