Peiter “Mudge” Zatko | |
---|---|
Mudge during his tenure at DARPA
|
|
Born | December 1, 1970 |
Residence | Mountain View, California |
Citizenship | American |
Fields |
Computer Science Public administration Hacker |
Institutions | Google, Motorola, DARPA, L0pht |
Alma mater | Berklee College of Music |
Known for | L0pht, L0phtcrack, DARPA Cyber Fast Track, Testimony to the Senate, CULT OF THE DEAD COW |
Notable awards | Secretary of Defense Exceptional Civilian Service Award, Order of Thor |
Peiter C. Zatko, better known as Mudge, is a network security expert, open source programmer, writer, and a hacker. He was the most prominent member of the high profile hacker think tank the L0pht as well as the long-lived computer and culture hacking cooperative the Cult of the Dead Cow.
While involved with the L0pht, Mudge contributed significantly to disclosure and education on information and security vulnerabilities. In addition to pioneering buffer overflow work, the security advisories he released contained early examples of flaws in the following areas: code injection, race condition, side-channel attack, exploitation of embedded systems, and cryptanalysis of commercial systems. He was the original author of the password cracking software L0phtCrack.
In 2010 Mudge accepted a position as a program manager at DARPA where he oversaw cyber security research. In 2013 Mudge went to work for Google in their Advanced Technology & Projects division.
Born in December 1970, Mudge graduated from the Berklee College of Music at the top of his class and is an adept guitar player.
Mudge was responsible for early research into a type of security vulnerability known as the buffer overflow. In 1995 he published "How to Write Buffer Overflows", one of the first papers on the topic. He published some of the first security advisories and research demonstrating early vulnerabilities in Unix such as code injection, side-channel attacks, and information leaks, and was a leader in the full disclosure movement. He was the initial author of security tools L0phtCrack, AntiSniff, and l0phtwatch.