Skip to content
View loveminhal's full-sized avatar
💪
💪

Block or report loveminhal

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
loveminhal/README.md
  • 👋 Hi, I’m Minhal (@loveminhal)

  • 👀 I’m interested in Firmware Protection, Hardware Security, Reverse engineering, and breaking things to understand how they work. I have a strong interest in the security of satellites, automotives, and embedded devices, especially firmware and hardware attacks/protection such as TrustZone, Secure Boot, Fuzzing, Emulation, as well as side-channel and fault-injection attacks.

  • 🌱 I greatly appreciate the elegance and openness of the RISC-V ecosystem, and I’m also curious about emerging technologies such as AI, GPU design, and the fascinating corners of Web3.

  • 💞 Outside of work, I’m passionate about 📷 photography, ✈️ raveling, ⛰️ hiking, and discovering new places and perspectives.

  • 📧 How to reach me: m@minhal.me or visit minhal.me

  • 🏢 Work Experience

    • OSR: Hardware Security Researcher (2024.4 – Present)

    • Riscure: Security Analyst (2022.9 – 2024.3)

    • SAIC: Automotive Penetration Testing (2022.7 – 2022.9)

    • Tencent Tianma Security Lab: Satellite Security Research (2021.7 – 2022.7)

@loveminhal's activity is private