Peiter Zatko

Peiter “Mudge” Zatko

Mudge during his tenure at DARPA
Born (1970-12-01) December 1, 1970
Residence Mountain View, California
Citizenship American
Fields Computer Science
Public administration
Hacker
Institutions Google, Motorola, DARPA, L0pht
Alma mater Berklee College of Music
Known for L0pht, L0phtcrack, DARPA Cyber Fast Track, Testimony to the Senate, CULT OF THE DEAD COW
Notable awards Secretary of Defense Exceptional Civilian Service Award, Order of Thor

Peiter C. Zatko, better known as Mudge, is a network security expert, open source programmer, writer, and a hacker. He was the most prominent member of the high profile hacker think tank the L0pht[1] as well as the long-lived computer and culture hacking cooperative the Cult of the Dead Cow.

While involved with the L0pht, Mudge contributed significantly to disclosure and education on information and security vulnerabilities. In addition to pioneering buffer overflow work, the security advisories he released contained early examples of flaws in the following areas: code injection, race condition, side-channel attack, exploitation of embedded systems, and cryptanalysis of commercial systems. He was the original author of the password cracking software L0phtCrack.[2]

In 2010 Mudge accepted a position as a program manager at DARPA where he oversaw cyber security research.[3] In 2013 Mudge went to work for Google in their Advanced Technology & Projects division.[4][5]

Biography

Born in December 1970, Mudge graduated from the Berklee College of Music at the top of his class[6] and is an adept guitar player.

Mudge was responsible for early research into a type of security vulnerability known as the buffer overflow. In 1995 he published "How to Write Buffer Overflows", one of the first papers on the topic.[7] He published some of the first security advisories and research demonstrating early vulnerabilities in Unix such as code injection, side-channel attacks, and information leaks, and was a leader in the full disclosure movement. He was the initial author of security tools L0phtCrack, AntiSniff, and l0phtwatch.

Mudge was one of the first people from the hacker community to reach out and build relationships with government and industry. In demand as a public speaker, he spoke at hacker conferences such as DEF CON[8] and academic conferences such as USENIX.[9] Mudge has also been a member of Cult of the Dead Cow since 1996.[10]

He was one of the seven L0pht members who testified before a Senate committee in 1998 about the serious vulnerabilities of the Internet at that time.[11] The L0pht became the computer security consultancy @stake in 1999, and Mudge became the vice president of research and development and later chief scientist.[12]

In 2000, after the first crippling Internet distributed denial-of-service attacks, he was invited to meet with President Bill Clinton at a security summit alongside cabinet members and industry executives.[13]

In 2004 he became a division scientist at government contractor BBN Technologies,[14] where he originally worked in the 1990s, and also joined the technical advisory board of NFR Security.[15] In 2010, it was announced that he would be project manager of a DARPA project focused on directing research in cyber security.[16] In 2013 he announced that he would leave DARPA for a position at Google ATAP.[5][17] In 2015 Zatko announced on Twitter he would join a project called #CyberUL, a testing organisation for computer security inspired by Underwriters Laboratories, mandated by the White House.[18]

On 11 August 2007 he married Sarah Lieberman, a co-worker at BBN.

DARPA

At DARPA he created the Cyber Analytical Framework the agency used to evaluate DoD investments in offensive and defensive cyber security. During his tenure he ran at least three DoD programs known as Military Networking Protocol (MNP), Cyber-Insider Threat (CINDER), and Cyber Fast Track (CFT).

Military Networking Protocol (MNP) - Provided network prioritization with full user-level attribution for military computer networks.[19]

Cyber-Insider Threat (CINDER) - Focused on identifying cyber espionage conducted by virtual insider threats such as future variants of Stuxnet or Duqu. CINDER is often mistakenly associated with Wikileaks in the media.[20][21] This is possibly due to the confusion between DARPA programs focused on identifying human insider threat such as ADAMS [22] and the identification of software espionage posed by malware in the CINDER program.[23] This issue was clarified by Mudge in his Defcon 2011 keynote at 46 minutes and 11 seconds into the talk.[24]

Cyber Fast Track (CFT) - Provided resources and funding to security research, including programs run by hackers, hackerspaces, and makerlabs. The program provided an alternative to traditional government contracting vehicles that was accessible to individuals and small companies previously unable to work within the cumbersome and complicated DARPA process. The novel contracting effort had an averaging time of 7 days from receipt of proposal to funding being provided to the proposing research organization.[25] The program was initially announced at Shmoocon during his 2011 keynote.

