Joanna Rutkowska
Joanna Rutkowska | |
---|---|
Nationality | Polish |
Occupation | Security researcher |
Employer | Invisible Things Labs |
Known for | Blue Pill, Evil Maid attack, Qubes OS |
Website |
invisiblethingslab |
Joanna Rutkowska is a Polish computer security researcher, primarily known for her research on low-level security and stealth malware.[1]
She became known after the Black Hat Briefings conference in Las Vegas in August 2006, where Rutkowska presented an attack against Vista kernel protection mechanism, and also a technique dubbed Blue Pill, that used hardware virtualization to move a running OS into a virtual machine. Subsequently she has been named one of Five Hackers who Put a Mark on 2006 by eWeek Magazine for her research on the topic.[2] The original concept of Blue Pill was published by another researcher at IEEE Oakland on May 2006 under the name VMBR.[3]
During following years, Rutkowska continued to focus on low-level security. In 2007 she demonstrated that certain types of hardware-based memory acquisition (e.g. FireWire based) are unreliable and can be defeated.[4] Later in 2007, together with a team member Alexander Tereshkin, presented further research on virtualization malware.[5] In 2008, Rutkowska with her team focused on Xen hypervisor security.[6] In 2009, together with a team member Rafal Wojtczuk, presented an attack against Intel Trusted Execution Technology and Intel System Management Mode.[7]
In April 2007, Rutkowska founded Invisible Things Lab in Warsaw, Poland. The company focuses on OS and VMM security research and provides various consulting services.
In 2010, she and Rafal Wojtczuk began working on the Qubes OS security-oriented, Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. Qubes 1.0 was officially released on September 3, 2012,[8] 2.0 on September 26, 2014 and Qubes 3.0 on October 1, 2015.
References
- ↑ Invisible Things Lab -- Resources
- ↑ Five Hackers Who Left a Mark on 2006, Ryan Naraine, eWeek.com
- ↑ SubVirt: Implementing malware with virtual machines
- ↑ Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools
- ↑ IsGameOver(), anyone?
- ↑ Xen virtualisation swallows a "Blue Pill"
- ↑ Attacking Intel Trusted Execution Technology
- ↑ Qubes OS Homepage
External links
- Qubes - Qubes Operating System Home
- InvisibleThings - personal website
- InvisibleThings blog
- Invisible Things Lab - corporate website
- CNET news - Vista Hacked at Black Hat
- Computerworld Security article
- - SubVirt: Implementing malware with virtual machines