Alexander Sotirov | |
---|---|
![]() Alexander Sotirov | |
Born | |
Other names | Alex Sotirov |
Citizenship | United States, Bulgaria |
Alma mater | University of Alabama |
Known for | Pwnie award organizer, Black Hat Briefings Review Board Member |
Scientific career | |
Fields | Computer Science |
Alexander Sotirov is a computer security researcher. He has been employed by Determina [1] and VMware. [2] In 2012, Sotirov co-founded New York based Trail of Bits [3] with Dino Dai Zovi and Dan Guido, where he currently serves as co-CEO.
He is well known for his discovery of the ANI browser vulnerability [4] as well as the so-called Heap Feng Shui technique [5] for exploiting heap buffer overflows in browsers. In 2008, he presented research at Black Hat showing how to bypass memory protection safeguards in Windows Vista. Together with a team of industry security researchers and academic cryptographers, he published research on creating a rogue certificate authority by using collisions of the MD5 cryptographic hash function [6] in December 2008.
Sotirov is a founder and organizer of the Pwnie awards, was on the program committee of the 2008 Workshop On Offensive Technologies (WOOT '08), [7] and has served on the Black Hat Review Board since 2011. [8]
He was ranked #6 on Violet Blue's list of The Top 10 Sexy Geeks of 2009. [9]
Alexander Sotirov | |
---|---|
![]() Alexander Sotirov | |
Born | |
Other names | Alex Sotirov |
Citizenship | United States, Bulgaria |
Alma mater | University of Alabama |
Known for | Pwnie award organizer, Black Hat Briefings Review Board Member |
Scientific career | |
Fields | Computer Science |
Alexander Sotirov is a computer security researcher. He has been employed by Determina [1] and VMware. [2] In 2012, Sotirov co-founded New York based Trail of Bits [3] with Dino Dai Zovi and Dan Guido, where he currently serves as co-CEO.
He is well known for his discovery of the ANI browser vulnerability [4] as well as the so-called Heap Feng Shui technique [5] for exploiting heap buffer overflows in browsers. In 2008, he presented research at Black Hat showing how to bypass memory protection safeguards in Windows Vista. Together with a team of industry security researchers and academic cryptographers, he published research on creating a rogue certificate authority by using collisions of the MD5 cryptographic hash function [6] in December 2008.
Sotirov is a founder and organizer of the Pwnie awards, was on the program committee of the 2008 Workshop On Offensive Technologies (WOOT '08), [7] and has served on the Black Hat Review Board since 2011. [8]
He was ranked #6 on Violet Blue's list of The Top 10 Sexy Geeks of 2009. [9]