cv/cv.typ

117 lines
4.5 KiB
Plaintext

#import "layout.typ": cv, event, article, divider
#show: doc => cv(
name: "Charlotte Som",
tagline: "Systems programmer, videogame cheat developer, reverse engineer, multispecialist.",
links: (
(icon: "email", link: "mailto:charlotte@som.codes", text: "charlotte@som.codes"),
(icon: "github", link: "https://github.com/char", text: "@char"),
(icon: "link", link: "https://char.lt", text: "char.lt"),
(icon: "link", link: "https://hackery.site", text: "hackery.site"),
),
doc,
)
#grid(columns: (1fr, 2fr), column-gutter: 1cm, [
== Competitions
#event[Google Hash Code 2020][Google][February 2020][]
Worldwide intractable problem optimization competition. Competed as part of a globally-distributed team of three.
- *UK*: 6#super[th] place out of 406 teams.
- *USA*: 13#super[th] place out of 619 teams.
- *Canada*: 3#super[rd] place out of 135 teams.
- *Worldwide*: 252#super[nd] place out of 10724 teams.
#divider()
#event[Deloitte UK CTF][Deloitte][December 2020][London]
UK-wide infosec competition, organised by Deloitte.
Participated as a university team of six.
- *Qualifiers*: 10#super[th] place.
- *London finals*: 7#super[th] place.
#divider()
#event[BLÅHAJ CTF Team][][2021 -- Present][]
Casual infosec competition team. Since I joined:
- *Hack-A-Sat 2 CTF*: Organised by the _US Air Force & US Space Force_. Placed 15#super[th] out of 697 teams.
- *corCTF 2021*: Placed 11#super[th] out of 904 teams.
== Writing
#article(title: "Circumventing the JVM Classfile Verifier", date: 2019, url: "som.codes/jvm-force-no-verify")
#divider()
#article(title: "Reverse Engineering GTA V's Stunt Jumps", date: 2021, url: "hackery.site/writing/gta-v-stunt-jumps")
#divider()
#article(title: "Circumventing Cisco Duo's Authenticator App", date: 2021, url: "som.codes/cisco-duo-bypass")
#divider()
#article(title: "Extracting API Keys from a Minecraft Launcher", date: 2022, url: "som.codes/mmc-msaclientid")
], [
== Experience
#event[Multiplayer game technology][WorldQL Corporation][April 2022 -- Present][]
I currently work at WorldQL, building technology to reduce the barrier between singleplayer and multiplayer game development techniques.
The work is varied and has involved machine learning models, image processing pipelines, high-performance networking software, and 3D programming.
I mainly work with *Rust*, *TypeScript*, *Python*, *PyTorch*, *CUDA*, and *ONNX*.
#divider()
#event[Game modding / game-hacking][Self-employed][2016 -- Present][]
- _GTA Online_: *C++*, Rust
- _Minecraft_: *Java*, Kotlin, Scala, JVM Bytecode
- _Counter-Strike: Global Offensive_: *C++*, Rust
- Various Unity3D: *C\#*, .NET MSIL, C++ (for `il2cpp` games)
Professionally, I used to sell a custom client for Minecraft
(5-figure USD revenue from 2016 -- 2019),
and a subscription trainer menu for GTA Online
(4-figure annually recurring USD revenue until 2020).
#divider()
#event(company_newline: true)[Commercial obfuscator for JVM programs][paramorphism.dev (Self-employed)][2017 -- 2022][]
Java bytecode is one of my specialist areas.
Involved writing the product itself and internal tooling around JVM bytecode to aid debugging.
Working primarily with *Kotlin* and *Java*.
- _Paramorphism_: Bytecode obfuscator for JVM programs written in *Kotlin*.
- _libparamorphism_: Optional native runtime opaque library for programs
obfuscated by Paramorphism written in *Zig* and *Rust*.
- _Koffee_: Domain-specific language for *Kotlin* for Java classfile generation.
- _Aksara_ (internal): Bytecode assembly language and assembly/disassembly toolchain written in *Kotlin*.
- _Katon_ (internal): Bytecode viewer and editor with a GUI written in *Rust* and interfacing via *Java Native Interface* to *Kotlin* (_Aksara_) and *Java* (_Fernflower_).
#divider()
#event["Splashforce"][Force Software LLC][November 2020 -- October 2021][]
At Force Software, I was a "Software developer and strategy coordinator".
The flagship "Splashforce" product is an end-user e-commerce automation suite
for various sneaker sites. My duties included:
- `cronet`: Custom patches for & isolation of Chromium's HTTP stack.
(To evade TLS fingerprinting.)
- Pairing an Electron (node.js / web *JavaScript*) frontend to a *Go* backend.
- Anti-piracy, reverse-engineer-deterrent releases for the *Go* backend.
(Code virtualization, `cgo` FFI bindings, etc.).
- Reverse engineering bot protection measures on websites.
- Reverse engineering & circumventing bot prevention measures on Android apps. (*Java*, *Smali*, etc).
])
#pagebreak()
TODO: PAGE 2