Christien Rioux

From Wikipedia, the free encyclopedia
  (Redirected from Dildog)
Jump to: navigation, search
"DilDog" redirects here. For Dilbert's dog, see Dogbert.
Christien Rioux
Dystic-dildog.jpg
Sir Dystic and Dildog
Residence Flag of the United States.svg U.S.
Citizenship Flag of the United States.svg American
Fields Computer science
Institutions L0pht
@stake
Symantec
Veracode
Alma mater Massachusetts Institute of Technology
Known for Security

Christien Rioux, also known by his handle DilDog,[1] is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder.[2]

Educated at MIT, Rioux was a computer security researcher at L0pht Heavy Industries and then at the company @Stake (later bought by Symantec).[1] While at @stake he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA).[3] He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system.[4]

He is also a member[5] of Cult of the Dead Cow[6] and its Ninja Strike Force. Formerly, he was a member of L0pht.[7][8]

DilDog is best known as the author of the original code for Back Orifice 2000,[6][9][10] an open source remote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow."[11][12]

Security advisories[edit]

Significant security advisories that Rioux authored or coauthored include:

Patents[edit]

Rioux is the inventor of the following patents:

Music[edit]

Christien Rioux is a pianist and music producer, with a stream of original works available on "SoundCloud".  under the name "The Noctem Project". 2012-02-05. Retrieved 2012-02-05. 

References[edit]

  1. ^ a b "L0pht in Transition". April 2007. Retrieved May 3, 2007. 
  2. ^ Fitzgerald, Michael (2007-04-22). "PROTOTYPE; To Find the Danger, This Software Poses as the Bad Guys". The New York Times. Retrieved 2008-10-28. 
  3. ^ "Veracode: Christien Rioux". Retrieved 2009-10-22. 
  4. ^ "Christien Rioux, Co-Founder and Chief Scientist". 2006-12-21. Retrieved 2008-10-28. 
  5. ^ "Cult of the Dead Cow: Team Bios". Retrieved 2011-04-05. 
  6. ^ a b Messmer, Ellen (July 21, 1999). "Bad Rap for Back Orifice 2000?". CNN Online. 
  7. ^ Bauer, Mick (September 1, 2002). "Q&A with Chris Wysopal (Weld Pond)". Linux Journal. 
  8. ^ Security Scene Errata
  9. ^ Messmer, Ellen, "Hacker group Cult of the Dead Cow tries to convince world its Back Orifice tool is legit," Network World, July 14, 1999. Retrieved April 17, 2007.
  10. ^ cDc communications. "Back Orifice 2000 Press Release." CULT OF THE DEAD COW Press Release, July 10, 1999. Retrieved April 17, 2007.
  11. ^ Dildog, "The Tao of Windows Buffer Overflow," CULT OF THE DEAD COW issue #351, May 1, 1998. Retrieved April 17, 2007.
  12. ^ Park, Yong-Joon and Gyungho Lee, "Repairing return address stack for buffer overflow protection," Proceedings of the 1st conference on Computing frontiers, ACM, 2004. Retrieved April 17, 2007.