I began my research career focusing on internet
censorship(See publication). Beginning in 2012 my research shifted
to dynamic information flow tracking(DIFT). We have
ideas(unpublished) of how to utilize DIFT in new ways such as
program comparison and symmetric key location.
I developed the following tool to aid in
learning the function call structure within a program. I had an OTF
fellowship through the ICFP program for a year, where I reversed
engineered LINE to evaluate its cryptography implementation. The
results of which are to be published in the 2017 FOCI workshop, and
inspired a soon to be published
- Antonio M. Espinoza and Jedidiah R. Crandall. Work-in-Progress: Automated Named Entity Extraction for Tracking
Censorship of Current Events. In the Proceedings of the USENIX Workshop on Free and Open
Communications on the Internet. (FOCI 2011). San Francisco,
California. August 2011. pdf
- Antonio Espinoza, Jeffrey Knockel, Jedidiah R. Crandall, and Pedro Comesaña.
V-DIFT: Vector-Based Dynamic Information Flow Tracking with
Application to Locating Cryptographic Keys for Reverse Engineering.
In the Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). Salzburg, Austria. August/September 2016. pdf
- Antonio M. Espinoza, William J. Tolley, Jedidiah R. Crandall, Masashi Crete-Nishihata, and Andrew Hilts.
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application.
In the Proceedings of the 7th USENIX Workshop on
Free and Open Communications on the Internet. (FOCI 2017). Vancouver, Canada. August 2017. pdf
2014 New Mexico Supercomputing kickoff (Teaching Scratch to middle and high schoolers)
Bosque School Winterim (Spring 2014, teaching middle schoolers Scratch)