Paul Makowski work email
- Valid
- Valid
- Valid
Paul Makowski personal email
- Valid
Seasoned (12+ years, 3 patents) vulnerability research leader and entrepreneur with a proven track record of synthesizing, developing, and evaluating novel offensive and defensive technologies. Excellent interdisciplinary communication and technical writing skills. DEF CON CTF winner.Publications: https://scholar.google.com/citations?user=3D2cKeYAAAAJ
Undisclosed
-
Independent ResearcherUndisclosed Jun 2020 - Present
-
Co-Founder & CtoPolyswarm Pte. Ltd. Mar 2017 - Jun 2020San Diego, California, UsCo-founded and developed PolySwarm: a disruptive platform in the anti-malware / antivirus space that provides economic incentives for accurate malware detection.Architected initial system design, ensuring reliability, security, and compatibility with external anti-malware engines and services.Built and managed a 13-person development team, responsible for technical direction.Closed sales while acting as lead sales engineer.Coordinated with sales and marketing teams to ensure strategy and messaging alignment.Recruited 40+ anti-malware engine vendors - from large firms to individual experts.Fostered a community of 450+ malware reverse engineers from companies like Google, Kaspersky, Ernst & Young, SentinelOne, CrowdStrike, and many more.Participated in venture capital (VC) and other fundraising activities.Translated the technical value of PolySwarm for executive, sales, and general audiences via presentations, meetups and blog posts. -
CtoNarf Industries Jun 2014 - Jun 2020San Jose, California, UsReverse engineered (RE) and developed “uncooperative access” & “defensive implants” for ICS / SCADA devices (PLCs, HMIs) on behalf of DARPA’s RADICS program, providing tools to government & industry that enable rapid response to blackouts caused by cyber attack.Engineered “challenge binaries” that push the state of the art in autonomous program analysis (symbolic / concolic execution, fuzzing, control flow / data dependency graph reconstruction, etc) and exploit mitigations, discovered vulnerabilities in game infrastructure and ensured competition integrity on behalf of DARPA’s Cyber Grand Challenge (CGC).Developed a signature bypass and hooking framework for a commercial baseband. Used this framework to develop and inject a custom GDB stub, enabling on-device debugging.Authored and awarded DARPA Cyber Fast Track (CFT) proposals, delivering solutions that use partial homomorphic encryption to: (1) construct binary patches that are provably immune to reverse engineering and (2) conduct opaque network signature matching, enabling deployment of secret network signatures to untrusted sensors. -
Global Network Exploitation And Vulnerability Analyst (Gneva)National Security Agency Jun 2012 - Jun 2014Ft. Meade, Md, UsHeld and remain eligible for a full scope Top Secret (TS) clearance.Limited information available upon request. -
Vulnerability AnalystCert Division At The Software Engineering Institute Jan 2011 - Apr 2011Pittsburgh, Pennsylvania, UsDeveloped templated mutational fuzzing tools and used these tools to discover and coordinate disclosure of remote code execution (RCE) vulnerabilities including CVE-2011-1591, Wireshark Bug #5722, and dozens of others.Authored definitive exploit for CVE-2011-1591 via an original exploitation method involving IP encapsulation, producing an exploit capable of impacting any target on the Internet despite the vulnerability residing in OSI layer 2 parsing. -
Web Application Security EngineerMcafee Jan 2009 - May 2010San Jose, California, UsWrote custom vulnerable web applications and test cases for exploitation. Researched and rated emergent vulnerabilities; assigned them enforced PCI scores; offered expert opinion on which vulnerabilities violate PCI compliance.Wrote signatures & scripts that were material to McAfee's ASV accreditation.
Paul Makowski Skills
Paul Makowski Education Details
-
Carnegie Mellon UniversityInformation Security Technology And Management -
Santa Clara UniversityComputer Engineering
Frequently Asked Questions about Paul Makowski
What company does Paul Makowski work for?
Paul Makowski works for Undisclosed
What is Paul Makowski's role at the current company?
Paul Makowski's current role is Seasoned (12+ years, 3 patents) vulnerability research leader & entrepreneur with a proven track record of synthesizing, developing, and evaluating novel offensive and defensive technologies..
What is Paul Makowski's email address?
Paul Makowski's email address is pa****@****warm.io
What schools did Paul Makowski attend?
Paul Makowski attended Carnegie Mellon University, Santa Clara University.
What skills is Paul Makowski known for?
Paul Makowski has skills like Information Security, Network Security, Computer Security, Embedded Systems, Vulnerability Research, Reverse Engineering, Assembly Language, Kernel Debugging, C, Linux, Pizza, Software Engineering.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial