> KERNEL_INIT...

> MOUNTING FILESYSTEM...

> LOADING USER PROFILE: ISHAN_PERERA...

> ESTABLISHING SECURE CONNECTION...

Ishan Perera

Session Locked

Click Fingerprint to Unlock

Evidence Title

1 / 1
Evidence

Description of the evidence...

ISHAN PERERA

STATUS: ONLINE
ROLE: PH.D. CANDIDATE
ACCESS: ROOT / ADMIN
Ishan Perera
User_Profile.exe
Case_Files
Evidence_Board
System_Logs
Technical_Skills.sh
Comms_Relay
Download_CV.pdf
User_Profile.exe - Ishan Perera

Ishan Perera

Ph.D. Candidate in Digital & Cyber Forensic Science

Mobile Forensics | IOT Forensics | AI Powered Cyber Security Automation | AI Powered Exploitation | AI Powered Digital Forensics| Enterprise Security


I am a Ph.D. Candidate at Sam Houston State University with a research focus on mobile forensics, IoT forensics, and AI-powered cybersecurity automation, digital forensics and exploitation.

With a background as a Systems & Security Engineer, I combine theoretical research with practical industry application. I currently serve as a Teaching Assistant for Digital Forensics at Sam Houston State University.

Case_Files (Research)
> Path: /home/ishan/research/published

Breaking Android with AI

Deep Dive into LLM-Powered Exploitation. Presented at ICCCN 2025, Tokyo.

[OPEN_PDF]

Beyond the Cable

USB Debugging Exploits on Android Devices. Presented at CARS'25.

[OPEN_PDF]

Digital Twins in Critical Infrastructure

Institute for Homeland Security Report, 2025.

[VIEW_REPORT]

Open Source Forensic Tool

Automated memory analysis framework using LLMs.

[VIEW_REPO]
System_Logs (Experience)
[2022 - PRESENT]

Teaching Assistant @ SHSU

Department of Computer Science & Digital Forensics

  • > COSC 3327: Computer Architecture
  • > COSC 2329: Computer Org & Machine Language
  • > DFSC 2316: Digital Forensics & Info Assurance II
  • > COSC 3331: Human–Computer Interaction (HCI)
  • > COSC 3312: Numerical Methods
[OCT 2018 - JULY 2022]

Engineer – Systems & Security

Connex Information Technologies | Colombo, Sri Lanka

  • > Architecture: Firewalls, Web Security, IAM, SIEM.
  • > Vuln Mgmt: Assessments, Pen-Testing, IT Audits.
  • > Network Eng: Enterprise Routers, Switches, Config.
  • > Systems: DLP, MDM, Environment Monitoring (EMS).
  • > Consultancy: Pre-sales, POCs, Technical Support.
Technical_Skills.sh
> ./check_arsenal.sh --full-scan
Loading modules... [COMPLETED]

# FORENSIC TOOLS
> FTK Imager ................ [READY]
> Autopsy/SleuthKit ......... [READY]
> Volatility ................ [READY]
> Cellebrite ................ [READY]

# VULNERABILITY & PENTESTING
> Metasploit/Nmap ............. [ACTIVE]
> Burp Suite/Acunetix ....... [ACTIVE]
> Wireshark/Aircrack ........ [ACTIVE]
> Nessus/Rapid7 ............. [ACTIVE]

# SECURITY MANAGEMENT (SIEM/EDR)
> Splunk/LogRhythm ............ [LINKED]
> Palo Alto/SentinelOne ....... [LINKED]
> Cylance/TrendMicro .......... [LINKED]

# MOBILE & VIRTUALIZATION
> VMware/Hyper-V .............. [MOUNTED]
> Blackberry MDM/Citrix ....... [MOUNTED]

# LANGUAGES & OS
> Python/MATLAB ............... [COMPILED]
> Assembly (MARIE) ............ [COMPILED]
> Linux (Kali/Ubuntu) ......... [RUNNING]
> Win Server/macOS ............ [RUNNING]

Comms_Relay

Establish Connection

Secure channel available for collaboration.


*Initiates secure email protocol