Sassaman at the 27th Chaos Communication Congress.
|Died||July 3, 2011 (aged 31)|
|Cause of death||Suicide|
|Known for||Mixmaster, X.509 attacks|
|Spouse(s)||Meredith L. Patterson (Married 2006)|
Early life and education
Sassaman graduated from The Hill School in 1998.
Sassaman was employed as the security architect and senior systems engineer for Anonymizer. He was a PhD candidate at the Katholieke Universiteit Leuven in Belgium, as a researcher with the Computer Security and Industrial Cryptography (COSIC) research group, led by Bart Preneel. David Chaum and Bart Preneel were his advisors.
Sassaman was a well-known cypherpunk, cryptographer and privacy advocate. He worked for Network Associates on the PGP encryption software, was a member of the Shmoo Group, a contributor to the OpenPGP IETF working group, the GNU Privacy Guard project, and frequently appeared at technology conferences like DEF CON. Sassaman was the co-founder of CodeCon along with Bram Cohen, co-founder of the HotPETS workshop (with Roger Dingledine of Tor and Thomas Heydt-Benjamin), co-author of the Zimmermann–Sassaman key-signing protocol, and at the age of 21, was an organizer of the protests following the arrest of Russian programmer Dmitry Sklyarov.
On February 11, 2006, at the fifth CodeCon, Sassaman proposed to returning speaker and noted computer scientist Meredith L. Patterson during the Q&A after her presentation, and they were married. The couple worked together on several research collaborations, including a critique of privacy flaws in the OLPC Bitfrost security platform, and a proposal of formal methods of analysis of computer insecurity in February 2011.
Meredith Patterson's current startup, Osogato, aims to commercialize Patterson's Support Vector Machine-based "query by example" research. Sassaman and Patterson announced Osogato's first product, a downloadable music recommendation tool, at SuperHappyDevHouse 21 in San Francisco.
In 2009, Dan Kaminsky presented joint work with Sassaman and Patterson at Black Hat in Las Vegas, showing multiple methods for attacking the X.509 certificate authority infrastructure. Using these techniques, the team demonstrated how an attacker could obtain a certificate that clients would treat as valid for domains the attacker did not control.
- McCullagh, Declan; Benner, Jeffrey (24 July 2001). "Sklyarov Release in Feds' Hands". Wired.
- Slutsky, Irina (11 December 2008). "Len Sassaman & Meredith Patterson are CodeCon Valentines". GeekEntertainment.TV – via YouTube.
- Barras, Colin (5 June 2008). "Laptops could Betray Users in the Developing World". New Scientist (2659).(registration required)
- Sassaman, Len; Patterson, Meredith L. (February 17, 2011). "Towards a formal theory of computer insecurity: a language-theoretic approach" (Flash video). Institute for Security, Technology and Society, Dartmouth College.
- Goodin, Dan (30 July 2009). "Wildcard certificate spoofs web authentication - SSL felled by null string". The Register.
- Rodney. "Dan Kaminsky Feels a disturbance in The Internet". Semiaccurate.com.
- l33tdawg (3 July 2011). "RIP: Len Sassaman, crypto expert and privacy advocate". Hack In The Box SecNews.
- Orlowski, Andrew (July 6, 2011). "Cryptographer Len Sassaman, RIP". The Register. Retrieved 2013-10-27.
- maradydd (Meredith Patterson) (3 July 2011). "Len Sassaman has passed away". Hacker News, YCombinator.com.
- Patterson, Meredith L (3 July 2011). "@wimremes unfortunately, it is. I got the call from the Leuven police about three hours ago. (I'm in TX visiting family at the moment.)". Twitter.com.
- Kaminsky, Dan (August 4, 2011). "Black Ops of TCP/IP 2011". pp. 12–16.
|Wikimedia Commons has media related to Len Sassaman.|