Agent
Analysis automation & human-in-the-loop research
Embedded & infrastructure security research — firmware structure, exposure analysis, exploitability reasoning, and coordinated disclosure.
Analysis automation & human-in-the-loop research
From observation to issue & exploitability judgment
Structure, crypto, unpack boundaries, IPC
Exposure, fingerprinting, recon methodology
Constrained attack-path validation & defense insight