Jayakrishna Menon Vadayath
I am a PhD student at School of Computing and Augmented Intelligence lab at Arizona State University.
I currently work at SEFCOM with some really amazing people and my primary advisor is Dr. Yan Shoshitaishvili. I also actively work with Dr. Ruoyu (Fish) Wang, Dr. Tiffany Bao and Dr. Adam Doupé.
My research focuses on automated vulnerability analysis on application software. My areas of interest are static analysis, symbolic execution and fuzzing.
Prior to starting my PhD in Fall 2019, I had interned at the Information Sciences Institute at University of Southern California under the supervision of Dr. Christophe Hauser and at SEFCOM where I currently work as a Research Assistant.
I have also interned at ForAllSecure Inc during the Summer 2022 where I worked with Thanassis Avgerinos and many other amazing people.
I started playing CTF’s as a part of Team bi0s in 2014 and I currently play with Shellphish where I have been the co-captain since 2023. I primarily focus on Pwning/Exploitation challenges, but I occasionally try out some Reverse Engineering challenges as well.
latest posts
Sep 14, 2024 | M0lecon CTF Teaser 2024 ducts Writeup |
---|---|
May 17, 2023 | M0lecon CTF 2023 NoRegVM Writeup |
Jan 05, 2023 | OCTF 2022 EZVM Writeup |
selected publications
- Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space EmulationIn 32nd USENIX Security Symposium (USENIX Security 23), Aug 2023
- Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware ServicesIn 33rd USENIX Security Symposium (USENIX Security 24), Aug 2024