Now you can Instantly Chat with Dessalegn!
About Me
Currently I am embedded Security Engineer at Intel. I am a member of connected home devices project, media software stack developed in C/C++ using yocto build system, focusing on security issues. I worked as developer in HPE for Healthcare management...to build system, focusing on security issues. I worked as developer in HPE for Healthcare management system, using C on Unix system. This project evolves developing new modules requested by the customer as well as changing an existing module using the standard software development life cycle. I have experience in working in government sponsored information security research projects that involve developing software using VC++, JAVA, SQL, Matlab and Python. As part of part of the project deliverable of these projects I have published several papers in different scientific journal and international conferences. The abstract of some of my papers are attached to this resume. I have developed multimedia forensic analysis tool that recovers fragmented image files from a partially damaged digital media using Matlab, python and VC++. Used SSH protocol for secure remote access to configure servers like Network Attached Storage. As part of my master thesis I have optimized the speed of Advanced Encryption Standard (AES) for high speed embedded application, specifically on ARM processor. I have collaborated with Neuroscience research group to develop a novel Authentication technique using Brainwave. Our research has been published in one of the top Journals in Computer Science. The project is implemented using Python and matlab. Software and hardware trouble shooting of different communication technologies, Laptops, Desktops, Routers (Netgear, Asus, TP-Link and Cisco) I have worked in Quality Assurance process of refurbishing electronic equipment like Phones, Routers, Switches and Computers. In this job I get a chance to design a new testing process for a device that never been tested before. Such task involves researching all available user guides and maintenance manuals by the manufacturer and meeting different compliance standards. I have done configuration and troubleshooting of Network Storage devices like WD Mycloud, Synology, Buffalo NAS devices. I have managed NAS devices in different RAID modes based on the requirement. I used widows based development environment in most of my development based projects. I have used Linux based systems for Forensic Analysis, Management of NAS servers, and in security penetration testing. I have traveled internationally to several countries present my research findings in International Conferences and Workshops. I have a practically proven communication skills. I have worked in as a security engineer for over 6 years, I have implemented different cryptographic algorithms and protocols like DES, AES, Serpent, PGP, IPSec, SSL/TLS using C/C++ on Linux environment.
Show MoreSkills
-
- 7 Years
Advanced
-
-
-
-
- 7 Years
Advanced
-
-
-
- 5 Years
Advanced
-
-
- 8 Years
Advanced
-
- 10 Years
Advanced
-
-
-
-
- 6 Years
Advanced
-
-
-
-
-
- 7 Years
Advanced
-
-
-
-
- 10 Years
Advanced
-
- 5 Years
Advanced
-
-
- 3 Years
Advanced
-
- 6 Years
Advanced
-
- 5 Years
Advanced
-
-
-
-
-
- 8 Years
Advanced
-
- 5 Years
Advanced
-
-
-
-
- 3 Years
Advanced
-
-
-
- 4 Years
Advanced
-
-
- 5 Years
Advanced
-
-
- 4 Years
Advanced
-
- 5 Years
Advanced
-
-
-
- 10 Years
Advanced
-
-
- 6 Years
Advanced
-
- 6 Years
Advanced
-
- 5 Years
Advanced
-
-
-
- 8 Years
Advanced
-
- 4 Years
Advanced
-
- 5 Years
Advanced
-
- 6 Years
Advanced
-
- 5 Years
Advanced
-
- 6 Years
Advanced
-
- 7 Years
Advanced
-
- 8 Years
Advanced
-
-
- 2 Years
Intermediate
-
- 4 Years
Advanced
-
- 5 Years
Advanced
-
-
-
- 3 Years
Advanced
-
- 6 Years
Advanced
-
- 7 Years
Advanced
-
- 10 Years
Advanced
-
- 8 Years
Advanced
-
- 4 Years
Advanced
-
- 3 Years
Advanced
-
- 4 Years
Advanced
-
- 5 Years
Advanced
-
- 4 Years
Advanced
-
-
- 5 Years
Advanced
-
-
- 6 Years
Advanced
-
- 5 Years
Advanced
-
- 3 Years
Advanced
-
- 4 Years
Advanced
-
- 8 Years
Advanced
-
- 6 Years
Advanced
-
-
-
- 8 Years
Advanced
-
-
- 8 Years
Advanced
-
- 6 Years
Advanced
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 7 Years
Advanced
-
Portfolio Projects
Description
Lately, EEG-based authentication has received considerable attention from the scientific community. However, the limited usability of wet EEG electrodes as well as low accuracy for large numbers of users have so far prevented this new technology to become commonplace. In this study a novel EEG based authentication system is presented, which is based on the RSVP paradigm and uses a knowledge-based approach for authentication. 29 subjects’ data were recorded and analyzed with wet EEG electrodes as well as dry ones. A true acceptance rate of 100?n be reached for all subjects with an average required login time of 13.5 s for wet and 27.0 s for dry electrodes. Average false acceptance rates for the dry electrode setup were estimated to be 3.33_10-5.
