Hi! I'm a junior Cyber Security & Digital Forensics graduate from Bristol UWE.
And i'm actively seeking job opportunities!
Cyber Passion
As a Cyber Security graduate, I have a profound passion for safeguarding digital environments and protecting organisations from threats.
Academic Journey
During my academic journey, I immersed myself in Cyber Security and Digital Forensics, gaining valuable knowledge along the way.
Strategic Goals
I created and implemented customised security strategies using cutting-edge technologies, aligning with organisational goals and priorities.
Keeping up to Date
I keep up to date with current industry trends, and enjoy attending meetups whenever I can.
A little bit about me.
Music has always held a special place in my heart. Writing music allow me to express myself and connect with others on a deeper level. Music is a constant source of joy and creativity in my life.
I find delight in exploring k-pop choreography. It's a wonderful way to stay active while letting my creativity flow!
One of my favourite places to be in the world is in the ocean. I love to swim, and I get a sense of calm and serenity that recharges my spirit.
Baking is another passion that brings me happiness. The joy of sharing homemade goodies with my husband is simply priceless.
Lastly, I love exploring different corners of the world and immersing myself in diverse cultures, taste new cuisines, creating lasting memories. The experiences gained from my journeys enrich my perspective and broaden my horizons.
Some of the work i've done
Throughout University, I've gained extensive knowledge in my field, empowering me with a strong foundation to excel. I'm well-prepared to tackle complex challenges and deliver impactful solutions.
PintOS System Calls & Exploits
Large Dataset Analysis
Fast Food Franchise Relational Database
case SYS_WRITE: {
if (DEBUG) printf("SYSTEM CALL: Write is being executed");
assert_valid_pointer(ptr + 1);
assert_valid_pointer(ptr + 2);
assert_valid_pointer(ptr + 3);
int fd = *((int*)ptr + 1);
char* buffer = (void*)(*((int*)ptr + 2));
unsigned size = *((unsigned*)ptr + 3);
// Vulnerable code here!
// inner_buffer is a fixed size buffer on the stack of size 64 bytes
// Therefore, by inputting an input buffer of size >64, the excess bytes will overwrite the other values on the stack
// This will eventually get to the return address, where we can exploit ROP to jump to shellcode defined elsewhere
char inner_buffer[64];
// // Countermeasure here!
// // Don't use 'strcpy' as its NOT safe. The fn does not perform boundary checking on destination buffer
// int i;
// while (buffer[i] != '