Titre:hector marco gisbert - lecturer and cybersecurity researcher
La description :hector marco, phd lecturer and cybersecurity researcher resume : [hector marco cv] current : lecturer and cybersecurity researcher at uws contact : hmarco hmarco [pgp pub key] keywords : security, vir...
Classement Alexa Global: # 13,315,332
Server:Apache...
L'adresse IP principale: 217.70.180.151,Votre serveur France,Paris
ISP:Gandi SAS TLD:org Code postal:fr
Ce rapport est mis à jour en 01-Aug-2018
Created Date:
2013-03-01
Données techniques du hmarco.org
Geo IP vous fournit comme la latitude, la longitude et l'ISP (Internet Service Provider) etc. informations.
Notre service GeoIP a trouvé l'hôte hmarco.org.Actuellement, hébergé dans France et son fournisseur de services est Gandi SAS .
Les informations d'en-tête HTTP font partie du protocole HTTP que le navigateur d'un utilisateur envoie à appelé Apache contenant les détails de ce que le navigateur veut et acceptera de nouveau du serveur Web.
MX preference = 50, mail exchanger = fb.mail.gandi.net. MX preference = 10, mail exchanger = spool.mail.gandi.net.
ipv4:
IP:217.70.180.151 ASN:29169 OWNER:GANDI-AS Domain name registrar - http: Country:www.gandi.net, FR
ipv6:
2001:4b98:dc0:950::151//29169//GANDI-AS Domain name registrar - http://www.gandi.net, FR//FR
HtmlToText
hector marco, phd lecturer and cybersecurity researcher resume : [hector marco cv] current : lecturer and cybersecurity researcher at uws contact : hmarco hmarco [pgp pub key] keywords : security, virtualization, kernel programming, assembler, arm, i386, x86_64, sparcv8, mips my name is hector marco-gisbert, i received the ph.d. degree in computer science, cybersecurity in 2015 at upv university. initially, i participated in several research projects where the main goal was to develop an hypervisor for the next generation of space crafts for the esa (european space agency). i contributed to extend the scope of the projects to include security aspects using the mils (multiple independent levels of security/safety) architecture. currently, i am a lecturer in cybersecurity and virtualisation at the university of the west of scotland (uws). my research aims to identify and thwart critical security threats focusing on servers and smartphone platforms. my interests includes study and design new low level attacks and protection mechanisms. i revisited mature and well known techniques, as ssp (stack smashing protection) and aslr (address space layout randomization), and i was able to make substantial contributions like renewssp and aslr-ng. i also received awards and recognitions from google and packet storm security for my security contributions to the linux kernel. recent activity aslr-ng renew ssp back to 28: grub 0-day amd aslr weakness offset2lib aslr attack cybersecurity cve's attacks exploits defences virtualisation nexx hypervisor stp partition diversification others cybersecurity.upv.es renewssp (patent) education 2015 phd in computer science, cybersecurity upv 2010 master's degree, industrial computing and control systems upv 2009 bachelor of science in computer science upv dissertation title : cybersecurity protection techniques to mitigate memory errors exploitation advisor : prof. ismael ripoll ripoll my thesis proposes practical and effective protection techniques that have been tested in real systems. i have developed renewssp , a modified ssp which prevents brute force attacks against the ssp on forking servers. also i have showed multiple weaknesses regarding current ssp design in android, which enabled me to design a new ssp named sspmd . my proposal addresses all security issues caused by the android architecture. regarding the aslr, i have questioned the classic memory process memory model, and a new memory layout model has been proposed, which in turn allowed me to redesign the existing aslr technique. aslr next generation ( aslr-ng ) is optimal in the sense that it provides maximum entropy for the memory layout that the mmu supports and includes a novel solution to solve fragmentation. professional background 2016 - present lecturer and cybersecurity researcher at uws , united kingdom 2009 - 2016 cybersecurity researcher at upv , spain 2014 - 2014 researcher visitor at czech technical university at cvut , prague 2007 - 2009 researcher fellow at upv , spain honors and awards date rewarded by description jul. 2016 ibm corp. aslr for linux s390 mar. 2016 google inc. aslr improvement - unlimiting the stack not longer disables aslr sep. 2015 google inc. aslr improvement - fix of the offset2lib weakness aug. 2015 google inc. aslr x86_64 improvement - stack randomization jul. 2015 google inc. amd bulldozer aslr improvement - per boot randomization apr. 2014 packet storm security offset2lib: bypassing full aslr on 64bit linux patents title : renew stack smashing protector (renewssp) inventors : hector marco & ismael ripoll date : august 2013 status : patentability analysis publications return-to-csu: a new method to bypass 64-bit linux aslr [html] héctor marco and ismael ripoll. black hat asia 2018, march 2018. abusing luks to hack the system [+info] héctor marco and ismael ripoll. in-depth security conference 2016 europe, (deepsec 2016). exploiting linux and pax aslr's weaknesses on 32-bit and 64-bit systems [html] héctor marco and ismael ripoll. black hat asia 