Awards

Refereed papers

L0pht Security Advisories and Software

Mudge published numerous papers and advisories detailing security problems across different applications and operating systems and was a pioneering champion of full disclosure.

References

  1. Security Scene Errata Archived 2 May 2005 at the Wayback Machine.
  2. L0phtCrack]
  3. Hacker Mudge Gets DARPA Job
  4. Peiter “Mudge” Zatko To Join Motorola Mobility’s Advanced Technology & Projects (ATAP)
  5. 1 2 , Mudge goes to Google, retr 2013 4 12
  6. Berklee College Peiter Zatko
  7. How to Write Buffer Overflows
  8. DEF CON V Archives
  9. An Interview with Mudge
  10. CULT OF THE DEAD COW Team Bio
  11. U.S. Senate Press Release: HEARINGS ANNOUNCED ON COMPUTER SECURITY FAILURES IN GOVERNMENT
  12. The L0pht, renowned 'hacker think-tank,' becomes @stake
  13. Clinton fights hackers, with a hacker. Archived 10 September 2005 at the Wayback Machine.
  14. Hacker 'Mudge' Returns to BBN
  15. NFR Security Adds Leading Security Industry Experts to Technology Advisory Board
  16. Hacker 'Mudge' gets DARPA job
  17. , Google goes DARPA, retr 2014 9 27
  18. , Famed Security Researcher Mudge Leaves Google, retr 2015 7 2
  19. Military Networking Protocol, retr 2012 2 12
  20. Darpa's Star Hacker Looks to WikiLeak-Proof Pentagon, Spencer Ackerman, Wired, August 31, 2010, retr 2012 2 12
  21. An Interview with WikiLeaks' Julian Assange, Andy Greenberg, Forbes, November 29, 2010
  22. Anomaly Detection at Multiple Scales, retr 2012 2 12
  23. Cyber Insider Threat, retr 2012 2 12
  24. BlackHat USA 2011 Keynote, retr 2012 2 12
  25. New Fast Track Program Okays Hacker Projects in Just Seven Days, Dawn Lim, Wired Magazine, November 14, 2011, retr 2012 2 12
  26. Mudge receives Office of SecDef highest non-career civilian award
  27. SC Magazine Top 5 Influential IT Security Thinkers of 2011, Angela Moscaritolo, December 1, 2011, retr 2012 2 12
  28. , BBN Press Release, October 15, 2007, retr 2014 9 27
  29. Crontab buffer overflow vulnerabilities, Oct 2001
  30. Initial Cryptanalysis of the RSA SecurID Algorithm
  31. NMRC L0pht Antisniff Product Review
  32. L0pht Advisory: initscripts-4.48-1 RedHat Linux 6.1
  33. L0pht Advisory: Cactus Software de-obfuscate and retrieve shell code
  34. /bin/su timing vulnerability
  35. l0phtwatch Advisory
  36. NT Password Appraiser hash disclosure
  37. IFS trojan path vulnerability
  38. FORTH Hacking on Sparc Hardware
  39. Vulnerabilities in Rational Systems source control system
  40. Imap core dump information disclosure
  41. Vulnerabilities in Microsoft password encryption
  42. Solaris 2.5 libc exploitation
  43. modstat group kmem overflow
  44. L0pht Kerberos 4 remote memory leak
  45. Sendmail 8.7.5 GECOS buffer overflow vulnerability
  46. remote inventory via test-cgi vulnerability
  47. Weaknesses in the SecurID (RSA Token) authentication system
  48. S/Key password cracker
This article is issued from Wikipedia - version of the 12/3/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.