University of Texas Austin - Government
Research Scientist
Computer Software
Kenneth
Miller
Lafayette, Indiana
Seeking to advance innovative and novel solutions that offer opportunities to proactively defend in the software security world, rather than the passive/reactive approach. My dream is to take innovative, cutting edge ideas or research and turn them into high quality, disruptive reality. I sincerely want my code to change the world, and I'm willing to work extremely hard to make that a reality.
So far, I've already taught myself functional programming and systems languages, as well as exploit construction, Coq and LLVM. My interests lie in security, generally "systems development", with a focus on the trio of systems engineering, formal methods and compilers. Language construction is also highly fascinating, since it relates intrinsically to type theory and formal methods.
At some point in my life I want to find the time to write, both on a website as an interactive scrollytelling novel and for different publications. I want to develop a quantum algorithm for the development of other quantum algorithms.
Intern
Worked to optimize the process for incorporating new interns into the source code management system, Selena. Internship cut short due to wide layoffs initiated by the economic depression.
Research Assistant
Kenneth worked at Purdue University as a Research Assistant
Scientist
Kenneth worked at Space and Naval Warfare Systems Center (Atlantic) as a Scientist
Scientist (Student trainee)
Although some of my work is protected by classification and need to know, I will say that in summer 2012, I created a system to manage the tracking of hardware at SPAWAR. This was needed for internal infrastructure purposes.
In Summer 2013 I got to work on some research ideas of my own, including a combined instrumentation tool and execution visualizer. I plan to use this for my Master's thesis, and in the process, I've tried to spawn some Creative Research and Development Agreements between SPAWAR and UT Dallas.
S.D.E. Intern
I worked on the Access Management Systems team to help automate Amazon's internal management of their AWS accounts, in order that AWS service developers could quickly have them processed as internal, enabling them to continue with their work much less impeded. My code was pushed to production in Amazon. This was good not only because it saved people time, but because it also helped minimize the human element involved in the process of managing AWS accounts. During the process of my internship, I identified core security vulnerabilities in another team's access management process for their services and notified superiors.
N/A
N/A
Went here in order to earn credit hours to transfer to UT Dallas.
Bachelor of Science (BS)
Software Engineering
This is the college I got my BS in S.E. from. I graduated Magna Cum Laude
N/A
N/A
Went here in order to earn transfer hours to bring to UT Dallas.
ACM
With the wide existence of binary code, it is desirable to reuse it in many security applications, such as malware analysis and software patching. While prior approaches have shown that binary code can be extracted and reused, they are often based on static analysis and face challenges when coping with obfuscated binaries. This paper introduces trace-oriented programming (TOP), a general framework for generating new software from existing binary code by elevating the low-level binary code to C code with templates and inlined assembly. Different from existing work, TOP gains benefits from dynamic analysis such as resilience against obfuscation and avoidance of points-to analysis. Thus, TOP can be used for malware analysis, especially for malware function analysis and identification. We have implemented a proof-of-concept of TOP and our evaluation results with a range of benign and malicious software indicate that TOP is able to reconstruct source code from binary execution traces in malware analysis and identification, and binary function transplanting.
The following profiles may or may not be the same professor: