Student Research Assistant (VI), University of Colorado.
February 2015 - Present
I work as a computer programmer under Prof. Elizabeth Bradley on CSciBox, a software that uses AI techniques for paleoclimate age-model construction. I have worked with parallelizing code in Python and storing data with JSON and Bagit. I also built releases of the software and communicated with geoscientists to determine goals for future development. In December 2016 I went to AGU to present on the work I had done with LiPD. | Link to CSciBox Website | Link to CSciBox Github Repository
Extracurricular Activities and Projects
I had a pull request accepted to the Google project Grumpy which transcompiles Python code into Go code. I rewrote the Python Math library to work with Grumpy, expanding the set of programs that could be successfully compiled to Go. This involved writing Python code that conformed to the standard CPython implementation, and making the public functions call Go code to perform the underlying mathematics. | Link to Grumpy | Link to Pull Request
Cisco Network Engineering Hackathon
Won First Place. My teammates and I built a location based Two Factor Authentication that would check whether a person accessing an account was in an authorized location to do so by pulling data on connected devices to routers using Meraki, and then processed the data and tracked it using Python and served a website using this authentication using Flask. | Link to GitHub Repository
Won Third Place - Twitter Prize. My teammates and I built a techincal demo for an app that would use Bluetooth LE to form a decentralized and distributed social network, similar to Twitter. In the Arab Spring, Twitter was used as a tool by revolutionaries to spread their message under the censoring hand of their government. By building our app as a decentralized network, we bypass any attempts of censorship by blocking access to a server or ip address. | Link to GitHub Repository
Applied Trust Security Hackathon
Won Second Place. We built a website that matched users into games and play against each other and chat with each other. In the second phase, we defended our website against denial of service attacks, overflow attacks, and other attempts to take our server down. | Link to GitHub Repository
Co-President of the CU Ethical Hacking Club
Summer 2016 - Present
I have been a member of the Ethical Hacking Club at CU since fall 2014. I became Co-President at the end of spring semester 2016. The club holds several meetings during the semester where we discuss issues such as encryption, web and application security, and testing systems by attempting to hack them, with a focus on how to do so in a way that is ethical.
I implemented a Diffie Hellman style key exchange program using Elliptic Curve Cryptography on finite fields of integers modulus prime numbers. The program is written in Haskell and creates types for elements of the finite field, and implements addition, subtraction, multiplication, and division for these elements, as well as implements addition and multiplication for points on the elliptic curve. The program also includes a short text based interface for creating a shared secret using Diffie Hellaman key exchange. | Link to GitHub Repository