Skip to content

Commit

Permalink
Polish my about and pojects page
Browse files Browse the repository at this point in the history
  • Loading branch information
n1o committed Apr 5, 2024
1 parent 1dd7e4a commit d86d775
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 4 deletions.
7 changes: 4 additions & 3 deletions content/about.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,12 @@
# About

I'm Marek Barak, I started my journey into computer science when I was 15 and started to code in C++. Since then more than 15 years has passed, and I managed to get an Master degree in computer science and statistics from the University of Economics in Bratislava. I had to opportunity to do data science consulting, work for multiple startups in their various stages.
I'm Marek Barak, I started my journey into computer science when I was 15 by coding in C++, without having access to the internet and in good old fashioned [Bloodshed C++](https://www.bloodshed.net/) Since then more than 15 years has passed, and I managed to get an Master degree in computer science and statistics from the University of Economics in Bratislava. I had to opportunity to do build machine learning and distributed systems for early to mid sage startups. Currently my day job is at [Paiqo](https://paiqo.com/) tackling anything Data related. At nights I am an independent Cyber Security Researcher figuring out how to apply Machine Learning to Cyber Security especially in the field of Reverse Engineering and Vulnerability Exploitation.

My professional interests are:

* Machine Learning
* High performance and distributed computing
* Reverse Engineering and Vunerability Exploitation
* Reverse Engineering and Vulnerability Exploitation
* Secure Coding

As of my personal life, I am a father of three sons, cat person and a book worm committed to life long geek-hood.
As of my personal life, I am married (Still fiding it hard to figure out why she said yes!). I am also an father of three sons, cat person and a book worm committed to life long geek-hood.
2 changes: 1 addition & 1 deletion content/posts/t5-the-old-new-thing.md
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ Here, both the encoder and decoder are engaged. The objective is to enable the m
AST-T5 represents an intriguing extension of T5 specifically designed for code. In this variant, we harness the power of the Abstract Syntax Tree (AST) associated with the code. Notably, a novel objective called AST-Aware Subtree Corruption is introduced. This objective involves corrupting tokens within a code snippet with respect to the corresponding subtree in the AST.

## LENS: T5 in Network Security
The LENS paper delves into the application of T5 in the realm of network security, and let me tell you, it’s quite the beast (I’m even planning to write a full blog post about it!). In a nutshell, the paper introduces multiple embedding strategies and pretraining objectives. While we won’t delve into the specifics of the embedding strategies (which include Payload Header Embedding and Packet Segment Embedding), we will certainly cover the pretraining objectives.
The LENS paper applies T5 for network security, and let me tell you, it’s quite the beast (I’m even planning to write a full blog post about it!). In a nutshell, the paper introduces multiple embedding strategies and pretraining objectives. While we won’t delve into the specifics of the embedding strategies (which include Payload Header Embedding and Packet Segment Embedding), we will certainly cover the pretraining objectives.

### Packet Order Prediction
In this pretraining objective, we focus exclusively on the Encoder. Our aim is to teach the model the natural order of packets within network traffic. To achieve this, we intentionally corrupt the order of the packets and then train the model to predict their original sequence.
Expand Down
3 changes: 3 additions & 0 deletions content/projects.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,3 +4,6 @@

This is my compilation of notes from various subjects. This is work in progress, where I continuously migrate, rewrite, simplify the notes I have. During the years I wrote thousands of pages worth of notes, not always concise. Right now I prefer taking notes that are somewhat similar to the [Zettelkasten](https://en.wikipedia.org/wiki/Zettelkasten) method. Thus keeping them short, easy to follow, covering at most a single subject.

## [CodeBreakers](https://codebreakers.re)

This is a collection of posts and videos about reverse engineering, vulnerability exploitation and secure coding. Mainly focused on applying machine learning to these fields.

0 comments on commit d86d775

Please sign in to comment.