Ryan Permeh

Trabuco Canyon, California, United States Contact Info
9K followers 500+ connections

Join to view profile

About

I am an experienced security technologist focusing on a broad section of the Information…

Activity

Join now to see all activity

Experience & Education

  • Synqly

View Ryan’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Angry Robots and Rotten Apples

    Design West Conference

  • Slicing into apple: iPhone Reverse Engineering

    Source Seattle

  • Breaking Applications

    McAfee Security Journal

    This article discusses techniques used by hackers to find weaknesses in software, so that readers may employ similar approaches for discovering and resolving security issues in their own products. Topic content includes source code auditing, reverse engineering, fuzzing, and penetration testing, both for assessing product security during development as well as after product deployment.

    See publication
  • Mapping IPv6

    Pacsec Japan

  • eEye BootRoot

    BlackHat Conference

  • Hack Proofing Your Network, 2nd Ed

    Syngress

    Associate author

  • Hacking Exposed 7

    Mcgraw Hill

    Technical Editor

  • Protecting Your Critical Assets Lessons Learned from “Operation Aurora”

    McAfee Labs and McAfee Foundstone Professional Services

    As Operation Aurora highlighted, advanced persistent threats (APT) are an increasingly common form
    of complex and directed attacks that use insidious techniques for gaining access to privileged systems
    and maintaining that access until all of the attackers’ goals and objectives have been met. Operation
    Aurora employed an APT technique that proved extremely successful in targeting, exploiting, accessing,
    and exfiltrating highly valuable intellectual property from its victims…

    As Operation Aurora highlighted, advanced persistent threats (APT) are an increasingly common form
    of complex and directed attacks that use insidious techniques for gaining access to privileged systems
    and maintaining that access until all of the attackers’ goals and objectives have been met. Operation
    Aurora employed an APT technique that proved extremely successful in targeting, exploiting, accessing,
    and exfiltrating highly valuable intellectual property from its victims. This paper details Operation Aurora
    and provides some insight into what was learned and how to prevent such attacks from being successful
    in the future.

    See publication
  • Windows 2000 Security Handbook

    McMillan

    Associate Author

Patents

Recommendations received

6 people have recommended Ryan

Join now to view

More activity by Ryan

View Ryan’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ryan directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses