Recon2012 - PREVIEW

Recon 2012

Events
Toolbag

Aaron Portnoy

Aaron Portnoy is a security researcher well known for his elemental role in the formation and management of the Zero Day Initiative team at TippingPoint. His background includes discovering 0day vulnerabilities in ubiquitous software, developing tools to aid in these processes, presenting reverse engineering and exploitation research at reputable conferences world-wide, and developing competitions such as Pwn2Own. Aaron has discovered critical vulnerabilities affecting a wide range of vendors including, but not limited to: Microsoft, Adobe, RSA, Novell, Symantec, HP, IBM, Novell, and VMware. He has presented original research in the areas of reverse engineering, fuzzing, exploitation, and vulnerability discovery at conferences such as BlackHat, BlueHat, RSA, CanSecWest, Ekoparty, and RECon. Additionally, Aaron teaches a Reverse Engineering class every Fall at the Polytechnic Institute of NYU, has been an invited speaker at the National Security Agency, and has been referenced in several published books.