{"id":5120,"date":"2018-05-18T01:31:29","date_gmt":"2018-05-18T01:31:29","guid":{"rendered":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120"},"modified":"2018-05-22T13:35:05","modified_gmt":"2018-05-22T13:35:05","slug":"the-rhodes-to-success","status":"publish","type":"post","link":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120","title":{"rendered":"The Rhodes to success"},"content":{"rendered":"<p><a href=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2018\/05\/IMG_6594.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-5310\" src=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2018\/05\/IMG_6594.jpg\" alt=\"Matthew Rodgers\" width=\"1000\" height=\"667\" \/><\/a>While other teenagers were spending summer break lounging by the pool or working summer jobs, Matthew Rogers was meticulously dissecting a malware program developed by a foreign adversary.<\/p>\n<p>For some people, scanning line after line of code from the confines of a Huntsville office building may epitomize monotony, but it represented a massive opportunity for the 17-year-old computer whiz.<\/p>\n<p>Tasked with reverse-engineering the malware program, Rogers knew he was in for a daunting challenge. Although the malware had been flagged by antivirus software, unraveling its true intent was proving difficult due to layers of obfuscation. It didn\u2019t help matters that the code was barely decipherable to the human eye.<\/p>\n<p>It was 2014, and Rogers and three friends were the first high school interns ever hired by the Huntsville-based science and technology firm Dynetics. Honestly, not much was expected of them when they were assigned the project.<\/p>\n<p>\u201cOur supervisors said, \u2018OK, well go at it. We don\u2019t really expect you guys to finish. This is kind of a test run,\u2019\u201d Rogers recalled.<\/p>\n<div class=\"video-container\" style=\"margin-bottom: 15px;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/eVmgrdzV1wE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p>But over the course of a month, Rogers and his fellow interns reverse-engineered the entire program, writing more than 3,000 comments and renaming every method, variable and function in the code. They even created a command-and-control server and set up a demo where they infected a computer with the malware.<\/p>\n<p>Using a technique known as static hashing, the malware that he and his team reverse-engineered was even able to evade antivirus software programs, providing valuable information for research in this area.<\/p>\n<p>Perhaps then, it is no surprise that Rogers is primed for a big future in cybersecurity. Now 21 years old, he graduated from Auburn a year early with a perfect GPA, a bachelor\u2019s degree in software engineering and a plethora of experience as an undergraduate research assistant, co-founder of Auburn\u2019s Ethical Hacking Club and Honors College student.<\/p>\n<p>An impressive body of work, no doubt. But if you ask Rogers, he will tell you his biggest achievement is his recent selection for the prestigious Rhodes Scholarship. As a 2018 Rhodes Scholar, Rogers will head to England this fall to pursue a Doctor of Philosophy degree in the University of Oxford\u2019s renowned cybersecurity program.<\/p>\n<p>Following a rigorous application and interview process, he was one of only 32 American students selected for the honor from a pool of nearly 900 nominees.<\/p>\n<p>\u201cI think I was in a state of shock for about three weeks afterward,\u201d Rogers said.<\/p>\n<p>Rogers plans to use his education at Auburn and Oxford as a springboard to \u201cusher in a new generation that can produce the cyber security research, and policy, necessary to prevent our globally connected society from falling apart.\u201d<\/p>\n<p><strong><a href=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2018\/05\/Rhodes-graphic.jpg\"><img loading=\"lazy\" class=\"alignright wp-image-5506\" src=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2018\/05\/Rhodes-graphic.jpg\" alt=\"Rhodes Scholars\" width=\"400\" height=\"208\" \/><\/a>BECOMING A CYBER WARRIOR<\/strong><\/p>\n<p><b><\/b>Rogers first became interested in cybersecurity when one of his high school buddies convinced him to take part in CyberPatriot\u2019s National Youth Cyber Defense Competition, which challenges students to find cybersecurity vulnerabilities and defend a network against professional aggressors.<\/p>\n<p>Rogers joined his friends on Grissom High School\u2019s CyberPatriot team, and they exceeded their wildest expectations by placing second in the nation.<\/p>\n<p>It was that experience that led to them becoming the first high school-aged interns Dynetics had ever hired. In addition to reverse-engineering the aforementioned malware program, Rogers\u2019 experience at Dynetics also provided him with the opportunity to develop other malware analysis tools.<\/p>\n<p>When it came time for Rogers to choose a college, he was drawn to Auburn because of its software engineering program\u2019s strong reputation.<\/p>\n<p>\u201cWhat I think I\u2019ve enjoyed the most about Auburn is the freedom to start groups like the Ethical Hacking Club,\u201d he said. \u201cI just don\u2019t think I would have had the same autonomy to start those kinds of clubs at other schools and have the same freedom that I currently do.\u201d<\/p>\n<p>The Ethical Hacking Club has brought students from across campus into the cybersecurity arena. Each week, the club gathers to discuss software vulnerabilities and assess the vulnerability of pieces of hardware and software.<\/p>\n<p>Rogers has also taken his learning experiences beyond the classroom by participating in the Undergraduate Research Fellows program. Working alongside Auburn Engineering faculty, Rogers has conducted research on the Internet of Things and developed new uses for Trusted Platform Module crypto-processors.<\/p>\n<p>\u201cMatthew\u2019s accomplishments at this stage in his career are really pretty remarkable,\u201d said David Umphress, director of the Auburn Cyber Research Center and Rogers\u2019 faculty advisor. \u201cIt would almost be easier to list the things he hasn\u2019t achieved because they are so few. I think a lot of our students are rock stars, but when you talk about the rock star of the rock stars, that\u2019s what Matthew is.\u201d<\/p>\n<p><strong>LOOKING TO THE FUTURE<\/strong><\/p>\n<p><b><\/b>The protection of data and financial assets has always been of paramount concern for information security professionals, but cybersecurity\u2019s broader geopolitical implications are beginning to come into view.