Suny Polytechnic Institute Jan 2016 - May 2018
Adjunct Professor
Assured Information Security (Ais) Jan 2016 - May 2018
Team Lead, Agile Cyber Solutions Group
Air Force Research Laboratory Jun 2002 - Jun 2003
Associate Mathematician
Touro College Jun 2002 - Jun 2003
Adjunct Professor
Education:
Syracuse University 2002 - 2005
Master of Science, Masters, Computer Science
Binghamton University 1998 - 2002
Bachelors, Bachelor of Science, Computer Science
Skills:
Computer Security Reverse Engineering Software Engineering Linux Systems Engineering Security Python Vulnerability Assessment System Architecture Distributed Systems Software Development Computer Science Malware Analysis C++ C Computer Forensics Embedded Systems Programming Algorithms Unix Java Eclipse
Principal Investigator At Assured Information Security, Inc.
Principal Investigator at Assured Information Security, Inc.
Location:
Utica, New York Area
Industry:
Computer & Network Security
Work:
Assured Information Security, Inc. since Mar 2012
Principal Investigator
Assured Information Security, Inc. Jun 2003 - Mar 2012
Senior Computer Scientist / Researcher
Air Force Research Laboratory Jun 2002 - Jun 2003
Associate Mathematician
Education:
Syracuse University 2002 - 2005
MS, Computer Science
State University of New York at Binghamton 1998 - 2002
BS, Computer Science
Skills:
Reverse Engineering Python Distributed Systems C++ C Embedded Systems Computer Security Java Linux Programming Software Development Computer Forensics Algorithms Unix Eclipse
Us Patents
Method And System For Reducing An Impact Of Malware During A Booting Sequence
Ryan Matthew WILSON - Utica NY, US Joseph James Sharkey - Deerfield NY, US Michael Joseph Sieffert - Rome NY, US
Assignee:
Assured Information Security, Inc. - Rome NY
International Classification:
G06F 9/24 G06F 9/00
US Classification:
713 2, 713 1
Abstract:
Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.