Andrew Kramer
Andrew Kramer
Assistant Professor
Department
The Beacom College of Computer & Cyber Sciences
Education
Ph.D. Computer Science, Dakota State University (Doctoral Candidate)
M.S., Dakota State University
B.S., Dakota State University
A.A., College of Redwoods
Biography
Andrew Kramer is an Assistant Professor in The Beacom College of Computer & Cyber Sciences, teaching classes related to reverse engineering, vulnerability research, and exploit development. His work focuses on x86/x64 in Linux environments, while occasionally delving into other platforms such as ARM IoT/embedded devices.
Kramer is passionate about student success and strives to make education exciting through hands-on learning and project-based work. He believes that a teacher’s primary goal should be to spark excitement for the subject.
Additionally, he has published a variety of open-source software projects and holds several CVEs from personal research work.
Contact
Office Location: East Hall
Phone: (605) 256-5838
Email
Website
-
Software reverse engineering
-
Binary exploitation
-
C programming
-
Assembly programming
-
Capture the flag (CTF)
-
Software reverse engineering
-
Vulnerability research
-
Exploit development
-
OpenSOC Winner at DEF CON 28 – 2020
-
Wild West Hacking Fest CTF Winner / Black Badge Holder – 2019
-
Ernest Teagarden Award for Excellence in Teaching – 2022
-
Outstanding Research Mentor (2023-4)
Amateur Radio General Class
Co-PI, DSU Scholarship for Service grant (NSF)
M. Ham, A. Kramer. (2023, September 27). Preventing Ransomware and Malware Starts with Good Cyber Hygiene. Infosecurity Magazine.
M.Ham, A.Kramer. “Hardware Reverse Engineering Platform: An Open-source Educational Tool.” Computing Education + Information Systems Applied Research (ISCAP) 2023.
CVE-2019-5523, CVE-2016-4071, CVE-2015-8617
OWASP, Exploiting Deserialization Vulnerabilities in PHP Applications