Mohammad Rezaeirad (Rad)
Primarily, I work on a cyber intelligence joint project between GMU, NYU, UCSD and UC Berkley.
My tasks and contributions to this project are: 1) RAT protocol reverse engineering, 2) Developing RAT protocol emulator (sinkhole), 3) Developing network decoder and network signature, 4) Developing behavioral signature, 5) Developing unpacker and RAT configuration extractor, 6) Honeypot development.
My secondary project is a study on binary packing and obfuscation techniques.
My tasks and contributions to this project are: 1) Hardware reverse engineering, 2) Firmware extraction and analysis, 3) Vulnerability analysis, 4) Exploit development, 5) Protocol emulation.
I am interested and working in the fields of Cyber-Physical Security. More specifically, my focuses are:
á Reverse Engineering (both Hardware and Software)
á Vulnerability Analysis and Ethical Hacking
The topics that I have worked on and, influenced my research interests are: Modern Cryptography, Network Security (especially in wireless networks), Security Mechanisms in Cloud Computing, and Digital Right Management.
Things That I Do
á Disassembly (x86, MIPS)
á Static and Dynamic Analysis
á Source Code Analysis
á Protocol Reverse Engineering and Emulator Development
á Sensor Development
á Data Collection and Mining
á Measurement and Attribution
á Decoy and Honeypot Development
Hardware Hacking and Reverse Engineering:
á Protocol Analysis
á Firmware extraction
A Security Analysis of an In-Vehicle Infotainment and App Platform
S Mazloom, M Rezaeirad, A Hunter, D McCoy
10th USENIX Workshop on Offensive Technologies (WOOT 16), Austin, TX., August 2016
M Rezaeirad, M Orooji, S Mazloom, D Perkins, M Bayoumi
Consumer Communications and Networking Conference (CCNC), 2013 IEEE, 308-316
A Master thesis, Nov 2012
University of Louisiana at Lafayette