Aditya K Sood

Job title:
Founder , SecNiche Security

Areas of expertise:
Penetration testing, reverse engineering, security research

Aditya K Sood is a senior security researcher/consultant and PhD candidate at Michigan State University. He has already worked in the security domain for Armorize, COSEINC and KPMG. He is also a founder of SecNiche Security Labs, an independent security research arena for cutting-edge computer security research. At SecNiche, he also acts as a security practitioner for providing services, including software security and malware analysis. He has been an active speaker at industry conferences, including RSA, Virus Bulletin, HackInTheBox, LayerOne, DefCon, ToorCon, HackerHalted, Source, TRISC, EuSecwest, XCON, Troopers, OWASP AppSec USA, FOSS, and CERT-IN, among others. He has published several papers for IEEE , CrossTalk, Virus Bulletin, ISACA, ISSA, Usenix Login, and Elsevier journals, such as NESE and CFS.

Tag Cloud



Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

All Bloggers » Aditya K Sood
The malware infection attack surface is increasing day by day. Recently, some of the infected machines with different malware classes such as file downloader are using GTALK for downloading JPG based files from the internet. Actually this file is not a JPG file but a zipped file that contains an ex ...
Posted 15 December 2009 by Aditya K Sood
The internet world has become a playground for spammers. Every day there is a new attack pattern. You will find one or another social networking website facing this problem. The reason for this trend is the centralised working of these websites. The interconnection among identities have helped the s ...
Posted 11 December 2009 by Aditya K Sood
The web is ever changing arena. Online anti-virus engines provide a diversified functioning of analysing a malware executable thereby providing efficient analysis. This is an online democracy of anti-virus engines. But every positive entity can be transformed into a playground and players can be be ...
Posted 25 November 2009 by Aditya K Sood
The web is getting a playground for different type of attacks. There is lot of talks going around about Microsoft EOT fonts realm which are being used for launching different type of attacks. Recently I gave a talk at the Excalibur Conference, China in which I talked about launching a CSRF attack i ...
Posted 13 November 2009 by Aditya K Sood
AJAX-JSON - Inside Crux
The development is occurring at a rapid pace. The innovation is going on. The web is transitioning from the web 1.0 to web 2.0. The implementation structures of various technologies have changed. The Web 2.0 has revolutionized the web in a stringent manner from all the perspectives. The Asynchronous ...
Posted 13 October 2009 by Aditya K Sood
Web 2.0 – Truth and Lies in AJAX World
Web 2.0 has metamorphosed the complete scenario of internet. In the AJAX world, most of the working functionality is derived by efficient technology methods and ingrained software dependency. In order to scratch deep down the bottom the differential aspect of this technology must be understood. The ...
Posted 08 October 2009 by Aditya K Sood
Showing 1 - 6 of 6 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×