Markus Gaasedelen

Markus Gaasedelen Email and Phone Number

Principal, Security Research @ RET2 Systems, Inc. @ RET2 Systems, Inc.
Markus Gaasedelen's Location
Troy, New York, United States, United States
Markus Gaasedelen's Contact Details

Markus Gaasedelen personal email

n/a
About Markus Gaasedelen

I am a security researcher who aims to make software easier for everyday developers to understand, maintain, and secure in the absence of source code. I focus primarily on researching next-generation software reverse engineering, binary exploitation, and program analysis technologies.

Markus Gaasedelen's Current Company Details
RET2 Systems, Inc.

Ret2 Systems, Inc.

View
Principal, Security Research @ RET2 Systems, Inc.
Markus Gaasedelen Work Experience Details
  • Ret2 Systems, Inc.
    Principal Security Researcher
    Ret2 Systems, Inc. Sep 2024 - Present
  • Ret2 Systems, Inc.
    Senior Security Researcher
    Ret2 Systems, Inc. Sep 2017 - Sep 2024
    I co-founded the applied security research firm RET2 Systems in 2017 to improve the accessibility of vulnerability research, program analysis, and security education.- Developed 3 award-winning reverse engineering tools used by thousands of researchers- Participated in Pwn2Own 2018 with a zero-day exploit for the Apple Safari Web Browser- Launched a gamified educational platform for learning practical binary exploitation skills
  • Microsoft
    Security Software Engineer Ii - Msrc
    Microsoft Jul 2015 - Aug 2017
    Redmond, Washington, Us
    Root-caused hundreds of security vulnerabilities in Microsoft software and developed experimental debugging technologies to reduce investigation costs for time-critical cases.- Produced technical reports documenting impact and remediation for each vulnerability- Reverse engineered 5+ in-the-wild zero-days targeting the Windows kernel using IDA Pro- Prototyped record-replay kernel debugging by integrating Microsoft TTD into Hyper-V
  • Trail Of Bits
    Security Research Intern
    Trail Of Bits Dec 2014 - Feb 2015
    Brooklyn, New York, Us
    Over the course of a few weeks, I helped refactor and document a C++ based semantic binary code analysis framework called CodeReason for its public release to GitHub. - Established a working knowledge of Valgrind’s intermediate representation language, VEX- Created framework demos to discover ROP gadgets which met user-specified constraints- Assisted with the release & maintenance of CodeReason which is now available on GitHub
  • Raytheon Si Gov
    Vulnerability Research Intern
    Raytheon Si Gov Jun 2014 - Aug 2014
    Source reviewed and fuzzed the SSH protocol implementations of PuTTY and OpenSSH, later applying this knowledge to evaluate custom SSH implementations on embedded devices.- Refined a proof-of-concept crash into a working exploit demo for an existing PuTTY CVE- Discovered several memory corruption bugs in a custom SSH server on an ARM device- Scripted analysis tasks for IDA and GDB to evaluate attack surface in other remote services
  • Mit Lincoln Laboratory
    Security Research Intern - Cyber System Assessments (Group 59)
    Mit Lincoln Laboratory Jun 2013 - Aug 2013
    Lexington, Ma, Us
    I studied hundreds of PDF-based malware samples and developed a Python framework to excise malicious elements into patch files that could be used to generate new samples.- Forged a deep understanding of the PDF file format and its various internal structures- Generated malicious PDF samples from my patches to evaluate anti-virus detection efficacy- Built a JavaScript obfuscator to test masking PDF exploit logic from anti-virus engines

Markus Gaasedelen Skills

Python X86 Assembly Linux Computer Security Malware Analysis Reverse Engineering C++ C Ida Pro Information Security Security Research Vulnerability Research Exploit Development Gdb Ppc Assembly Arm Assembly Msp430 Assembly Mips Assembly Idapython Assembly Level Debugging Static Analysis Dynamic Analysis Computer Forensics Security Binary Ninja Qt Windbg Lldb Digital Forensics

Markus Gaasedelen Education Details

  • Rensselaer Polytechnic Institute
    Rensselaer Polytechnic Institute
    Computer Science

Frequently Asked Questions about Markus Gaasedelen

What company does Markus Gaasedelen work for?

Markus Gaasedelen works for Ret2 Systems, Inc.

What is Markus Gaasedelen's role at the current company?

Markus Gaasedelen's current role is Principal, Security Research @ RET2 Systems, Inc..

What is Markus Gaasedelen's email address?

Markus Gaasedelen's email address is ga****@****rpi.edu

What schools did Markus Gaasedelen attend?

Markus Gaasedelen attended Rensselaer Polytechnic Institute.

What skills is Markus Gaasedelen known for?

Markus Gaasedelen has skills like Python, X86 Assembly, Linux, Computer Security, Malware Analysis, Reverse Engineering, C++, C, Ida Pro, Information Security, Security Research, Vulnerability Research.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.