Matthew Alt
Founder / Instructor at VoidStar Security LLC- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
VoidStar Security LLC
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Founder / Instructor
-
Jul 2020 - Present
Voidstar Security LLC is a computer security firm that I started to develop research and education materials surrounding embedded systems security. Check out https://voidstarsec.com for more information or to book a private course! Voidstar Security LLC is a computer security firm that I started to develop research and education materials surrounding embedded systems security. Check out https://voidstarsec.com for more information or to book a private course!
-
-
-
Caesar Creek Software, Inc.
-
United States
-
Software Development
-
1 - 100 Employee
-
Senior Security Engineer
-
Apr 2018 - Present
Security researcher specializing in embedded platforms and reverse engineering. Security researcher specializing in embedded platforms and reverse engineering.
-
-
-
MIT Lincoln Laboratory
-
United States
-
Defense and Space Manufacturing
-
700 & Above Employee
-
Group 59 - Cyber Systems Assessments, Associate Research Staff
-
Feb 2014 - Apr 2018
Principal Investigator / Team Lead / Associate research staff member of the Systems Exploitation team in the Cyber Systems Assessments group within group 59 at Lincoln Laboratory. Principal Investigator / Team Lead / Associate research staff member of the Systems Exploitation team in the Cyber Systems Assessments group within group 59 at Lincoln Laboratory.
-
-
-
REVO Technik - USA
-
Summit Point WV
-
Embedded Software Security Engineer
-
Feb 2012 - Jan 2014
- Extracted binary images from engine control modules (ECU) via hardware reverse engineering or through other exploits - Used IDA-Pro / GDB to reverse engineer firmware binaries extracted from Tricore based ECUs - Performed black box analysis of Tricore/ARM/PIC based embedded control modules via the various network interfaces that were present (CAN,J/K Line, etc) - Usage of ISO-15765, KWP2000, UDS protocols to discovery security flaws - Development of .NET applications to aid in reverse engineering / data logging process while performing firmware updates of ECUs - PIC/ARM Development for hardware tools to assist in the reverse engineering process Show less
-
-
-
STaSIS Engineering
-
United States
-
Automotive
-
1 - 100 Employee
-
Embedded Software Security Engineer
-
Feb 2012 - May 2013
Assisted in the development of methods for flashing and reprogramming Tricore based engine control modules for Audi / VW embedded systems. Languages: C#, Python, C (PIC32 Microcontroller Development) Tools: IDA Pro, GDB, IDA-Python, MPLAB Assisted in the development of methods for flashing and reprogramming Tricore based engine control modules for Audi / VW embedded systems. Languages: C#, Python, C (PIC32 Microcontroller Development) Tools: IDA Pro, GDB, IDA-Python, MPLAB
-
-
-
Shepherd University
-
Higher Education
-
300 - 400 Employee
-
Resident Assistant
-
Aug 2011 - Dec 2012
This position involved maintaining an academic environment in a college dormitory while ensuring that rules and regulations were followed. This position required intensive paperwork and strict scheduling in order to meet various activity deadlines. This position involved maintaining an academic environment in a college dormitory while ensuring that rules and regulations were followed. This position required intensive paperwork and strict scheduling in order to meet various activity deadlines.
-
-
-
McDonalds
-
Moorefield WV
-
Crew Trainer / Shift Manager
-
May 2007 - Sep 2010
-
-
Education
-
Shepherd University
Bachelor of Science (BS), Computer Engineering -
Massachusetts Institute of Technology