Dessalegn A.

Dessalegn A.

Software Engineer

Hillsboro , United States

Experience: 10 Years

Dessalegn

Hillsboro , United States

Software Engineer

96000 USD / Year

  • Immediate: Available

10 Years

Now you can Instantly Chat with Dessalegn!

About Me

  • Currently I am embedded Security Engineer at Intel. I am a member of connected home devices project, media software stack developed in C/C++ using yocto build system, focusing on security issues.
  • I worked as developer in HPE for H...
  • I worked as developer in HPE for Healthcare management system, using C on Unix system. This project evolves developing new modules requested by the customer as well as changing an existing module using the standard software development life cycle.
  • I have experience in working in government sponsored information security research projects that involve developing software using VC++, JAVA, SQL, Matlab and Python. As part of part of the project deliverable of these projects I have published several papers in different scientific journal and international conferences. The abstract of some of my papers are attached to this resume.
  • I have developed multimedia forensic analysis tool that recovers fragmented image files from a partially damaged digital media using Matlab, python and VC++.
  • Used SSH protocol for secure remote access to configure servers like Network Attached Storage.
  • As part of my master thesis I have optimized the speed of Advanced Encryption Standard (AES) for high speed embedded application, specifically on ARM processor.
  • I have collaborated with Neuroscience research group to develop a novel Authentication technique using Brainwave. Our research has been published in one of the top Journals in Computer Science. The project is implemented using Python and matlab.
  • Software and hardware trouble shooting of different communication technologies, Laptops, Desktops, Routers (Netgear, Asus, TP-Link and Cisco)
  • I have worked in Quality Assurance process of refurbishing electronic equipment like Phones, Routers, Switches and Computers. In this job I get a chance to design a new testing process for a device that never been tested before. Such task involves researching all available user guides and maintenance manuals by the manufacturer and meeting different compliance standards.
  • I have done configuration and troubleshooting of Network Storage devices like WD Mycloud, Synology, Buffalo NAS devices. I have managed NAS devices in different RAID modes based on the requirement.
  • I used widows based development environment in most of my development based projects. I have used Linux based systems for Forensic Analysis, Management of NAS servers, and in security penetration testing.
  • I have traveled internationally to several countries present my research findings in International Conferences and Workshops. I have a practically proven communication skills.
  • I have worked in as a security engineer for over 6 years, I have implemented different cryptographic algorithms and protocols like DES, AES, Serpent, PGP, IPSec, SSL/TLS using C/C++ on Linux environment.

Show More

Skills

Search Engine Optimization ( SEO )

Portfolio Projects

A high-security EEG-based login system with RSVP stimuli and dry electrodes

http://ieeexplore.ieee.org/document/7486116

Company

A high-security EEG-based login system with RSVP stimuli and dry electrodes

Description

Lately, EEG-based authentication has received considerable attention from the scientific community. However, the limited usability of wet EEG electrodes as well as low accuracy for large numbers of users have so far prevented this new technology to become commonplace. In this study a novel EEG based authentication system is presented, which is based on the RSVP paradigm and uses a knowledge-based approach for authentication. 29 subjects’ data were recorded and analyzed with wet EEG electrodes as well as dry ones. A true acceptance rate of 100?n be reached for all subjects with an average required login time of 13.5 s for wet and 27.0 s for dry electrodes. Average false acceptance rates for the dry electrode setup were estimated to be 3.33_10-5.

Show More Show Less

Tools

java

Metadata Protection Scheme for JPEG Privacy & Security using Hierarchical and Groupbased Models

http://ieeexplore.ieee.org/document/7426905

Company

Metadata Protection Scheme for JPEG Privacy & Security using Hierarchical and Groupbased Models

Description

Privacy and intellectual rights management is becoming an important topic. The existing social network services (SNS) have many limitations in meeting consumers' expectations of their privacy and intellectual rights management. Metadata management in SNS is heterogeneous and susceptible to personal identification and copyright information misuses. There are cases where consumers are not informed in how their metadata is shared and used, while the copyrights of images are removed without the owner's consent. In this paper, we propose two metadata protection models called hierarchical and group-based model. The models are analyzed and evaluated with respect to the interest of user and services.

Show More Show Less

Early width estimation of fragmented JPEG with corrupted header

Company

Early width estimation of fragmented JPEG with corrupted header

Description

In transformed and compressed domain fragmented files are very difficult to recover using conventional file recovery software. JPEG images are forensically important file format due to its popularity in a wide area of applications. In JPEG compression the header keeps important parameters that are required to decode the image back to pixel domain. In this paper the detection of width and height of an image from the JPEG stream is improved with less assumptions than previous papers. In the old approaches it was assumed that information about the image like Huffman table, Reset (RST) value and Quantization table were readily available for the techniques to work. However, in this paper the width is extracted from the quantized AC values that reduce the assumptions to just Huffman table.

Show More Show Less

Tools

java

JPEG copy paste forgery detection using BAG optimized for complex images

Company

JPEG copy paste forgery detection using BAG optimized for complex images

Description

Image forgery detection is one of important activities of digital forensics. Forging an image has become very easy and visually confusing with the real one. Different features of an image can be used in passive forgery detection. Most of lossy compression methods demonstrate some distinct characteristics. JPEG images have a traceable zero valued DCT coefficients in the high frequency regions due to quantization. This appears as a square grid all over the image, known as Block Artifact Grid (BAG). In this paper the BAG based copy-paste forgery detection method is improved by changing the input DCT coefficients for Local Effect computation. The proposed method has shown a better performance especially for complex images

Show More Show Less

Tools

java
Share:

Verifications

  • Profile Verified

  • Phone Verified

Preferred Language

  • English - Fluent

Available Timezones

  • Pacific Daylight [UTC -7]

  • Greenwich Mean [UTC ±0]