Christien Rioux

From Wikipedia, the free encyclopedia
  (Redirected from Dildog)
Jump to: navigation, search
"DilDog" redirects here. For Dilbert's dog, see Dogbert.
Christien Rioux
Residence Flag of the United States.svg U.S.
Citizenship Flag of the United States.svg American
Fields Computer science
Institutions L0pht
Alma mater Massachusetts Institute of Technology
Known for Security

Christien Rioux, also known by his handle DilDog,[1] is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder.[2]

Educated at MIT, Rioux was a computer security researcher at L0pht Heavy Industries and then at the company @Stake (later bought by Symantec).[1] While at @stake he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA).[3] He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system.[4]

He is also a member[5] of Cult of the Dead Cow[6] and its Ninja Strike Force. Formerly, he was a member of L0pht.[7][8]

DilDog is best known as the author of the original code for Back Orifice 2000,[6][9][10] an open source remote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow."[11][12]

Security advisories[edit]

Significant security advisories that Rioux authored or coauthored include:


Rioux is the inventor of the following patents:


Christien Rioux is a pianist and music producer, with a stream of original works available on "SoundCloud".  under the name "The Noctem Project". 2012-02-05. Retrieved 2012-02-05. 


  1. ^ a b "L0pht in Transition". April 2007. Retrieved May 3, 2007. 
  2. ^ Fitzgerald, Michael (2007-04-22). "PROTOTYPE; To Find the Danger, This Software Poses as the Bad Guys". The New York Times. Retrieved 2008-10-28. 
  3. ^ "Veracode: Christien Rioux". Retrieved 2009-10-22. 
  4. ^ "Christien Rioux, Co-Founder and Chief Scientist". 2006-12-21. Retrieved 2008-10-28. 
  5. ^ "Cult of the Dead Cow: Team Bios". Retrieved 2011-04-05. 
  6. ^ a b Messmer, Ellen (July 21, 1999). "Bad Rap for Back Orifice 2000?". CNN Online. 
  7. ^ Bauer, Mick (September 1, 2002). "Q&A with Chris Wysopal (Weld Pond)". Linux Journal. 
  8. ^ Security Scene Errata
  9. ^ Messmer, Ellen, "Hacker group Cult of the Dead Cow tries to convince world its Back Orifice tool is legit," Network World, July 14, 1999. Retrieved April 17, 2007.
  10. ^ cDc communications. "Back Orifice 2000 Press Release." CULT OF THE DEAD COW Press Release, July 10, 1999. Retrieved April 17, 2007.
  11. ^ Dildog, "The Tao of Windows Buffer Overflow," CULT OF THE DEAD COW issue #351, May 1, 1998. Retrieved April 17, 2007.
  12. ^ Park, Yong-Joon and Gyungho Lee, "Repairing return address stack for buffer overflow protection," Proceedings of the 1st conference on Computing frontiers, ACM, 2004. Retrieved April 17, 2007.