Curriculum Vitae

I am a Computer Science Engineering Ph.D. candidate at the University of Michigan. I am advised by Professor J. Alex Halderman. My research interests center around computer security and cryptography.


University of Michigan, Ann Arbor, MIExpected 2020
Ph.D., Computer Science

University of Michigan, Ann Arbor, MIClass of 2016
Master of Engineering, Computer Science

University of Michigan, Ann Arbor, MIClass of 2014
Bachelor of Engineering, Computer Science

  • Minor in Mathematics
  • Magna Cum Laude
Conference Publications
Tracking Certificate Misissuance in the Wild[bibtex]
  • Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Zakir Durumeric, J. Alex Halderman and Michael Bailey
  • To Appear: IEEE Symposium on Security and Privacy (Oakland), May 2018.
Measuring small subgroup attacks against Diffie-Hellman[bibtex]
  • Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, and Nadia Heninger
  • Proc. 24th Network and Distributed System Security Symposium (NDSS 17), February 2017.
An Internet-Wide View of ICS Devices[bibtex]
  • Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Bertheier, Josh Mason, Zakir Durumeric, J. Alex Halderman, and Michael Bailey
  • Proc. 14th IEEE Conference on Privacy, Security, and Trust (PST 17), December 2016
DROWN: Breaking TLS using SSLv2[bibtex]
  • Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, and Yuval Shavitt
  • Proc. 25th USENIX Security Symposium, August 2016.
  • Internet Defense Prize Finalist.
Neither Snow Nor Rain Nor MITM… An Empirical Analysis of Email Delivery Security[bibtex]
  • Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Kurt Thomas, Vijay Eranti, Nicholas Lidzborski, Elie Bursztein, Michael Bailey, and J. Alex Halderman
  • Proc. 15th ACM Internet Measurement Conference (IMC 15), October 2015.
  • IRTF Applied Networking Research Prize.
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice[bibtex]
  • David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, and Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin and Paul Zimmermann
  • Proc. 22nd ACM Conference on Computer and Communications Security (CCS 15), October 2015.
  • Best Paper Award.
A Search Engine Backed by Internet-Wide Scanning[bibtex]
  • Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman
  • Proc. 22nd ACM Conference on Computer and Communications Security (CCS 15), October 2015.
Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication[bibtex]
  • Yue Liu, David R. Bild, David Adrian, Gulshan Singh, Robert P. Dick, Dan S. Wallach, and Z. Morley Mao
  • Proc. 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing
    (MobiHoc 2015), June 2015.
The Matter of Heartbleed[bibtex]
  • Zakir Durumeric, Frank Li, James Kasten, Johanna Amann, Jethro Beekman, Mathias Payer, Nicolas Weaver, David Adrian, Vern Paxson, Michael Bailey, and J. Alex Halderman
  • Proc. 14th ACM Internet Measurement Conference (IMC 14), November 2014.
  • Best Paper Award.
Workshop Publications
Zippier ZMap: Internet-Wide Scanning at 10 Gbps[bibtex]
  • David Adrian, Zakir Durumeric, Gulshan Singh, and J. Alex Halderman
  • USENIX Workshop on Offensive Technologies (WOOT 14), August 2014
Program Committees
  • USENIX Workshop on Offensive Security (WOOT)August 2018
  • BlackHat USA Cryptography Guest Review BoardAugust 2018
Fixing OCSP for Fun and Profit
  • USENIX Security Rump Session, August 2016 [pdf] [key]
A Retrospective on the Use of Export Cryptography
F**k It, Let's Do It Wide! Security Applications of Internet-Wide Scanning
  • Eastern Michigan University, February 2016. [pdf] [key]
Imperfect Forward Secrecy
  • Hushcon, December 2015. [pdf] [key]
A Search Engine Backed by Internet-Wide Scanning
  • CCS, October 2015. [pdf] [key]
Were It So Easy: TLS in the Real World
Zippier ZMap: Internet-Wide Scanning at 10 Gbps
Relevant Experience

Google, Mountain View, CA Summer 2016
Software Engineering Intern
Chrome Security

  • Implemented OCSP Expect-Staple in order to begin measuring the feasibility of OCSP Must-Staple.