2016, march-april 2016. bypassing trusted code: hacking grub [html] héctor marco and ismael ripoll. ix jornadas stic ccn-cert, november 2015. on the effectiveness of full-aslr on 64-bit linux [+info] héctor marco and ismael ripoll. in-depth security conference 2014 europe, (deepsec 2014). on the effectiveness of nx, ssp, renewssp and aslr against stack buffer overflows [pdf] héctor marco and ismael ripoll. the 13th ieee international symposium on network computing and applications (ieee nca14) preventing memory error exploitation through emulation-based processor diversification [book] héctor marco, ismael ripoll, juan-carlos ruiz and david de andrés. emerging trends in ict security, 1st edition (ict 2013) preventing brute force attacks against stack canary protection on networking servers [pdf] héctor marco and ismael ripoll. the 12th ieee international symposium on network computing and applications (ieee nca13) preventing memory errors in networked vehicle services through diversification [pdf] héctor marco, juan-carlos ruiz, david de andrés and ismael ripoll. proceedings of workshop cars (2nd workshop on critical automotive applications: robustness & safety) of the 32nd international conference on computer safety, reliability and security. (safecomp 2013) code vulnerability analysis published attacks date attack name description platform 2018 return-to-csu exploit and ropper patch soon. [black hat white paper] 32/64-bit linux 2014 offset2lib bypass 64-bit aslr in < 1 second 32/64-bit linux to be pub. jmp2non-ssp bypass the ssp 32/64-bit linux published protection techniques date name description attack mitigated 2016 aslr-ng address space layout next generation offset2lib attack 2013 renewssp a modification of the stack smashing protector ssp brute force attacks published exploits date vendor description platform download 2015 glibc <= 2.22.90 bypass pointer mangle protection. linux [ poc ] 2015 email android 4.2 remote denial of service in android email app. android [ exploit ] 2014 linux <= 3.18 offset2lib: bypass 64-bit aslr in < 1 second linux [ exploit ] 2014 sniffit <= 0.3.7 sniffit stack buffer overflow - root shell linux [ exploit ] 2013 glibc <= 2.17 glibc ptr mangle encryption useless - poc linux [ poc ] other vulnerabilities date vendor description vulnerability type 2014 bash <= 4.3 root shell bash drop privileges failed 2014 bash <= 4.3 crash bash improper input handling 2014 irssi <= 8.16 root shell irssi drop privileges failed to be pub. konica printer to be pub. to be pub. published cve's date cve # product description vulnerability type 2015 cve (pending) android to be disclosed to be disclosed 2016 cve-2016-4484 cryptsetup <= 2:1.7.3-2 initrd root shell not failing securely 2016 cve-2016-3672 linux <= 4.5 disable aslr aslr weakness 2015 cve-2015-8370 grub2 <= 2.02 authentication bypass integer underflow 2015 cve (pending) glibc <= 2.22.90 bypass pointer guard dynamic loader weakness 2015 cve (pending) linux aslr <= 4.0 amd linux aslr weakness improper alignment 2015 cve (pending) linux aslr <= 3.18 reduced mmap entropy improper mask manipulation 2015 cve-2015-1593 linux aslr <= 3.19 reduced stack entropy integer overflow 2015 cve-2015-1574 google email 4.2.2 denial of service incorrect headers handling 2014 cve-2014-5439 sniffit <= 0.3.7 root shell stack buffer overflow 2014 cve-2013-6825 dcmtk <= 3.6.1 root privilege escalation drop privileges failed 2014 cve-2014-1226 s3dvt <= 0.2.2 root shell (ii) drop privileges failed 2013 cve-2013-6876 s3dvt <= 0.2.2 root shell (i) drop privileges failed 2013 cve-2013-4788 glibc <= 2.17 bypass pointer guard no pointer protection projects with active participation (most relevant) 2017 - 2020 slicenet - h2020-ict-2016-2 nats 2017 - 2020 5g video lab nats 2014 - 2015 virtualisation techniques applied to computing security iti 2012 - 2015 high integrity part
Whois est un protocole qui permet d'accéder aux informations d'enregistrement.Vous pouvez atteindre quand le site Web a été enregistré, quand il va expirer, quelles sont les coordonnées du site avec les informations suivantes. En un mot, il comprend ces informations;
For more information on Whois status codes, please visit https://icann.org/epp
Access to Public Interest Registry WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Public Interest Registry registry database. The data in this record is provided by Public Interest Registry for informational purposes only, and Public Interest Registry does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to: (a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Public Interest Registry reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
REFERRER http://www.pir.org/
REGISTRAR Public Interest Registry
SERVERS
SERVER org.whois-servers.net
ARGS hmarco.org
PORT 43
TYPE domain RegrInfo DOMAIN
NAME hmarco.org
HANDLE D167496047-LROR
CREATED 2013-03-01
STATUS clientTransferProhibited https://icann.org/epp#clientTransferProhibited
NSERVER
NS-114-C.GANDI.NET 217.70.179.2
NS-56-A.GANDI.NET 173.246.98.2
NS-225-B.GANDI.NET 213.167.229.2
OWNER
HANDLE C132965850-LROR
NAME Hector Marco Gisbert
ADDRESS
STREET Obfuscated whois Gandi-63-65 boulevard Massena
Nous utilisons des cookies pour personnaliser votre expérience sur notre site. En poursuivant votre navigation, vous acceptez cette utilisation. Apprendre encore plus