▪ Application development using Trusted Execution Environments (TEEs) such as Intel® Software Guard eXtensions (Intel® SGX):
https://software.intel.com/en-us/articles/code-sample-gateway-key-provisioning-and-secure-signing-using-intel-software-guard
▪ Yocto Linux recipes development for embedded systems enabling, to integrate SGX software stack, dm-verity, Linux SMACK, etc. Open-sourced & maintained Yocto Linux recipes for Intel® SGX:
https://github.com/intel/meta-intel-sgx/
https://layers.openembedded.org/layerindex/branch/master/layer/meta-intel-sgx/
▪ Contributed to Intel(R) SGX Linux Driver: https://github.com/intel/linux-sgx-driver
▪ Enabling Intel® SGX on Slimboot bootloader (Slimboot => Light-weight/fast BIOS). Open-sourced & actively maintained Intel® SGX enablement and library (SgxLib):
https://github.com/slimbootloader/slimbootloader
▪ Software design and development for various security capabilities across IoT platforms and developing software abstraction layers.
▪ Security Development Lifecycle (SDL), including threat modelling, code reviews/audit, etc.
▪ Provided training for Intel® SGX, including hands-on secure software development, performance benchmarking, etc.
▪ Software Build Environments: Linux Makefile, Android.bp/Android Soong, Windows 10 Visual Studio.
▪ Hobby hacking: penetration-testing, cold-boot attacks, buffer overflow, integer overflow, etc.