Duo Security, Ann Arbor, MI Summer 2013
Software Engineering Intern

  • Offered two-factor authentication-as-a-service, using mobile phones as the second authentication factor and push noti cations for login approval.
  • Grew various Python backend subsystems to support new features; handled all bugs, feature requests, and security considerations for the Duo Unix client.
  • Wrote a patch for OpenSSH to securely allow third-party authentication plugins

Whisper Project, University of Michigan2012 - 2013
Undergraduate Research with Professor Robert Dick

  • Developed an Android framework (MANES) for testing feasibility, routing protocols, and location profi le systems of large-scale mobile ad hoc networks that could be used for censorship-resistant communication.
  • Built Shout, a user-friendly censorship-resistant communication Android application on top of MANES.
  • Managed and led student software development teams.
  • Resulted in a publication at MobiHoc 2015.

CAEN, University of Michigan College of Engineering2011 - 2012
Network Technician

  • Maintained over 700 wireless access points for the College of Engineering campus.
  • Transitioned printing system from CAEN control to campus-wide IT department.
  • Diagnosed and performed network troubleshooting as needed.
Teaching Experience

EECS 388: Introduction to Computer SecurityFall 2016

  • Undergraduate course on computer security.
  • Cotaught with Professor Halderman and Professor Honeyman.

EECS 388: Introduction to Computer SecurityFall 2015
Graduate Student Instructor (GSI)

  • Undergraduate course on computer security.
  • Lead a weekly discussion section, and guest-lectured when the instructor was unavailable.
  • Head GSI; organized other teaching assistants.

EECS 588: Advanced Computer SecurityWinter 2015
Graduate Student Instructor (GSI)

  • Graduate course on computer security research.
  • Guest-lectured when the instructor was unavailable, and continued the tradition of guest-lecturing on cryptography for the first class of the semester.
  • Advised students on class research projects.

EECS 281: Introduction to AlgorithmsWinter 2014
Instructional Aide (IA)

  • Introductory course on algorithms, taught in C++. Covered runtime complexity, sorts, trees, heaps, and basic search and graph algorithms.
  • Held a weekly discussion section to reinforce concepts introduced in lecture.
  • Held weekly office hours for help with concepts and projects.

EECS 280: Programming and Data StructuresFall 2013
Instructional Aide (IA)

  • Introductory course on data structures, taught in C++. Covered recursion, pointers, structs and classes, inheritance and dynamic memory
  • Held a weekly lab section where students coded examples based on content from the week's lectures.
  • Held biweekly office hours for help with concepts and projects
Leadership, Service, and Honors

Best Paper Award

  • 14th ACM Internet Measurement Conference (IMC 14)November 2014
    • Awarded for "The Matter of Heartbleed"
  • 22nd ACM Conference on Computer and Communications Security (CCS 15)October 2015
    • Awarded for "Imperfect Forward Secrecy"

Pwnie Award

  • Most Innovative ResearchBlackHat 2015
    • Imperfect Forward Secrecy (Logjam)
  • Best Crypto AttackBlackHat 2016
    • SSLv2 Crypto Attack (DROWN)

IRTF Applied Networking Research Prize (ANRP)December 2015

  • Awarded for "Neither Snow Nor Rain Nor MITM…"

Facebook Internet Defense Prize FinalistAugust 2016

  • Finalist with "DROWN: Breaking TLS using SSLv2"

Eta Kappa Nu, Beta Epsilon Chapter2013 to Present
Social Chair

  • Taught local high school and middle school students programming in Java and Android application development.
  • Organized off-campus social events for HKN members and alumni.

Tau Beta Pi, Michigan Gamma Chapter2016 to Present

Erdos Number: 3

  • David Adrian – Paul Zimmerman – Peter Montgomery – Paul Erdos

Training for Intervention ProcedureS (TIPS) Certified BartenderAugust 2016

Computer Skills

Programming Languages

  • C, Python, Go, C++, Java, Javascript, PHP, HTML/CSS, Latex, Haskell

Platforms and Frameworks

  • Unix Kernel API, Android, Node.js, React, Parse, Tornado/Cyclone/Twisted, Celery, Unity3D, OpenGL, Matlab


  • MySQL, RocksDB, MongoDB, Redis, Voldemort, neo4j