Systems-focused engineering student interested in the intersection of computer architecture, operating systems, and security.
Currently exploring:
- eBPF and kernel observability
- Hardware security and side-channel analysis
- Secure implementation of cryptographic algorithms
- RISC-V vector programming
Verilog, Icarus Verilog, GTKWave Designed and implemented a MIPS-like CPU from scratch.
- Built ALU, control unit, datapath, register file, and memory modules
- Supports R-type (ADD, SUB, AND, OR, SLT), LW, SW, BEQ
- Verified correctness through simulation and waveform analysis
C, POSIX Minimal shell to understand process lifecycle and system interfaces.
- Process control using
fork,exec,wait - Signal handling and interactive execution
- Command parsing and memory management
C, libbpf Kernel-level observability using eBPF.
- Attached kprobes to trace runtime system behavior
- Worked within verifier constraints and safety guarantees
- Efficient kernel → user-space data transfer
C, eBPF, Go High-performance packet filtering at the NIC layer.
- Dropped malicious packets at driver level using XDP
- Implemented rate limiting via BPF maps
- Built user-space monitoring layer in Go
Python Hybrid encryption tool for securing files at rest.
- RSA-2048 + AES-256-GCM with per-file session keys
- Key derivation via PBKDF2
- Custom binary format packing encrypted key, nonce, and ciphertext
C, RVV Intrinsics Fixed-point SIMD computation on RISC-V.
- Implemented Q15 AXPY using vector intrinsics
- Explored lane-level parallelism and vector length scaling
- Analyzed overflow behavior and precision tradeoffs
| Area | Details |
|---|---|
| Languages | C · C++ · Python · Go |
| Hardware | Verilog · Digital Logic · Single-Cycle CPU · RISC-V (RVV) |
| Systems | Linux · POSIX · Processes · Memory Management · File Systems |
| Low-Level | eBPF · XDP · Fixed-Point Arithmetic · System Calls |
| Cryptography | AES-256-GCM · RSA-2048 · PBKDF2 · Hybrid Encryption |
| Tools | Git · GCC · GDB · Make · Bash · Icarus Verilog · GTKWave |
- Hardware security and microarchitectural attack surfaces
- Cryptographic implementations (constant-time, side-channel resistance)
- Kernel-level security and observability
- Performance at the hardware/software boundary
