-
π¨ I am building here : https://gitlab.com/elixir-networks
-
π Currently I am working as an independent security researcher (vulnerability research and bug bounty hunter) for my livelihood and to support my startup(s) [stealth mode].
-
π Academically I am inclined towards language-based security and designing language technologies that can be used for safety & security analysis, which also might deal with things like memory safety.
-
β¨ I am an early adapter of Rust (2015). Besides I am using Python and Clojure for my mundane tasks. Did I mention Weird Machines??
-
π I pretty much obsessed with Startups. Having said all of that, I am a huge fan of electronic music and might also become an electronic musician one day or a race car driver
-
π± Thank you for your kind visit! :D Have a nice day!
π€
Focusing
Information Security || Fraud Prevention || Vulnerability research || Program Analysis || Defense Tech
saifnoorprottoy@infosec.exchange
- Milky Way
- @saifnoorprottoy
Pinned Loading
-
Usage of Formal Verification in Indu...
Usage of Formal Verification in Industry/ Industrial Producs 1This is an list of advanced PL research / FV research or the use of FV research or implementation of FV in the industry. This will be upgrated timely.
23-----------------------------------------------------------------------------------------------------------------
45Starter: Who is verifying their cryptographic protocols? https://galois.com/blog/2021/05/who-is-verifying-their-cryptographic-protocols/
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.