-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathdefault.html
More file actions
87 lines (84 loc) · 4.36 KB
/
default.html
File metadata and controls
87 lines (84 loc) · 4.36 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Tony Espinoza's UNM page</title>
<link href="styles.css" type="text/css" rel="stylesheet"></link>
</head>
<body>
<div class="header">
<h1>Antonio Espinoza</h1>
Ph.D. Computer Science, Univ. of New Mexico, May 2019.<br>
<i>Thesis title: The nature of ephemeral secrets in reverse engineering tasks</i><br>
M.S. Computer Science, Univ. of New Mexico, 2015.<br>
B.S. Computer Science, Univ. of New Mexico, 2011.<br><br>
My pgp: <a href="TonyPublicKey.asc">key</a>
Contact: amajest<at>cs<dot>unm<dot>edu
<p>
Advisor:
<a href="https://www.cs.unm.edu/~crandall" >Jedidiah R. Crandall</a>
</p>
</div>
<h2>Research:</h2>
My research interests are eclectic, including: Dynamic Information Flow Tracking,
Reverse Engineering, Network Measurement, and Internet Censorship.
I am currently doing a post-doc at UT Austin working with Dr. Tiwari.
<h3>RE</h3>
I developed the following <a href ="smali_tool" >tool</a> to aid in
learning the function call structure within a program. I had an OTF
fellowship through the ICFP program for a year, where I reversed
engineered LINE to evaluate its cryptography implementation. The
results of which are to be published in the 2017 FOCI workshop, and
inspired a <a href ="https://netalert.me/encrypted-messaging.html">
NetAlert</a> cartoon.
<h2>Publications:</h2>
<ul>
<li> Antonio M. Espinoza and Jedidiah R. Crandall. <strong>Work-in-Progress: Automated Named Entity Extraction for Tracking
Censorship of Current Events.</strong> In the Proceedings of the USENIX Workshop on Free and Open
Communications on the Internet. <b>(FOCI 2011)</b>. San Francisco,
California. August 2011. <a href="foci11.pdf">pdf</a><p>
<li>Antonio Espinoza, Jeffrey Knockel, Jedidiah R. Crandall, and Pedro Comesaña.
<strong>
V-DIFT: Vector-Based Dynamic Information Flow Tracking with
Application to Locating Cryptographic Keys for Reverse Engineering.
</strong>
In the Proceedings of the International Conference on Availability, Reliability and Security <b>(ARES 2016)</b>. Salzburg, Austria. August/September 2016. <a href="VDIFT.pdf">pdf</a> <p>
<li> Antonio M. Espinoza, William J. Tolley, Jedidiah R. Crandall, Masashi Crete-Nishihata, and Andrew Hilts.
<strong>
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application.
</strong>
In the Proceedings of the 7th USENIX Workshop on
Free and Open Communications on the Internet. <b>(FOCI 2017)</b>. Vancouver, Canada. August 2017. <a href="https://www.usenix.org/system/files/conference/foci17/foci17-paper-espinoza.pdf">pdf</a> <p>
<li> Geoffrey Alexander, Antonio Espinoza, and Jedidiah R. Crandall.
<strong>Detecting TCP/IP Connections via IPID Hash Collisions.</strong> In the Proceedings of the 2019 Privacy Enhancing Technologies Symposium <b>(PETS 2019)</b>. Stockholm, Sweden. July 2019.
</ul>
<h2>Teaching:</h2>
<ul>
<li>
<a href="https://prateeksahu.github.io/ent_sec/index.html">EE 382V UT Austin</a> (Fall 2019)
</li>
<li>
<a href="cs261summer2017">CS261</a> (Summer 2017)
</li>
<li>
<a href="444544spring2013">CS444/544</a> (Sping 2013)
</li>
</ul>
<h2>Outreach:</h2>
<ul>
<li>
2014 New Mexico Supercomputing kickoff (Teaching Scratch to middle and high schoolers)
</li>
<li>
Bosque School Winterim (Spring 2014, teaching middle schoolers Scratch)
</li>
</ul>
<h2>Talk:</h2>
<ul>
<li>Internet Freedom Festival 2016
<a href="https://internetfreedomfestival.org/wiki/index.php/What_your_apps_say_about_you_%28and_how_to_find_out%29">session</a>. (IFF 2016)
<a href="iffpage.html">backup</a>
</li>
</ul>
</body>
</html>