Computer security researcher
Alexander Sotirov is a computer security researcher. He has been employed by Determina[1] and VMware.[2] In 2012, Sotirov co-founded New York based Trail of Bits[3] with Dino Dai Zovi and Dan Guido, where he currently serves as co-CEO.
He is well known for his discovery of the ANI browser vulnerability[4] as well as the so-called Heap Feng Shui technique[5] for exploiting heap buffer overflows in browsers. In 2008, he presented research at Black Hat showing how to bypass memory protection safeguards in Windows Vista. Together with a team of industry security researchers and academic cryptographers, he published research on creating a rogue certificate authority by using collisions of the MD5 cryptographic hash function[6] in December 2008.
Sotirov is a founder and organizer of the Pwnie awards, was on the program committee of the 2008 Workshop On Offensive Technologies (WOOT '08),[7] and has served on the Black Hat Review Board since 2011.[8]
He was ranked #6 on Violet Blue's list of The Top 10 Sexy Geeks of 2009.[9]
References
External links