Paul Makowski

Paul Makowski Email and Phone Number

Seasoned (12+ years, 3 patents) vulnerability research leader & entrepreneur with a proven track record of synthesizing, developing, and evaluating novel offensive and defensive technologies. @
Paul Makowski's Location
San Diego, California, United States, United States
Paul Makowski's Contact Details

Paul Makowski personal email

About Paul Makowski

Seasoned (12+ years, 3 patents) vulnerability research leader and entrepreneur with a proven track record of synthesizing, developing, and evaluating novel offensive and defensive technologies. Excellent interdisciplinary communication and technical writing skills. DEF CON CTF winner.Publications: https://scholar.google.com/citations?user=3D2cKeYAAAAJ

Paul Makowski's Current Company Details
Undisclosed

Undisclosed

Seasoned (12+ years, 3 patents) vulnerability research leader & entrepreneur with a proven track record of synthesizing, developing, and evaluating novel offensive and defensive technologies.
Paul Makowski Work Experience Details
  • Undisclosed
    Independent Researcher
    Undisclosed Jun 2020 - Present
  • Polyswarm Pte. Ltd.
    Co-Founder & Cto
    Polyswarm Pte. Ltd. Mar 2017 - Jun 2020
    San Diego, California, Us
    Co-founded and developed PolySwarm: a disruptive platform in the anti-malware / antivirus space that provides economic incentives for accurate malware detection.Architected initial system design, ensuring reliability, security, and compatibility with external anti-malware engines and services.Built and managed a 13-person development team, responsible for technical direction.Closed sales while acting as lead sales engineer.Coordinated with sales and marketing teams to ensure strategy and messaging alignment.Recruited 40+ anti-malware engine vendors - from large firms to individual experts.Fostered a community of 450+ malware reverse engineers from companies like Google, Kaspersky, Ernst & Young, SentinelOne, CrowdStrike, and many more.Participated in venture capital (VC) and other fundraising activities.Translated the technical value of PolySwarm for executive, sales, and general audiences via presentations, meetups and blog posts.
  • Narf Industries
    Cto
    Narf Industries Jun 2014 - Jun 2020
    San Jose, California, Us
    Reverse engineered (RE) and developed “uncooperative access” & “defensive implants” for ICS / SCADA devices (PLCs, HMIs) on behalf of DARPA’s RADICS program, providing tools to government & industry that enable rapid response to blackouts caused by cyber attack.Engineered “challenge binaries” that push the state of the art in autonomous program analysis (symbolic / concolic execution, fuzzing, control flow / data dependency graph reconstruction, etc) and exploit mitigations, discovered vulnerabilities in game infrastructure and ensured competition integrity on behalf of DARPA’s Cyber Grand Challenge (CGC).Developed a signature bypass and hooking framework for a commercial baseband. Used this framework to develop and inject a custom GDB stub, enabling on-device debugging.Authored and awarded DARPA Cyber Fast Track (CFT) proposals, delivering solutions that use partial homomorphic encryption to: (1) construct binary patches that are provably immune to reverse engineering and (2) conduct opaque network signature matching, enabling deployment of secret network signatures to untrusted sensors.
  • National Security Agency
    Global Network Exploitation And Vulnerability Analyst (Gneva)
    National Security Agency Jun 2012 - Jun 2014
    Ft. Meade, Md, Us
    Held and remain eligible for a full scope Top Secret (TS) clearance.Limited information available upon request.
  • Cert Division At The Software Engineering Institute
    Vulnerability Analyst
    Cert Division At The Software Engineering Institute Jan 2011 - Apr 2011
    Pittsburgh, Pennsylvania, Us
    Developed templated mutational fuzzing tools and used these tools to discover and coordinate disclosure of remote code execution (RCE) vulnerabilities including CVE-2011-1591, Wireshark Bug #5722, and dozens of others.Authored definitive exploit for CVE-2011-1591 via an original exploitation method involving IP encapsulation, producing an exploit capable of impacting any target on the Internet despite the vulnerability residing in OSI layer 2 parsing.
  • Mcafee
    Web Application Security Engineer
    Mcafee Jan 2009 - May 2010
    San Jose, California, Us
    Wrote custom vulnerable web applications and test cases for exploitation. Researched and rated emergent vulnerabilities; assigned them enforced PCI scores; offered expert opinion on which vulnerabilities violate PCI compliance.Wrote signatures & scripts that were material to McAfee's ASV accreditation.

Paul Makowski Skills

Information Security Network Security Computer Security Embedded Systems Vulnerability Research Reverse Engineering Assembly Language Kernel Debugging C Linux Pizza Software Engineering Python Strategic Planning Leadership X86 Assembly Arm Assembly Virtualization Os X Windows Embedded Software Embedded Operating Systems Vulnerability Assessment Penetration Testing Security Research Protocol Analysis Application Security Ida Pro Security Audits Debugging Static Analysis Public Speaking Security Research Software Development Networking Tcp/ip C++ Programming Management

Paul Makowski Education Details

  • Carnegie Mellon University
    Carnegie Mellon University
    Information Security Technology And Management
  • Santa Clara University
    Santa Clara University
    Computer Engineering

Frequently Asked Questions about Paul Makowski

What company does Paul Makowski work for?

Paul Makowski works for Undisclosed

What is Paul Makowski's role at the current company?

Paul Makowski's current role is Seasoned (12+ years, 3 patents) vulnerability research leader & entrepreneur with a proven track record of synthesizing, developing, and evaluating novel offensive and defensive technologies..

What is Paul Makowski's email address?

Paul Makowski's email address is pa****@****warm.io

What schools did Paul Makowski attend?

Paul Makowski attended Carnegie Mellon University, Santa Clara University.

What skills is Paul Makowski known for?

Paul Makowski has skills like Information Security, Network Security, Computer Security, Embedded Systems, Vulnerability Research, Reverse Engineering, Assembly Language, Kernel Debugging, C, Linux, Pizza, Software Engineering.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.