<\/p>\n<p>Whether it is the Kremlin using cyber assets to meddle in Western democracies or North Korea\u2019s hacker army stealing money to offset the effects of sanctions against its regime, cybersecurity concerns are now an integral part of international relations.<\/p>\n<p>\u201cOne of the main things that interested me about the University of Oxford program is that it looks at cybersecurity from a multidisciplinary perspective,\u201d Rogers said. \u201cIt\u2019s not just about the technical aspect, but when you take a step back, you see the role it has in international relations and politics, and it\u2019s kind of thrown a loop into how we consider our negotiations with all these other countries.\u201d<\/p>\n<p>From a national security perspective, Rogers is interested in ensuring our critical infrastructure remains protected in cyberspace. With the increasing integration of computer networks with infrastructure operations, a bad actor in cyberspace could cause real damage to national infrastructure, such as the water supply or the power grid. Rogers wants to prevent that, in part by securing industrial control systems and supervisory control and data acquisition systems.<\/p>\n<p>Upon finishing his doctorate, Rogers aims to work in a position where he can engage in technical research but also have a hand in shaping policy. He believes his education at Auburn and Oxford will allow him to achieve that, even though the field is always evolving.<\/p>\n<p>\u201cThere\u2019s always something new to learn and that\u2019s why I like computers and working with them,\u201d he said. \u201cThe field is constantly moving a million miles a minute.\u201d<\/p>\n<p>Addressing the challenges of an ever-changing cyber world will be no easy feat. But neither was reverse-engineering a malware program at the age of 17. Rogers has proven he is up for the challenge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While other teenagers were spending summer break lounging by the pool or working summer jobs, Matthew Rogers was meticulously dissecting a malware program developed by a foreign adversary. For some people, scanning line after line of code from the confines of a Huntsville office building may epitomize monotony, but it [&hellip;]<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Rhodes to success &raquo; Auburn Engineer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Rhodes to success &raquo; Auburn Engineer\" \/>\n<meta property=\"og:description\" content=\"While other teenagers were spending summer break lounging by the pool or working summer jobs, Matthew Rogers was meticulously dissecting a malware program developed by a foreign adversary. For some people, scanning line after line of code from the confines of a Huntsville office building may epitomize monotony, but it [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120\" \/>\n<meta property=\"og:site_name\" content=\"Auburn Engineer\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-18T01:31:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-22T13:35:05+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2018\/05\/IMG_6594.jpg\" \/>\n<meta name=\"author\" content=\"Chris Anthony\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Anthony\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120\",\"url\":\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120\",\"name\":\"The Rhodes to success &raquo; Auburn Engineer\",\"isPartOf\":{\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website\"},\"datePublished\":\"2018-05-18T01:31:29+00:00\",\"dateModified\":\"2018-05-22T13:35:05+00:00\",\"author\":{\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e\"},\"breadcrumb\":{\"@id\":\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Rhodes to success\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website\",\"url\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/\",\"name\":\"Auburn Engineer\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e\",\"name\":\"Chris Anthony\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g\",\"caption\":\"Chris Anthony\"},\"url\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?author=36\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Rhodes to success &raquo; Auburn Engineer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120","og_locale":"en_US","og_type":"article","og_title":"The Rhodes to success &raquo; Auburn Engineer","og_description":"While other teenagers were spending summer break lounging by the pool or working summer jobs, Matthew Rogers was meticulously dissecting a malware program developed by a foreign adversary. For some people, scanning line after line of code from the confines of a Huntsville office building may epitomize monotony, but it [&hellip;]","og_url":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120","og_site_name":"Auburn Engineer","article_published_time":"2018-05-18T01:31:29+00:00","article_modified_time":"2018-05-22T13:35:05+00:00","og_image":[{"url":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2018\/05\/IMG_6594.jpg"}],"author":"Chris Anthony","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chris Anthony","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120","url":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120","name":"The Rhodes to success &raquo; Auburn Engineer","isPartOf":{"@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website"},"datePublished":"2018-05-18T01:31:29+00:00","dateModified":"2018-05-22T13:35:05+00:00","author":{"@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e"},"breadcrumb":{"@id":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=5120#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ecm.eng.auburn.edu\/wp\/emag"},{"@type":"ListItem","position":2,"name":"The Rhodes to success"}]},{"@type":"WebSite","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website","url":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/","name":"Auburn Engineer","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e","name":"Chris Anthony","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g","caption":"Chris Anthony"},"url":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?author=36"}]}},"_links":{"self":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts\/5120"}],"collection":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5120"}],"version-history":[{"count":9,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts\/5120\/revisions"}],"predecessor-version":[{"id":5508,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts\/5120\/revisions\/5508"}],"wp:attachment":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}