한국   대만   중국   일본 
Christopher Abad - Wikipedia Jump to content

Christopher Abad

From Wikipedia, the free encyclopedia

Christopher Abad
Nationality American
Occupation(s) Hacker , museum curator, artist, network engineer and programmer

Christopher Abad is an American hacker , museum curator, artist, network engineer and programmer . He is best known for his qualitative analysis of specialization stratification in the underground economies related to computer crime .

Academic publication and mainstream news coverage [ edit ]

While at UCLA , Abad discovered a method by which collisions in the hash function used in Internet Protocol datagrams may be leveraged to enable covert channel communications. [1] His discovery was a centerpiece of covert communications methodology and was the primary citation for an Association for Computing Machinery paper on covert channel detection [2] and another on a similar technique using TCP timestamps , [3] the two most well-cited and widely republished papers on the subject.

In 2005 while working at Cloudmark, Abad spent six months examining the phishing underworld from the inside. [4] Abad discovered that phishers were using IRC channels in order to trade personal information. [5] He stalked and collected messages from thirteen chat rooms phishers use. [5] Whereas past phishing researchers believed that phishing was coordinated by highly organized criminals, Abad discovered that phishing rings were decentralized. [5] Abad published his findings in First Monday . [6] This paper was the first examination of how the economy of phishing agents functioned, and highlighted the high degree of specialization within the economy.

20 GOTO 10 [ edit ]

Abad was the founder and owner [7] of 20 GOTO 10 (2008?2012), a former gallery which caters not only to fine art, but to " hacker " art, with an emphasis on technology as art, or exhibits which make the potentially criminal or unethical aspects of computer security accessible to the public. [8] The gallery received many favorable reviews coverage for its airing of art related to the computer underground, including ANSI [9] and 3D [10] art.

References [ edit ]

  1. ^ Abad, Christopher (2001), IP Checksum Covert Channels and Selected Hash Collision (PDF) , p. 3, archived from the original (PDF) on January 11, 2023 , retrieved October 8, 2010
  2. ^ "Ip covert timing channels: Design and detection". Computer and Communications Security : 178?187. 2004. CiteSeerX   10.1.1.84.6196 .
  3. ^ "Covert messaging through TCP timestamps". Covert Messaging through TCP Timestamps : 194?208. 2002. CiteSeerX   10.1.1.104.2501 .
  4. ^ Gomes, Lee (June 20, 2005). "Phisher Tales: How Webs of Scammers Pull Off Internet Fraud" . The Wall Street Journal . Retrieved October 8, 2010 .
  5. ^ a b c Keizer, Gregg (July 29, 2005). "Researcher Describes How The Phishing Economy Works" . InformationWeek . Retrieved October 8, 2010 .
  6. ^ "The economy of phishing: A survey of the operations of the phishing market" . First Monday . 10 (9). 2005. Archived from the original on November 21, 2011 . Retrieved October 8, 2010 .
  7. ^ Lee, Ellen. Early computer-generated art revived for S.F. exhibit . San Francisco Chronicle . January 12, 2008.
  8. ^ McMillan, Robert ( IDG News service) San Francisco gallery shows hacker Joe Grand's work as art Archived March 3, 2008, at the Wayback Machine 2 PC World , IT World
  9. ^ Johnson, Joel. ANSI Art Show at 20 GOTO 10 Gallery Boing Boing . January 28, 2008.
  10. ^ Hart, Hugh. Art Geek Creates 3-D on a Shoestring Wired . July 9, 2008.