翻訳と辞書 |
Alexander Sotirov : ウィキペディア英語版 | Alexander Sotirov
Alexander Sotirov is a computer security researcher. He has been employed by Determina and VMware.〔(【引用サイトリンク】title=VMWare loses top security researcher Sotirov and exec Mulchandani )〕 In 2012, Sotirov co-founded New York based Trail of Bits〔(【引用サイトリンク】title=Trail of Bits: An alliance of #infosec heavyweights )〕 with Dino Dai Zovi and Dan Guido, where he currently serves as Chief Scientist. He is well known for his discovery of the ANI browser vulnerability as well as the so-called Heap Feng Shui technique for exploiting heap buffer overflows in browsers. In 2008, he presented research at Black Hat showing how to bypass memory protection safeguards in Windows Vista. Together with a team of industry security researchers and academic cryptographers, he published research on creating a rogue certificate authority by using collisions of the MD5 cryptographic hash function in December 2008. Sotirov is a founder and organizer of the Pwnie awards, was on the program committee of the 2008 Workshop On Offensive Technologies (WOOT '08), and has served on the Black Hat Review Board since 2011.〔(【引用サイトリンク】title=Black Bat Review Board )〕 He was ranked #6 on Violet Blue's list of The Top 10 Sexy Geeks of 2009.〔(【引用サイトリンク】title=Top10 Sexy Geeks 2009 )〕 == References ==
抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Alexander Sotirov」の詳細全文を読む
スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース |
Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.
|
|