Greg Hoglund
Michael Gregory Hoglund is an American author, researcher, and serial entrepreneur in the cyber security industry. He is the founder of several companies, including Cenzic, HBGary and Outlier Security. Hoglund contributed early research to the field of rootkits, software exploitation, buffer overflows, and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds a patent on fault injection methods for software testing, and fuzzy hashing for computer forensics. Due to an email leak in 2011, Hoglund is well known to have worked for the U.S. Government and Intelligence Community in the development of rootkits and exploit material. It was also shown that he and his team at HBGary had performed a great deal of research on Chinese Government hackers commonly known as APT (Advanced persistent threat). For a time, his company HBGary was the target of a great deal of media coverage and controversy following the 2011 email leak (see below, Controversy and email leak). HBGary was later acquired by a large defense contractor. Provided by Wikipedia
Showing 1 - 9 results of 9 for search 'Hoglund, Greg', query time: 0.03s
Refine Results
In addition to media from the THWS, media from other Bavarian libraries are also displayed.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
-
1
Rootkits subverting the Windows kernel by Hoglund, Greg, Butler, James
Published 2009Call Number: Loading…
Located: Loading… -
2
Rootkits subverting the Windows kernel by Hoglund, Greg
Published 2006Call Number: Loading…
Located: Loading… -
3
Exploiting software how to break code by Hoglund, Greg, MacGraw, Gary
Published 2004Call Number: Loading…
Located: Loading… -
4
Exploiting online games cheating massively distributed systems by Hoglund, Greg, McGraw, Gary 1966-
Published 2008Call Number: Loading…Indexes
Located: Loading…
-
5
Exploiting software how to break code by Hoglund, Greg, McGraw, Gary 1966-
Published 2008Call Number: Loading…
Located: Loading… -
6
Rootkits Windows-Kernel unterwandern by Hoglund, Greg, Butler, James
Published 2006Call Number: Loading…
Located: Loading… -
7
Exploiting software how to break code by Hoglund, Greg
Published 2004Call Number: Loading…
Located: Loading… -
8
Exploiting software how to break code by Hoglund, Greg, McGraw, Gary 1966-
Published 2004Call Number: Loading…
Located: Loading… -
9
Exploiting software how to break code by Hoglund, Greg, MacGraw, Gary
Published 2004Call Number: Loading…
Located: Loading…