Christien Rioux

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by K.e.coffman (talk | contribs) at 05:14, 16 October 2016 (Mv to talk for storage (ext links)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Christien Rioux
Citizenship American
Alma materMassachusetts Institute of Technology
Known forSecurity
Scientific career
FieldsComputer science
InstitutionsL0pht
@stake
Symantec
Veracode

Christien Rioux, also known by his handle DilDog,[1] is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder.[2]

Educated at MIT, Rioux was a computer security researcher at L0pht Heavy Industries and then at the company @Stake (later bought by Symantec).[1] While at @stake he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA).[3] He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system.[4]

He is also a member[5] of Cult of the Dead Cow[6] and its Ninja Strike Force. Formerly, he was a member of L0pht.[7][8]

DilDog is best known as the author of the original code for Back Orifice 2000,[6][9][10] an open source remote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow."[11][12]

References

  1. ^ a b "L0pht in Transition". April 2007. Retrieved May 3, 2007.
  2. ^ Fitzgerald, Michael (2007-04-22). "PROTOTYPE; To Find the Danger, This Software Poses as the Bad Guys". The New York Times. Retrieved 2008-10-28.
  3. ^ "Veracode: Christien Rioux". Retrieved 2009-10-22.
  4. ^ "Christien Rioux, Co-Founder and Chief Scientist". 2006-12-21. Retrieved 2008-10-28.
  5. ^ "Cult of the Dead Cow: Team Bios". Retrieved 2011-04-05.
  6. ^ a b Messmer, Ellen (July 21, 1999). "Bad Rap for Back Orifice 2000?". CNN Online.
  7. ^ Bauer, Mick (September 1, 2002). "Q&A with Chris Wysopal (Weld Pond)". Linux Journal.
  8. ^ Security Scene Errata
  9. ^ Messmer, Ellen, "Hacker group Cult of the Dead Cow tries to convince world its Back Orifice tool is legit," Network World, July 14, 1999. Retrieved April 17, 2007.
  10. ^ cDc communications. "Back Orifice 2000 Press Release." CULT OF THE DEAD COW Press Release, July 10, 1999. Retrieved April 17, 2007.
  11. ^ Dildog, "The Tao of Windows Buffer Overflow," CULT OF THE DEAD COW issue #351, May 1, 1998. Retrieved April 17, 2007.
  12. ^ Park, Yong-Joon and Gyungho Lee, "Repairing return address stack for buffer overflow protection," Proceedings of the 1st conference on Computing frontiers, ACM, 2004. Retrieved April 17, 2007.