Microsoft Snags Another Security Researcher

There was a time when it seemed Microsoft viewed security researchers as the enemy, and a big public relations problem. They were the troublemakers who poked holes in Microsoft's operating systems, browser, and desktop software. And they published exploits that helped to automate attacks. Today, Microsoft announced that it hired one of them.

2 Min Read
Dark Reading logo in a gray background | Dark Reading

There was a time when it seemed Microsoft viewed security researchers as the enemy, and a big public relations problem. They were the troublemakers who poked holes in Microsoft's operating systems, browser, and desktop software. And they published exploits that helped to automate attacks. Today, Microsoft announced that it hired one of them.Security expert Matt Miller has probably sent the phone lines ablaze at Redmond a number of times in the past few years. He's also known in security circles as Skape, and has been one of the primary developers of the pentesting/attack tool Metasploit. Today, Microsoft's Secure Development Lifecycle evangelist Michael Howard announced on his Microsoft blog that Miller would be joining the Security Science team: "Good news! Matt Miller, author of plenty of cutting-edge security research, including my fave "A Brief History of Exploitation Techniques and Mitigations on Windows" has joined the Security Science team to work on improved ways to find security vulnerabilities and better software defenses through mitigations. Most recently, Matt's been focused on design review for Windows 7."

A set of eyes like Miller's can only help reduce the number of attack vectors and vulnerabilities in Windows 7. Here's a rundown on some of his recent presentations:

"WOOT: 2008: Modeling the trust boundaries created by securable objects

ToorCon: 2008: State of the Exploit

Breakpoint: A Brief History of Exploitation Techniques and Mitigations on Windows

ToorCon 2007: Cthulhu: A software analysis framework built on Phoenix

ToorCon 2005: Exploitation Chronomancy

BlackHat 2005: Beyond EIP

"

In addition to Metasploit, Miller's software work includes Address Space Layout Randomization tool wehntrust, x64 PE file analyzer x64auto, winstrace for tracking system calls, and memgreg -- a dynamic memory analysis tool for FreeBSD and Linux.

More information on Miller can be found here.

About the Author

George V. Hulme, Contributing Writer

An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights