Jump to content

Christien Rioux

From Wikipedia, the free encyclopedia
Christien Rioux
Citizenship American
Alma materMassachusetts Institute of Technology
Known forSecurity
Scientific career
FieldsComputer science
InstitutionsL0pht
@stake
Symantec
Veracode

Christien Rioux, also known by his handle DilDog,[1] is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder.[2]

Educated at MIT, Rioux was a computer security researcher at L0pht Heavy Industries and then at the company @stake (later bought by Symantec).[1] While at @stake, he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA).[3] He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system.[4]

He is also a member[5] of Cult of the Dead Cow[6] and its Ninja Strike Force. Formerly, he was a member of L0pht.[7][8]

DilDog is best known as the author of the original code for Back Orifice 2000,[6][9][10] an open source remote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow."[11][12]

References

[edit]
  1. ^ a b "L0pht in Transition". April 2007. Archived from the original on April 29, 2007. Retrieved May 3, 2007.
  2. ^ Fitzgerald, Michael (2007-04-22). "PROTOTYPE; To Find the Danger, This Software Poses as the Bad Guys". The New York Times. Retrieved 2008-10-28.
  3. ^ "Veracode: Christien Rioux". Archived from the original on 2008-02-04. Retrieved 2009-10-22.
  4. ^ "Christien Rioux, Co-Founder and Chief Scientist". 2006-12-21. Retrieved 2008-10-28.
  5. ^ "Cult of the Dead Cow: Team Bios". Archived from the original on 2006-04-17. Retrieved 2011-04-05.
  6. ^ a b Messmer, Ellen (July 21, 1999). "Bad Rap for Back Orifice 2000?". CNN Online.
  7. ^ Bauer, Mick (September 1, 2002). "Q&A with Chris Wysopal (Weld Pond)". Linux Journal.
  8. ^ Security Scene Errata Archived May 2, 2005, at the Wayback Machine
  9. ^ Messmer, Ellen (1999-07-14). "Hacker group Cult of the Dead Cow tries to convince world its Back Orifice tool is legit". Network World. Archived from the original on 2007-11-05. Retrieved 2007-04-17.
  10. ^ cDc communications. "Back Orifice 2000 Press Release Archived 2005-03-05 at the Wayback Machine." CULT OF THE DEAD COW Press Release, July 10, 1999. Retrieved April 17, 2007.
  11. ^ Dildog, "The Tao of Windows Buffer Overflow," CULT OF THE DEAD COW issue #351, May 1, 1998. Retrieved April 17, 2007.
  12. ^ Park, Yong-Joon and Gyungho Lee, "Repairing return address stack for buffer overflow protection," Proceedings of the 1st conference on Computing frontiers, ACM, 2004. Retrieved April 17, 2007.