Nothing Special   »   [go: up one dir, main page]

Dantoine Resume 2018

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Sophia d’Antoine

Email:smdantoine@gmail.com Website:sophia.re

Work Experience
Current New York University, Hacker in Residence
Spring 2018 Help lead and mentor university’s hacking club. Aid students in developing research projects in emerging fields.

Current Trail of Bits, Principal Security Engineer, New York City


Spring 2015 Lead projects and developed symbolic and dynamic execution tooling for large commercial clients. Machine learning and graph
theory research focused on automatic detection of vulnerabilities as well as recovery of sign, type, and other information. Contract
and proposal writing. Vulnerability research, reverse engineering, and exploit development.

Winter 2014 Trail of Bits, Security Researcher, New York City


Developed dynamic, runtime obfuscation toolkit targeting iOS applications security by mitigating software reverse engineering and
exploitation. The work builds off of the effective obfuscation techniques used by nation-state malware and found in academic
literature. Worked almost exclusively using LLVM IR.

Summer 2014 Tumblr Inc, Security Engineer, New York City


Conducted audit of the OAuth 1.0a authentication protocol for all Tumblr applications and the API. Red-teamed Tumblr site and
patched security vulnerabilities in production code. Worked on detection of session hijacking, secret sharing, and token exchanges.

Summer 2013 National Security Agency, Cryptologic Access Program Intern, Maryland
Wrote software enabling NSA’s mission-critical technical and operational SIGINT processing. Developed essential data analytics and
analysis skills in high pressure environment. Enabled data flow services for analysis of bit streams with Java RMI and WebStart.

Summer 2012 Cisco Systems, Mobile Web Security Intern, RTP


Built mobile web system integrating Google Maps and Microsoft Outlook. Mapped Cisco campus locations and facilitate meeting
booking on mobile and desktop devices.

Education
May 2015 Masters of Science in Computer Science, Rensselaer Polytechnic Institute
Concentration: Computer Security & Side Channels
May 2015 Bachelor of Science in Computer Science, Rensselaer Polytechnic Institute
Dual Major in Computer Engineering, GPA: 3.7/4.0 (Dean’s List)

Policy Work
Presidential, Cyber Transition Team
Spring 2017 One of the technical consultants for the Cyber Transition Team for the White House. Took part in forming documents of policy and
strategy for the incoming administration.

Ongoing DARPA, Technical Policy Consultant


Fall 2016 Member of team organized by the Director of DARPA. Create ongoing policy papers to help form National Policy. Documents written
for the National Security Council and Pentagon Leadership.

Ongoing Treasury Department, Technical Policy Consultant


Spring 2018 Attend meetings as the technical expert on Blockchain technologies and security of relevant systems.
Academic Publications and Courses
Winter 2017 (Academic Publication) Out-of-Order Execution as a Side-Channel and other Applications
Researching security implications of CPU optimization.

Spring 2015 (Created and Taught) Modern Binary Exploitation


Constructed and taught a course which teaches classical exploitation used to bypass modern security features.

Spring 2014 (Created and Taught) Hardware Reverse Engineering


Worked on basic die decapping and firmware dumping for purposes of reversing and exploitation.

Spring 2015 (Academic Publication) VM Covert Channels


Researching low level covert channels found in virtual machine and cloud computing infrastructures.

Spring 2013 (Created and Taught) Malware Analysis


Used industry tools and techniques to explore static and dynamic analysis of malicious processes.

Conference Talks
Hardware Side Channels: Exploiting Out-of-Order-Execution
RECon Montreal (Summer 2015). Blackhat (Summer 2015). Sec-t Stockholm (Fall 2015). Empire Hacking (Winter 2015).

Binary Constraint Solving: Program Analysis for Automatic Exploit Generation


Hack.lu Luxembourg: Part 1 (Winter 2015). CanSecWest: Part 2 (Spring 2016). NorthSec Montreal: Summary (Summer 2016).

Keynote: The Bad Neighbor: Hardware Side Channels in Virtualized Environments


Hack in the Box Amsterdam (Summer 2016).

Be a Binary Rockstar: Program analysis for hackers with Binary Ninja


Inbot: Interesting and Novel Binary Occultism Tradeshow (Summer 2016). CodeBlue Tokyo (Fall 2016). Empire Hacking (Winter 2016).

Next-level static analyses for vulnerability research


INFILTRATE: A conference that focuses entirely on offensive security issues. (Spring 2017).

The Spirit of the 90s is Alive in Brooklyn: Binary analysis built on intermediate language.
SummerCon. (Summer 2017).

Joy of Pwning
Secure Your Path. Barclays (Fall 2017).

Exploiting the Blockchain: Vulnerability exploitation in Solidity


Empire Hacking (Winter 2018).

The Bad Neighbor: Hacking CPU optimizations


Capital Hack (Winter 2018). DeepSec Vienna (Winter 2018)

Relevant Skills
Security Reverse Engineering, Exploitation, Vulnerability Discovery, Security Systems Architecture
Programming LLVM, Clang, ASM, Python, C++, C, PHP, x86, Java, HTML/CSS, JavaScript (JQuery), Bash
Systems Linux, Windows, Mac, iOS
Software IDA Pro, OllyDbg, WireShark, GDB, Burp Suite, CDB, Emacs, Vi, LATEX
Languages English and French (Fluent), German (Conversational)
Sport CTF

You might also like