Natalie Silvanovich | f04ee8b | 2014-06-19 10:24:16 -0700 | [diff] [blame^] | 1 | page.title=Android Security Acknowledgements |
| 2 | @jd:body |
| 3 | |
| 4 | <!-- |
| 5 | Copyright 2014 The Android Open Source Project |
| 6 | |
| 7 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 8 | you may not use this file except in compliance with the License. |
| 9 | You may obtain a copy of the License at |
| 10 | |
| 11 | http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | |
| 13 | Unless required by applicable law or agreed to in writing, software |
| 14 | distributed under the License is distributed on an "AS IS" BASIS, |
| 15 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | See the License for the specific language governing permissions and |
| 17 | limitations under the License. |
| 18 | --> |
| 19 | <p>The Android Security Team would like to thank the following people and parties for helping to improve Android security, either by finding and responsibly reporting security vulnerabilities to <a href="mailto:security@android.com">security@android.com</a> or by commiting code that has a positive impact on Android security, including code that qualifies for the <a href="https://www.google.com/about/appsecurity/patch-rewards/">Patch Rewards</a> program.</p> |
| 20 | |
| 21 | <h2>2014</h2> |
| 22 | |
| 23 | <p>Jeff Forristal of <a href="http://www.bluebox.com/blog/">Bluebox Security</a></p> |
| 24 | |
| 25 | <p>Aaron Mangeli of <a href="https://banno.com/">Banno</a> (<a href="mailto:amangel@gmail.com">amangel@gmail.com</a>)</p> |
| 26 | |
| 27 | <p><a href="http://www.linkedin.com/in/tonytrummer/">Tony Trummer</a> of <a href="http://www.themeninthemiddle.com">The Men in the Middle</a> (<a href="https://twitter.com/SecBro1">@SecBro1</a>)</p> |
| 28 | |
| 29 | <p><a href="http://www.samsung.com">Samsung Mobile</a></p> |
| 30 | |
| 31 | <p>Henry Hoggard of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p> |
| 32 | <p></p> |
| 33 | |
| 34 | <p><a href="http://www.androbugs.com">Yu-Cheng Lin 林禹成</a> (<a href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p> |
| 35 | |
| 36 | <p><a href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a href="mailto:siegfried.rasthofer@gmail.com">siegfried.rasthofer@gmail.com</a>)</p> |
| 37 | |
| 38 | <p>Steven Artz of <a href="http://sseblog.ec-spride.de/">Secure Software Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a href="mailto:Steven.Arzt@ec-spride.de">Steven.Arzt@ec-spride.de</a>)</p> |
| 39 | |
| 40 | |
| 41 | <p><a href="http://blog.redfern.me/">Joseph Redfern</a> of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p> |
| 42 | |
| 43 | <p><a href="https://plus.google.com/u/0/109528607786970714118">Valera Neronov</a></p> |
| 44 | |
| 45 | |
| 46 | <p><a href="https://github.com/michalbednarski">Michał Bednarski</a></p> |
| 47 | |
| 48 | <p><a href="http://www.linkedin.com/in/luander">Luander Michel Ribeiro</a> (<a href="https://twitter.com/luanderock">@luanderock</a>)</p> |
| 49 | |
| 50 | <p>Stephan Huber of Testlab Mobile Security, <a href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (<a href="mailto:Stephan.Huber@sit.fraunhofer.de">Stephan.Huber@sit.fraunhofer.de</a>)</p> |
| 51 | |
| 52 | <p><a href="http://www.corkami.com">Ange Albertini</a> (<a href="https://twitter.com/angealbertini">@angealbertini</a>)</p> |
| 53 | |
| 54 | <p><a href="https://www.linkedin.com/in/tdalvi">Tushar Dalvi</a> (<a href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p> |
| 55 | |
| 56 | <p>Axelle Apvrille of Fortinet, FortiGuards Labs</p> |
| 57 | |
| 58 | <p>Tongxin Li of Peking University (<a href="mailto:litongxin1991@gmail.com">litongxin1991@gmail.com</a>)</p> |
| 59 | |
| 60 | <p><a href="https://www.facebook.com/zhou.xiaoyong">Xiaoyong Zhou</a> of <a href="http://www.cs.indiana.edu/~zhou/">Indiana University Bloomington</a> (<a href="https://twitter.com/xzhou">@xzhou</a>, <a href="mailto:zhou.xiaoyong@gmail.com">zhou.xiaoyong@gmail.com</a>)</p> |
| 61 | |
| 62 | <p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana University Bloomington (<a href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p> |
| 63 | |
| 64 | <p>Yeonjoon Lee of Indiana University Bloomington (<a href="mailto:luc2yj@gmail.com">luc2yj@gmail.com</a>)</p> |
| 65 | |
| 66 | <p><a href="http://www.informatics.indiana.edu/xw7/">Xiaofeng Wang</a> of Indiana University Bloomington (<a href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p> |
| 67 | |
| 68 | <p>Xinhui Han of Peking University (<a href="mailto:hanxinhui@pku.edu.cn">hanxinhui@pku.edu.cn</a>)</p> |
| 69 | |
| 70 | <br> |
| 71 | <p><small>If you have reported a vulnerability prior to 2014 and want to be included on this list, or to report a vulnerability in Android, contact <a href="mailto:security@android.com">security@android.com</a></small></p> |
| 72 | |
| 73 | |
| 74 | |
| 75 | |