Home | History | Annotate | Download | only in security
      1 page.title=Android Security Acknowledgements
      2 @jd:body
      3 
      4 <!--
      5     Copyright 2014 The Android Open Source Project
      6 
      7     Licensed under the Apache License, Version 2.0 (the "License");
      8     you may not use this file except in compliance with the License.
      9     You may obtain a copy of the License at
     10 
     11         http://www.apache.org/licenses/LICENSE-2.0
     12 
     13     Unless required by applicable law or agreed to in writing, software
     14     distributed under the License is distributed on an "AS IS" BASIS,
     15     WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     16     See the License for the specific language governing permissions and
     17     limitations under the License.
     18 -->
     19 
     20 <p>The Android Security Team would like to thank the following people and
     21 parties for helping to improve Android security. They have done this either by
     22 finding and responsibly reporting security vulnerabilities to <a
     23 href="mailto:security (a] android.com">security (a] android.com</a> or by committing code
     24 that has a positive impact on Android security, including code that qualifies
     25 for the <a href="https://www.google.com/about/appsecurity/patch-rewards/">Patch
     26 Rewards</a> program.</p>
     27 
     28 <h2>2014</h2>
     29 
     30 <p>Jeff Forristal of <a href="http://www.bluebox.com/blog/">Bluebox
     31 Security</a></p>
     32 
     33 <p>Aaron Mangeli of <a href="https://banno.com/">Banno</a> (<a
     34 href="mailto:amangel (a] gmail.com">amangel (a] gmail.com</a>)</p>
     35 
     36 <p><a href="http://www.linkedin.com/in/tonytrummer/">Tony Trummer</a> of <a
     37 href="http://www.themeninthemiddle.com">The Men in the Middle</a> (<a
     38 href="https://twitter.com/SecBro1">@SecBro1</a>)</p>
     39 
     40 <p><a href="http://www.samsung.com">Samsung Mobile</a></p>
     41 
     42 <p>Henry Hoggard of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a
     43 href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p>
     44 <p></p>
     45 
     46 <p><a href="http://www.androbugs.com">Yu-Cheng Lin </a> (<a
     47 href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p>
     48 
     49 <p><a
     50 href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried
     51 Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software
     52 Engineering Group</a>, EC SPRIDE Technische Universitt Darmstadt (<a
     53 href="mailto:siegfried.rasthofer (a] gmail.com">siegfried.rasthofer (a] gmail.com</a>)</p>
     54 
     55 <p>Steven Artz of <a href="http://sseblog.ec-spride.de/">Secure Software
     56 Engineering Group</a>, EC SPRIDE Technische Universitt Darmstadt (<a
     57 href="mailto:Steven.Arzt (a] ec-spride.de">Steven.Arzt (a] ec-spride.de</a>)</p>
     58 
     59 <p><a href="http://blog.redfern.me/">Joseph Redfern</a> of <a
     60 href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a
     61 href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p>
     62 
     63 <p><a href="https://plus.google.com/u/0/109528607786970714118">Valera
     64 Neronov</a></p>
     65 
     66 <p><a href="https://github.com/michalbednarski">Micha Bednarski</a></p>
     67 
     68 <p><a href="http://www.linkedin.com/in/luander">Luander Michel Ribeiro</a> (<a
     69 href="https://twitter.com/luanderock">@luanderock</a>)</p>
     70 
     71 <p>Stephan Huber of Testlab Mobile Security, <a
     72 href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (<a
     73 href="mailto:Stephan.Huber (a] sit.fraunhofer.de">Stephan.Huber (a] sit.fraunhofer.de</a>)</p>
     74 
     75 <p><a href="http://www.corkami.com">Ange Albertini</a> (<a
     76 href="https://twitter.com/angealbertini">@angealbertini</a>)</p>
     77 
     78 <p><a href="https://www.linkedin.com/in/tdalvi">Tushar Dalvi</a> (<a
     79 href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p>
     80 
     81 <p>Axelle Apvrille of Fortinet, FortiGuards Labs</p>
     82 
     83 <p>Tongxin Li of Peking University (<a
     84 href="mailto:litongxin1991 (a] gmail.com">litongxin1991 (a] gmail.com</a>)</p>
     85 
     86 <p><a href="https://www.facebook.com/zhou.xiaoyong">Xiaoyong Zhou</a> of <a
     87 href="http://www.cs.indiana.edu/~zhou/">Indiana University Bloomington</a> (<a
     88 href="https://twitter.com/xzhou">@xzhou</a>, <a
     89 href="mailto:zhou.xiaoyong (a] gmail.com">zhou.xiaoyong (a] gmail.com</a>)</p>
     90 
     91 <p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana
     92 University Bloomington (<a
     93 href="mailto:xingluyi (a] gmail.com">xingluyi (a] gmail.com</a>)</p>
     94 
     95 <p>Yeonjoon Lee of Indiana University Bloomington (<a
     96 href="mailto:luc2yj (a] gmail.com">luc2yj (a] gmail.com</a>)</p>
     97 
     98 <p><a href="http://www.informatics.indiana.edu/xw7/">Xiaofeng Wang</a> of
     99 Indiana University Bloomington (<a
    100 href="mailto:xw7 (a] indiana.edu">xw7 (a] indiana.edu</a>)</p>
    101 
    102 <p>Xinhui Han of Peking University (<a
    103 href="mailto:hanxinhui (a] pku.edu.cn">hanxinhui (a] pku.edu.cn</a>)</p>
    104 
    105 <br>
    106 <p><small>If you have reported a vulnerability prior to 2014 and want to be included on this list, or to report a vulnerability in Android, contact <a href="mailto:security (a] android.com">security (a] android.com</a></small></p>
    107