Kenneth Miller

 Kenneth Miller

Kenneth M. Miller

  • Courses1
  • Reviews2

Biography

University of Texas Austin - Government

Research Scientist
Computer Software
Kenneth
Miller
Lafayette, Indiana
Seeking to advance innovative and novel solutions that offer opportunities to proactively defend in the software security world, rather than the passive/reactive approach. My dream is to take innovative, cutting edge ideas or research and turn them into high quality, disruptive reality. I sincerely want my code to change the world, and I'm willing to work extremely hard to make that a reality.

So far, I've already taught myself functional programming and systems languages, as well as exploit construction, Coq and LLVM. My interests lie in security, generally "systems development", with a focus on the trio of systems engineering, formal methods and compilers. Language construction is also highly fascinating, since it relates intrinsically to type theory and formal methods.

At some point in my life I want to find the time to write, both on a website as an interactive scrollytelling novel and for different publications. I want to develop a quantum algorithm for the development of other quantum algorithms.


Experience

  • McLane Company, Inc.

    Intern

    Worked to optimize the process for incorporating new interns into the source code management system, Selena. Internship cut short due to wide layoffs initiated by the economic depression.

  • Purdue University

    Research Assistant

    Kenneth worked at Purdue University as a Research Assistant

  • Space and Naval Warfare Systems Center (Atlantic)

    Scientist

    Kenneth worked at Space and Naval Warfare Systems Center (Atlantic) as a Scientist

  • Space and Naval Warfare Systems Center (Atlantic)

    Scientist (Student trainee)

    Although some of my work is protected by classification and need to know, I will say that in summer 2012, I created a system to manage the tracking of hardware at SPAWAR. This was needed for internal infrastructure purposes.

    In Summer 2013 I got to work on some research ideas of my own, including a combined instrumentation tool and execution visualizer. I plan to use this for my Master's thesis, and in the process, I've tried to spawn some Creative Research and Development Agreements between SPAWAR and UT Dallas.

  • Amazon

    S.D.E. Intern

    I worked on the Access Management Systems team to help automate Amazon's internal management of their AWS accounts, in order that AWS service developers could quickly have them processed as internal, enabling them to continue with their work much less impeded. My code was pushed to production in Amazon. This was good not only because it saved people time, but because it also helped minimize the human element involved in the process of managing AWS accounts. During the process of my internship, I identified core security vulnerabilities in another team's access management process for their services and notified superiors.

Education

  • Brookhaven Community College

    N/A

    N/A
    Went here in order to earn credit hours to transfer to UT Dallas.

  • The University of Texas at Dallas

    Bachelor of Science (BS)

    Software Engineering
    This is the college I got my BS in S.E. from. I graduated Magna Cum Laude

  • Kilgore College

    N/A

    N/A
    Went here in order to earn transfer hours to bring to UT Dallas.

Publications

  • Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming

    ACM

    With the wide existence of binary code, it is desirable to reuse it in many security applications, such as malware analysis and software patching. While prior approaches have shown that binary code can be extracted and reused, they are often based on static analysis and face challenges when coping with obfuscated binaries. This paper introduces trace-oriented programming (TOP), a general framework for generating new software from existing binary code by elevating the low-level binary code to C code with templates and inlined assembly. Different from existing work, TOP gains benefits from dynamic analysis such as resilience against obfuscation and avoidance of points-to analysis. Thus, TOP can be used for malware analysis, especially for malware function analysis and identification. We have implemented a proof-of-concept of TOP and our evaluation results with a range of benign and malicious software indicate that TOP is able to reconstruct source code from binary execution traces in malware analysis and identification, and binary function transplanting.

Possible Matching Profiles

The following profiles may or may not be the same professor:

  • Kenneth M Miller (30% Match)
    Visiting Assistant Professor
    SUNY Geneseo - Suny Geneseo

  • Kenneth M Miller (30% Match)
    Assistant Instructor
    University of Texas at Austin - University Of Texas At Austin