Security Engineering Tech Lead at Anchorage Digital

PhD in Computer Science from Johns Hopkins University advised by Dr. Matthew D. Green.


I am passionate about building practical, efficient, and comprehensive cryptography and security solutions. I've contributed to securing web platforms, developing privacy-preserving systems, and advancing the state of the art in applied cryptography. I hold a CISSP certification and have published research in top security venues including USENIX Security, PETS, and TCC. I earned my MSE in Computer Science from Johns Hopkins (2020) and BS in Computer Science with Mathematics minor from Cal Poly SLO (2018).


Outside of work, I enjoy tennis, chess, hiking, and exploring artisanal (read: needlessly elaborate) coffee brewing methods.


I can be reached via email at contact @ mzink.us or maxzks.77 on Signal.

Profile picture

News & Updates

Doctoral Dissertation

September 2024 +

After defending my dissertation, I have now officially completed my PhD in Computer Science! I want to thank my advisor and the rest of my committee, Dr. Matthew Green and Drs. Yinzhi Cao and Mike Rushanan, as they supported me to the end. My dissertation will be made publicly available by the university, but the finalized manuscript can be found here.

Anchorage Digital

March 2024 +

As I complete my degree I will be joining Anchorage Digital as a Member of Technical Staff in Security Engineering! Anchorage Digital is a crypto platform that enables institutions to participate in digital assets through custody, staking, trading, governance, and settlement, and it is home to the only federally-chartered crypto bank in the US, making it the only unequivocally qualified custodian for digital assets. I'm very excited to be joining a well-established and growing team of dedicated and talented people, and to apply the expertise I've developed throughout my PhD.

ISC2 CISSP

February 2024 +

On February 15th, 2024, I passed the ISC2 Certified Information Systems Security Professional (CISSP) exam. The CISSP certification is widely considered among the most rigorous and prestigious certifications in the field. It covers the creation, management, and implementation of comprehensive enterprise information security programs for organizations of any size. As of March 14th, I am now officially certified!

US Patent Application Granted in Medical Device Systems

December 2023 +

I co-invented United States Patent #11837356B1 with a team of software, hardware, and biomedical engineers. Our patent covers secure Over-The-Air (OTA) firmware updates to deployed medical devices maintaining functionality and patient safety.

Continuing J.L. Moore Fellow

September 2023 +

I was renewed as a J.L. Moore Fellow by the Computer Science department of California Polytechnic State University at San Luis Obispo. The fellowship provided an additional $12,000 award towards the completion of my Doctoral research.

Publication in USENIX Security

June 2023 +

Our paper on using SAT solving techniques to evaluate information leakage in secure functionalities was accepted for publication in USENIX Security! I presented the work in Anaheim, CA in August. We applied and expanded on our prior USENIX work, Delphinium, to create a tool which can evaluate the privacy (or lack thereof) of functions to be computed in secure protocols such as MPC, FHE, and ZK proofs. Given a function description, our tool will estimate leakage and even generate adversarial inputs to the protocol which maximize information leakage. A version of the paper is available here.

J.L. Moore Fellowship

September 2022 +

The Computer Science department of California Polytechnic State University at San Luis Obispo named me a J.L. Moore Fellow! This fellowship is accompanied by a $10,000 award for my ongoing research and progress through the Doctoral degree.

Publication in the IACR Theory of Cryptography Conference (TCC)

August 2022 +

Our paper on creating One-Time Programs from Commodity Hardware was accepted for publication at TCC 2022. We presented it at the Chicago conference in November. The paper develops cryptographic theory for realizing one-time programs (and therefore powerful cryptographic primitives such as program obfuscation) from commodity hardware -- specifically, implementations including a tamper-resistant hardware counter, which have emerged in commodity systems ranging from iPhones to Intel SGX servers to Apple's iCloud Keychain and Google's Titan HSM-based backup system. A version of the paper is available here.

WIRED Article on iOS App Privacy Reports

January 2022 +

I was quoted in an article by Lily Hay Newman for WIRED on the use and implications of the App Privacy Report feature of iOS 15. In it, I discuss potential indicators of spyware based on the App Privacy Reports, and the relative value of the various sections of the report. The article can be found here.

Publication in the Privacy Enhancing Technologies Symposium (PETS)

November 2021 +

Our Systematization of Knowledge paper SoK: Cryptographic Confidentiality of Data on Mobile Devices was accepted for publication in PETS 2022.1. A pre-print of this work can be found here.

Secure Phones Project Featured in WIRED and Forbes

February 2021 +

Our recent work on the forensic security of mobile devices was featured in WIRED and Forbes! Thank you to Lily Hay Newman and Thomas Brewster for their reporting, and additionally to the DevNews podcast for hosting me and my co-author Tushar to discuss mobile data security and our work.

securephones.io

November 2020 +

I released the full (>100 pages!) version and accompanying website of my report on the security and privacy of data on mobile devices, specifically iOS and Android phones. This work was co-authored by Tushar Jois and my advisor Dr. Green, and more info can be found here.

Interviewed on Voter Suppression Investigation

October 2020 +

I was interviewed by Ted Bridis, who worked the University of Florida College of Journalism and Communications news service, to publish an article on the recent voter suppression campaign executed in Florida. I had performed forensic network analysis to trace the sender(s) of a bulk email which threatened voters in Florida, which turned out to be part of a larger operation reportedly by Iran to seed chaos in the US election. The article can be found here.

Publication in USENIX Security

February 2020 +

Gabrielle Beck and I had our first project under Dr. Green accepted for publication at the USENIX Security Symposium. In this work we delved into emerging constraint programming techniques to automated the development of padding oracle attacks before generalizing our work to arbitrary novel format oracles. The goal of the tool we created is to enable automatic development of end-to-end exploits for Chosen Ciphertext Attacks in order to strengthen arguments for systems to switch to authenticated encryption. Despite being well-accepted, authenticated encryption is neglected by a startling number of systems in production. A version of this work is available here.

Publication in IEEE Global Communications

December 2019 +

Along with two of my professors at Cal Poly, Dr. Bruce DeBruhl and Foaad Khosmood, I developed an ultra-lightweight probabilistic intrusion detection system designed for IoT use cases, and performed end-to-end evaluation using a testbed of real IoT devices. As part of this work, we explored compressing non-cryptographic hash functions and their application to IDS. This work has been accepted for publication at IEEE GLOBECOM 2019. A version of the paper is available here.

Publication in ACM Computer Science Education (SIGCSE)

January 2019 +

Our paper introducing "Fakesbook" was accepted for publication at ACM SIGCSE 2019. Fakesbook is a platform we designed, implemented, and applied to evaluate and teach computer security and privacy concepts to middle and high school students. A version of the paper is available here.

Publication in the Journal of Computing Sciences in Colleges

April 2018 +

Our work on developing, executing, and evaluating an experimental course intersecting technical privacy with policy and critical analysis was accepted for publication at JCSC 2018. This work included an exhaustive survey of almost 300 US ABET-accredited universities to demonstrate need for technical privacy education focused toward Computer Science and CS-adjacent students. A version of the paper is available here.