Cybersecurity Engineer · NYU Tandon '26 · Brooklyn, NY
ABOUT ME
I'm Love Kush Pranu — a cybersecurity engineer pursuing my MS at NYU Tandon School of Engineering (GPA 3.9/4.0), expected May 2026. I graduated from NIT Calicut with a B.Tech in EEE, where circuits and systems sparked a deep passion for digital security.
I serve as Research Coordinator at OSIRIS Lab — NYU's premier security research group — managing 9 active research projects spanning kernel fuzzing, adversarial ML, CTF tooling, and IoT security. I'm also a CTF Team Member and help run world-class competitions like CSAW. I love going deep: from building a CHIP-8 emulator entirely in C to modifying the xv6 kernel with ASLR and W^X protections.
WHAT I DO
Adversarial simulations across enterprise environments — improved defense efficiency by 30% at Pentadots. Web exploitation, cryptography, hardware security, CTF challenge design and infrastructure.
Zero-trust frameworks, microsegmentation, VLAN/Cisco ASA configuration, VPN/IPsec, firewall policies, IDS/IPS, BGP/OSPF, DNS security and large-scale network monitoring.
xv6 kernel security enhancements (ASLR, W^X, stack canaries), OS-level isolation, CHIP-8 emulation, C/C++/Python/Rust, Docker, Linux security internals, iptables/netfilter.
PGD adversarial training, FGSM/C&W attack analysis via CleverHans & ART, AWS IAM/EC2/S3 hardening, CI/CD pipeline security, model robustness testing on production ML systems.
SELECTED WORK
OSIRIS Lab — Kernel Network Stack
Semantic fuzzing framework targeting the Linux kernel's network stack for race conditions — part of the OSIRIS Lab research initiative. Collaborative fork of ChinmayShringi/hot-fuzz, extended with custom Go-based corpus generation and race condition detection heuristics.
View on GitHub ↗Kernel-Level Security Research
Implemented kernel-level security enhancements to the xv6 OS — ASLR, W^X memory policies, stack canaries, and process isolation. Conducted memory safety analysis and developed custom system calls for security auditing. Built on the Lind sandbox research at NYU.
View on GitHub ↗NYU Tandon — ML Security Research
Implemented PGD adversarial training on MNIST, validating Madry et al. (2018) — achieving ~90% accuracy against PGD/FGSM attacks while identifying weaknesses under C&W attacks and distribution shifts. Re-engineered TensorFlow 1.x → 2.x for CleverHans and ART experiments.
View on GitHub ↗Systems Programming — C / SDL2
A fully functional CHIP-8 emulator from scratch — all 35 opcodes, 64×32 pixel XOR-based sprite rendering, SDL2 graphics and input, proper timing with delay/sound timers, and 16-key hexadecimal keypad. Runs all classic ROMs: Pong, Tetris, Space Invaders, and more.
View on GitHub ↗Binary Analysis Security Tool
A CLI tool to quickly scan binaries and applications for common vulnerability classes — weak permissions, outdated libraries, CVE matches, and ROP gadget detection. Designed for rapid triage in CTF and real-world assessments.
View on GitHub ↗RESEARCH COORDINATION
Managing 9 active research projects · NYU Tandon School of Engineering · Feb 2026 – Present
As Research Coordinator at OSIRIS Lab — NYU's premier cybersecurity research group — I oversee and guide 9 active security research projects spanning kernel exploitation, AI security, embedded systems, and CTF infrastructure. Each project is mentored to students across skill levels.
Developing a semantic-aware fuzzer to detect race conditions in the Linux kernel's network stack using coverage-guided mutation and concurrency analysis.
Building an MCP (Model Context Protocol) server that assists in binary exploitation workflows, automating gadget finding, ROP chain construction, and exploit generation.
Augmenting large language models with chain-of-thought reasoning to autonomously solve CTF challenges across crypto, pwn, and web categories.
Designing a physically unclonable function (PUF) based authentication protocol for resource-constrained embedded devices resistant to side-channel and replay attacks.
Developing a secure Automatic Dependent Surveillance–Broadcast (ADS-B) framework to authenticate aircraft transponder signals and defend against spoofing and injection attacks.
Analyzing security vulnerabilities in ROS 2 robotic middleware and real-time operating systems (RTOS), with focus on privilege escalation and message injection attacks.
Investigating how AI models embedded in IoT devices can be exploited for privacy leakage through model inversion, membership inference, and side-channel analysis.
Large-scale scraping and analysis of Pastebin and similar platforms to identify leaked credentials, API keys, PII, and sensitive organisational data for responsible disclosure.
Designing adaptive CTF challenges that evolve in difficulty and category based on an AI solver's capabilities — creating a co-evolutionary arms race between AI and human-designed puzzles.
HISTORY
New York University · Feb 2026 – Present · New York City (Hybrid)
Managing 9 active security research projects across kernel fuzzing, adversarial ML, IoT security, and CTF tooling. Also serving as CTF Team Member since Jan 2025 — competed globally, co-ran CSAW CTF 2025 and organised Hack@NYU at Microsoft NYC.
New York University · Jan 2025 – Present · New York City
OS-level security research using Rust, contributing to the Lind sandbox project — a restricted POSIX environment to safely execute untrusted code via WebAssembly.
Full-time · Remote · Oct 2023 – Sep 2025 (2 years)
Executed red-team adversarial simulations across enterprise environments improving defense efficiency by 30%. Architected zero-trust network security frameworks with microsegmentation and least-privilege access controls.
Coimbatore, India · June 2022 – July 2022
Penetration testing and vulnerability assessment on embedded E-Drive automotive systems. Security analysis of CAN bus communications and firmware hardening.
Bangalore, India · Jan 2021 – June 2021
Developed and evaluated computer vision models for automotive safety. Researched adversarial robustness of real-time detection pipelines in safety-critical environments.
National Institute of Technology, Calicut · Aug 2019 – May 2023 · CGPA: 8.2/10
Published research on adaptive distance relay coordination (15% reliability improvement). ISTE Joint Secretary, IEEE IAS/CAS member, Placement Cell Representative, Powerlifting Team.
ACHIEVEMENTS & HIGHLIGHTS
"MITRE eCTF 2025 — Successfully entered the Attack Phase; one of the most prestigious embedded security competitions in the United States."
"Co-ran CSAW CTF 2025 Qualifiers with OSIRIS Lab at NYU — one of the world's largest student-run cybersecurity competitions, hosting thousands of players across dozens of regions globally."
"Organised Hack@NYU at Microsoft NYC — managing logistics, technical mentorship and stakeholder coordination across Pathway and Sui-based projects."
"Published research on adaptive distance relay coordination at NIT Calicut, improving power system reliability by 15%."
TECH STACK
GET IN TOUCH
Whether you have a security challenge, research collaboration, CTF opportunity, or just want to talk — I'm always open to interesting conversations.