Matthew Alt

Founder / Instructor at VoidStar Security LLC
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Lexington, Massachusetts, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Founder / Instructor
      • Jul 2020 - Present

      Voidstar Security LLC is a computer security firm that I started to develop research and education materials surrounding embedded systems security. Check out https://voidstarsec.com for more information or to book a private course! Voidstar Security LLC is a computer security firm that I started to develop research and education materials surrounding embedded systems security. Check out https://voidstarsec.com for more information or to book a private course!

    • United States
    • Software Development
    • 1 - 100 Employee
    • Senior Security Engineer
      • Apr 2018 - Present

      Security researcher specializing in embedded platforms and reverse engineering. Security researcher specializing in embedded platforms and reverse engineering.

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Group 59 - Cyber Systems Assessments, Associate Research Staff
      • Feb 2014 - Apr 2018

      Principal Investigator / Team Lead / Associate research staff member of the Systems Exploitation team in the Cyber Systems Assessments group within group 59 at Lincoln Laboratory. Principal Investigator / Team Lead / Associate research staff member of the Systems Exploitation team in the Cyber Systems Assessments group within group 59 at Lincoln Laboratory.

  • REVO Technik - USA
    • Summit Point WV
    • Embedded Software Security Engineer
      • Feb 2012 - Jan 2014

      - Extracted binary images from engine control modules (ECU) via hardware reverse engineering or through other exploits - Used IDA-Pro / GDB to reverse engineer firmware binaries extracted from Tricore based ECUs - Performed black box analysis of Tricore/ARM/PIC based embedded control modules via the various network interfaces that were present (CAN,J/K Line, etc) - Usage of ISO-15765, KWP2000, UDS protocols to discovery security flaws - Development of .NET applications to aid in reverse engineering / data logging process while performing firmware updates of ECUs - PIC/ARM Development for hardware tools to assist in the reverse engineering process Show less

    • United States
    • Automotive
    • 1 - 100 Employee
    • Embedded Software Security Engineer
      • Feb 2012 - May 2013

      Assisted in the development of methods for flashing and reprogramming Tricore based engine control modules for Audi / VW embedded systems. Languages: C#, Python, C (PIC32 Microcontroller Development) Tools: IDA Pro, GDB, IDA-Python, MPLAB Assisted in the development of methods for flashing and reprogramming Tricore based engine control modules for Audi / VW embedded systems. Languages: C#, Python, C (PIC32 Microcontroller Development) Tools: IDA Pro, GDB, IDA-Python, MPLAB

    • Higher Education
    • 300 - 400 Employee
    • Resident Assistant
      • Aug 2011 - Dec 2012

      This position involved maintaining an academic environment in a college dormitory while ensuring that rules and regulations were followed. This position required intensive paperwork and strict scheduling in order to meet various activity deadlines. This position involved maintaining an academic environment in a college dormitory while ensuring that rules and regulations were followed. This position required intensive paperwork and strict scheduling in order to meet various activity deadlines.

  • McDonalds
    • Moorefield WV
    • Crew Trainer / Shift Manager
      • May 2007 - Sep 2010

Education

  • Shepherd University
    Bachelor of Science (BS), Computer Engineering
    2009 - 2013
  • Massachusetts Institute of Technology
    2015 - 2015

Community

You need to have a working account to view this content. Click here to join now