From Wikipedia, the free encyclopedia
American hacker, museum curator, artist, network engineer and programmer
Christopher Abad
|
---|
Nationality
| American
|
---|
Occupation(s)
| Hacker
, museum curator, artist, network engineer and
programmer
|
---|
Christopher Abad
is an American
hacker
, museum curator, artist, network engineer and
programmer
. He is best known for his qualitative analysis of specialization stratification in the underground economies related to
computer crime
.
Academic publication and mainstream news coverage
[
edit
]
While at
UCLA
, Abad discovered a method by which collisions in the
hash function
used in
Internet Protocol
datagrams may be leveraged to enable
covert
channel communications.
[1]
His discovery was a centerpiece of covert communications methodology and was the primary citation for an
Association for Computing Machinery
paper on covert channel detection
[2]
and another on a similar technique using
TCP
timestamps
,
[3]
the two most well-cited and widely republished papers on the subject.
In 2005 while working at Cloudmark, Abad spent six months examining the phishing underworld from the inside.
[4]
Abad discovered that phishers were using
IRC
channels in order to trade personal information.
[5]
He stalked and collected messages from thirteen chat rooms phishers use.
[5]
Whereas past phishing researchers believed that phishing was coordinated by highly organized criminals, Abad discovered that phishing rings were decentralized.
[5]
Abad published his findings in
First Monday
.
[6]
This paper was the first examination of how the economy of
phishing
agents functioned, and highlighted the high degree of specialization within the economy.
20 GOTO 10
[
edit
]
Abad was the founder and owner
[7]
of
20 GOTO 10
(2008?2012), a former gallery which caters not only to fine art, but to "
hacker
" art, with an emphasis on technology as art, or exhibits which make the potentially criminal or unethical aspects of computer security accessible to the public.
[8]
The gallery received many favorable reviews coverage for its airing of art related to the computer underground, including
ANSI
[9]
and
3D
[10]
art.
References
[
edit
]
- ^
Abad, Christopher (2001),
IP Checksum Covert Channels and Selected Hash Collision
(PDF)
, p. 3, archived from
the original
(PDF)
on January 11, 2023
, retrieved
October 8,
2010
- ^
"Ip covert timing channels: Design and detection".
Computer and Communications Security
: 178?187. 2004.
CiteSeerX
10.1.1.84.6196
.
- ^
"Covert messaging through TCP timestamps".
Covert Messaging through TCP Timestamps
: 194?208. 2002.
CiteSeerX
10.1.1.104.2501
.
- ^
Gomes, Lee (June 20, 2005).
"Phisher Tales: How Webs of Scammers Pull Off Internet Fraud"
.
The Wall Street Journal
. Retrieved
October 8,
2010
.
- ^
a
b
c
Keizer, Gregg (July 29, 2005).
"Researcher Describes How The Phishing Economy Works"
.
InformationWeek
. Retrieved
October 8,
2010
.
- ^
"The economy of phishing: A survey of the operations of the phishing market"
.
First Monday
.
10
(9). 2005. Archived from
the original
on November 21, 2011
. Retrieved
October 8,
2010
.
- ^
Lee, Ellen.
Early computer-generated art revived for S.F. exhibit
.
San Francisco Chronicle
. January 12, 2008.
- ^
McMillan, Robert (
IDG
News service)
San Francisco gallery shows hacker Joe Grand's work as art
Archived
March 3, 2008, at the
Wayback Machine
2
PC World
,
IT World
- ^
Johnson, Joel.
ANSI Art Show at 20 GOTO 10 Gallery
Boing Boing
. January 28, 2008.
- ^
Hart, Hugh.
Art Geek Creates 3-D on a Shoestring
Wired
. July 9, 2008.