Natalie Silvanovich | f911865 | 2014-06-19 10:24:16 -0700 | [diff] [blame^] | 1 | page.title=Android Security Acknowledgements |
| 2 | @jd:body |
| 3 | |
| 4 | <!-- |
| 5 | Copyright 2014 The Android Open Source Project |
| 6 | |
| 7 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 8 | you may not use this file except in compliance with the License. |
| 9 | You may obtain a copy of the License at |
| 10 | |
| 11 | http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | |
| 13 | Unless required by applicable law or agreed to in writing, software |
| 14 | distributed under the License is distributed on an "AS IS" BASIS, |
| 15 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | See the License for the specific language governing permissions and |
| 17 | limitations under the License. |
| 18 | --> |
| 19 | <p>The Android Security Team would like to thank the following people and |
| 20 | parties for helping to improve Android security. They have done this either by |
| 21 | finding and responsibly reporting security vulnerabilities to <a |
| 22 | href="mailto:security@android.com">security@android.com</a> or by committing code |
| 23 | that has a positive impact on Android security, including code that qualifies |
| 24 | for the <a href="https://www.google.com/about/appsecurity/patch-rewards/">Patch |
| 25 | Rewards</a> program.</p> |
| 26 | |
| 27 | <h2>2014</h2> |
| 28 | |
| 29 | <p>Jeff Forristal of <a href="http://www.bluebox.com/blog/">Bluebox |
| 30 | Security</a></p> |
| 31 | |
| 32 | <p>Aaron Mangeli of <a href="https://banno.com/">Banno</a> (<a |
| 33 | href="mailto:amangel@gmail.com">amangel@gmail.com</a>)</p> |
| 34 | |
| 35 | <p><a href="http://www.linkedin.com/in/tonytrummer/">Tony Trummer</a> of <a |
| 36 | href="http://www.themeninthemiddle.com">The Men in the Middle</a> (<a |
| 37 | href="https://twitter.com/SecBro1">@SecBro1</a>)</p> |
| 38 | |
| 39 | <p><a href="http://www.samsung.com">Samsung Mobile</a></p> |
| 40 | |
| 41 | <p>Henry Hoggard of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a |
| 42 | href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p> |
| 43 | <p></p> |
| 44 | |
| 45 | <p><a href="http://www.androbugs.com">Yu-Cheng Lin 林禹成</a> (<a |
| 46 | href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p> |
| 47 | |
| 48 | <p><a |
| 49 | href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried |
| 50 | Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software |
| 51 | Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a |
| 52 | href="mailto:siegfried.rasthofer@gmail.com">siegfried.rasthofer@gmail.com</a>)</p> |
| 53 | |
| 54 | <p>Steven Artz of <a href="http://sseblog.ec-spride.de/">Secure Software |
| 55 | Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a |
| 56 | href="mailto:Steven.Arzt@ec-spride.de">Steven.Arzt@ec-spride.de</a>)</p> |
| 57 | |
| 58 | <p><a href="http://blog.redfern.me/">Joseph Redfern</a> of <a |
| 59 | href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a |
| 60 | href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p> |
| 61 | |
| 62 | <p><a href="https://plus.google.com/u/0/109528607786970714118">Valera |
| 63 | Neronov</a></p> |
| 64 | |
| 65 | <p><a href="https://github.com/michalbednarski">Michał Bednarski</a></p> |
| 66 | |
| 67 | <p><a href="http://www.linkedin.com/in/luander">Luander Michel Ribeiro</a> (<a |
| 68 | href="https://twitter.com/luanderock">@luanderock</a>)</p> |
| 69 | |
| 70 | <p>Stephan Huber of Testlab Mobile Security, <a |
| 71 | href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (<a |
| 72 | href="mailto:Stephan.Huber@sit.fraunhofer.de">Stephan.Huber@sit.fraunhofer.de</a>)</p> |
| 73 | |
| 74 | <p><a href="http://www.corkami.com">Ange Albertini</a> (<a |
| 75 | href="https://twitter.com/angealbertini">@angealbertini</a>)</p> |
| 76 | |
| 77 | <p><a href="https://www.linkedin.com/in/tdalvi">Tushar Dalvi</a> (<a |
| 78 | href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p> |
| 79 | |
| 80 | <p>Axelle Apvrille of Fortinet, FortiGuards Labs</p> |
| 81 | |
| 82 | <p>Tongxin Li of Peking University (<a |
| 83 | href="mailto:litongxin1991@gmail.com">litongxin1991@gmail.com</a>)</p> |
| 84 | |
| 85 | <p><a href="https://www.facebook.com/zhou.xiaoyong">Xiaoyong Zhou</a> of <a |
| 86 | href="http://www.cs.indiana.edu/~zhou/">Indiana University Bloomington</a> (<a |
| 87 | href="https://twitter.com/xzhou">@xzhou</a>, <a |
| 88 | href="mailto:zhou.xiaoyong@gmail.com">zhou.xiaoyong@gmail.com</a>)</p> |
| 89 | |
| 90 | <p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana |
| 91 | University Bloomington (<a |
| 92 | href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p> |
| 93 | |
| 94 | <p>Yeonjoon Lee of Indiana University Bloomington (<a |
| 95 | href="mailto:luc2yj@gmail.com">luc2yj@gmail.com</a>)</p> |
| 96 | |
| 97 | <p><a href="http://www.informatics.indiana.edu/xw7/">Xiaofeng Wang</a> of |
| 98 | Indiana University Bloomington (<a |
| 99 | href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p> |
| 100 | |
| 101 | <p>Xinhui Han of Peking University (<a |
| 102 | href="mailto:hanxinhui@pku.edu.cn">hanxinhui@pku.edu.cn</a>)</p> |
| 103 | |
| 104 | <br> |
| 105 | <p><small>If you have reported a vulnerability prior to 2014 and want to be included on this list, or to report a vulnerability in Android, contact <a href="mailto:security@android.com">security@android.com</a></small></p> |