Show More Show LessDescription
Privacy and intellectual rights management is becoming an important topic. The existing social network services (SNS) have many limitations in meeting consumers' expectations of their privacy and intellectual rights management. Metadata management in SNS is heterogeneous and susceptible to personal identification and copyright information misuses. There are cases where consumers are not informed in how their metadata is shared and used, while the copyrights of images are removed without the owner's consent. In this paper, we propose two metadata protection models called hierarchical and group-based model. The models are analyzed and evaluated with respect to the interest of user and services.
Show More Show LessDescription
In transformed and compressed domain fragmented files are very difficult to recover using conventional file recovery software. JPEG images are forensically important file format due to its popularity in a wide area of applications. In JPEG compression the header keeps important parameters that are required to decode the image back to pixel domain. In this paper the detection of width and height of an image from the JPEG stream is improved with less assumptions than previous papers. In the old approaches it was assumed that information about the image like Huffman table, Reset (RST) value and Quantization table were readily available for the techniques to work. However, in this paper the width is extracted from the quantized AC values that reduce the assumptions to just Huffman table.
Show More Show LessDescription
Image forgery detection is one of important activities of digital forensics. Forging an image has become very easy and visually confusing with the real one. Different features of an image can be used in passive forgery detection. Most of lossy compression methods demonstrate some distinct characteristics. JPEG images have a traceable zero valued DCT coefficients in the high frequency regions due to quantization. This appears as a square grid all over the image, known as Block Artifact Grid (BAG). In this paper the BAG based copy-paste forgery detection method is improved by changing the input DCT coefficients for Local Effect computation. The proposed method has shown a better performance especially for complex images
Show More Show LessDescription
This paper presents a novel weighted sparse representation classification for face recognition with a learned distance metric (WSRC-LDM) which learns a Mahalanobis distance to calculate the weight and code the testing face. The Mahalanobis distance is learned by using the information-theoretic metric learning (ITML) which helps to define a better weight used in WSRC. In the meantime, the learned distance metric takes advantage of the classification rule of SRC which helps the proposed method classify more accurately. Extensive experiments verify the effectiveness of the proposed method.
Show More Show LessDescription
Rijndael is adopted as Advanced Encryption Standard (AES) by the Americans National Institute of Standards and Technology since 2001. AES algorithm has a wide area of application for its good security, simple design and ease of implementation on hardware and software. A Monte Carlo Test (MCT) vector is released with AES algorithm submission to check correctness of implementations. Besides to its defined purpose, MCT is used to measure speed of execution. Very important information flows through conventional communication systems like telephone, fax and radio. In such systems, cryptographic solutions can be implemented using embedded systems. ARM is the most common embedded system processor. The challenge is to run cryptography algorithms that are computationally intensive in nature on an embedded platform with an inherent resource limitation. In this thesis, AES implementation is optimized for speed of execution on an ARM powered embedded platform. It starts by comparison of available approaches to implement for a better speed performance. Then, Key features of the ARM processor are studied and exploited on the implementation to enhance speed of execution of the algorithm.The encryption has shown a remarkable improvement than the decryption. This is because of the design complexity on AES decryption algorithm. For the communication flow control problem that might be caused by the speed imbalance of encryption and decryption, a counter mode of operation is recommended.
Show More Show Less