Aravind Machiry

Hi, I'm Aravind Machiry, a Fifth year PhD student at University of California, Santa Barbara and a recipient of the 2018 Symantec Research Labs Fellowship. I am interested in all aspects of System security and Program analysis. Currently, I am working on applying static/dynamic program analysis and fuzzing to solve various system security problems. I am also interested in identifying and improving the weaknesses of static program analysis.

My research resulted in various Open-source security tools and several Common Vulnerability Exposures (CVEs) in critical system software such as kernel drivers and bootloaders.

When time permits, I enjoy participating in Computer Security Capture the Flag (CTF) competitions with Shellphish, and I won third place with the Shellphish CGC team in the autonomous DARPA Cyber Grand Challenge.

If you want to know more about my research, discuss problems related to the system security or program analysis, or need a workout partner for your CrossFit WoD, do not hesitate to contact me :)


  • Two papers got accepted at CNS 2020.
  • Two papers got accepted at S&P 2020.
  • Our paper on Analysis of Embedded Firmware through Automated Re-hosting got accepted at RAID 2019.
  • Our paper on Static Binary Debloating through Abstract Interpretation got accepted at DIMVA 2019.