Christien Rioux

"DilDog" redirects here. For Dilbert's dog, see Dogbert.
Christien Rioux
Residence U.S.
Citizenship American
Fields Computer science
Institutions L0pht
@stake
Symantec
Veracode
Alma mater Massachusetts Institute of Technology
Known for Security

Christien Rioux, also known by his handle DilDog,[1] is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder.[2]

Educated at MIT, Rioux was a computer security researcher at L0pht Heavy Industries and then at the company @Stake (later bought by Symantec).[1] While at @stake he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA).[3] He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system.[4]

He is also a member[5] of Cult of the Dead Cow[6] and its Ninja Strike Force. Formerly, he was a member of L0pht.[7][8]

DilDog is best known as the author of the original code for Back Orifice 2000,[6][9][10] an open source remote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow."[11][12]

Security advisories

Significant security advisories that Rioux authored or coauthored include:

Patents

Rioux is the inventor of the following patents:

Music

Christien Rioux is a pianist and music producer, with a stream of original works available on "SoundCloud".  under the name "The Noctem Project". 2012-02-05. Retrieved 2012-02-05. 

References

  1. 1 2 "L0pht in Transition". April 2007. Retrieved May 3, 2007.
  2. Fitzgerald, Michael (2007-04-22). "PROTOTYPE; To Find the Danger, This Software Poses as the Bad Guys". The New York Times. Retrieved 2008-10-28.
  3. "Veracode: Christien Rioux". Retrieved 2009-10-22.
  4. "Christien Rioux, Co-Founder and Chief Scientist". 2006-12-21. Retrieved 2008-10-28.
  5. "Cult of the Dead Cow: Team Bios". Retrieved 2011-04-05.
  6. 1 2 Messmer, Ellen (July 21, 1999). "Bad Rap for Back Orifice 2000?". CNN Online.
  7. Bauer, Mick (September 1, 2002). "Q&A with Chris Wysopal (Weld Pond)". Linux Journal.
  8. Security Scene Errata
  9. Messmer, Ellen, "Hacker group Cult of the Dead Cow tries to convince world its Back Orifice tool is legit," Network World, July 14, 1999. Retrieved April 17, 2007.
  10. cDc communications. "Back Orifice 2000 Press Release." CULT OF THE DEAD COW Press Release, July 10, 1999. Retrieved April 17, 2007.
  11. Dildog, "The Tao of Windows Buffer Overflow," CULT OF THE DEAD COW issue #351, May 1, 1998. Retrieved April 17, 2007.
  12. Park, Yong-Joon and Gyungho Lee, "Repairing return address stack for buffer overflow protection," Proceedings of the 1st conference on Computing frontiers, ACM, 2004. Retrieved April 17, 2007.
This article is issued from Wikipedia - version of the Friday, April 15, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.