Name |
Steve Hendrikse
|
School | School of Applied Computer Science & Information Technology |
Program | - Bachelor of Computer Science (Honours)
|
Academic and professional designations | - PhD. Information Assurance
- MSc. Information Security
- BA. Computer Science
- Dipl. Electronic Engineering Technology
|
Title | Professor |
Courses taught | - CSCN74000 – Software Safety and Reliability
- SECU73000 – Introduction to Software Security
- SECU74000 – Rootkits and Hacking
- PROG71040 – Operating Systems and Security Fundamentals
- PROG71990 – Programming Principles
|
Areas of expertise & interest | - The process and mechanisms of secure/reliable software design and development and the development of the tools required to demonstrate the robustness of the resulting software.
- Security event and incident detection using event collection and aggregation with machine learning techniques used to correlate and identify anomalous activity.
- Binary executable file analysis specifically geared toward identifying areas of code that represent malicious intent.
|
Industry experience, professional currency activities | - Worked for a leading video game company, designing anti-cheat, anti-reverse-engineering capabilities for use in triple-A video games.
- Worked as an analyst, primarily doing security-based source code audits on business systems. A significant part of the role was following up with developers and helping them remediate the findings.
- Worked as a member of a Red Team for a consulting company, solely focused on exploiting the networked computer systems of the company's customers.
|
Major research projects, scholarly activities, and/or publications | - Co-Principal Investigator in an 8-month project to develop advanced capabilities and protections for next-generation in-vehicle automotive systems.
- Principal Investigator of a 16-month project to develop a process for building machine learning classifiers to identify anomalous events from streams of events numbering thousands per second.
- Principal Investigator of a 13-month project to develop a testing tool capable of spidering through networks to create a graph of vulnerabilities and a "shortest path" to administrator/root.
- Principle Investigator in the design/development of a prototype "End to End Encryption" (E2EE) Web portal for document sharing.
|
Additional information | Steve enjoys sharing his passion for computer systems and security with his students, hoping that they will find a similar passion through the course of their learning. |