“I have worked with Rob for many years at TippingPoint, and see him grow in various dimensions. If you have a hard problem to solve, you need creative and sharp mind with large amount of cyber security experience, look to Rob!! He would be a great asset to any organization.”
About
and software…
Activity
-
We are excited to announce TigerBeetle's $24 million Series A. Led by Natalie Vais of Spark Capital, with participation from Lenny Pruss of Amplify…
We are excited to announce TigerBeetle's $24 million Series A. Led by Natalie Vais of Spark Capital, with participation from Lenny Pruss of Amplify…
Liked by Rob King
-
Meet us at Blackhat Las Vegas 📍 Startup City Booth SC310 📅 August 7, 10:00am - 6:00pm 📅 August 8, 10:00am - 4:00pm Co-Founder/CTO: Brian…
Meet us at Blackhat Las Vegas 📍 Startup City Booth SC310 📅 August 7, 10:00am - 6:00pm 📅 August 8, 10:00am - 4:00pm Co-Founder/CTO: Brian…
Liked by Rob King
-
For the Will Larson fans out there: next podcast episode is an interview with Will Himself, who is as insightful and down-to-earth in interviews as…
For the Will Larson fans out there: next podcast episode is an interview with Will Himself, who is as insightful and down-to-earth in interviews as…
Liked by Rob King
Experience & Education
Publications
-
Taking Event Correlation With You
Black Hat Briefings
Describes how event correlation is critical for building an accurate picture of an organization's security posture. Discusses the challenges of building accurate and efficient engines, and provides a brief survey of the state of the art. Introduces the Giles production system compiler and describes how it may be used to build powerful embedded event correlation engines.
-
The Giles Production Rule System Compiler
The ISSA Journal
Describes the Giles event correlation engine compiler. The compiler creates embedded event correlation engines and production systems by creating database schemas implementing these engines. This article introduces the compiler, its uses, and some details of its implementation and performance.
-
Pixaxe: A Declarative, Client-Focused Web Application Framework
Proceedings of the USENIX Conference on Web Application Development
Provided an overview of a novel web application framework that I designed. The framework was based around the creation of a parsing framework running entirely in-browser that defined a declarative and functional programming language that was a superset of XHTML. The framework functions by the evaluation of expressions which, as side effects, render pages and respond to user input.
The framework involved the creation of a complete parsing framework, compiler, and virtual machine, as well…Provided an overview of a novel web application framework that I designed. The framework was based around the creation of a parsing framework running entirely in-browser that defined a declarative and functional programming language that was a superset of XHTML. The framework functions by the evaluation of expressions which, as side effects, render pages and respond to user input.
The framework involved the creation of a complete parsing framework, compiler, and virtual machine, as well as the creation of a complete programming language. -
Implementing SCREAM
Erlang Factory Conference
Described the implementation of the SCREAM technique I developed at TippingPoint, which in addition to being interesting from an information security standpoint also offered a real-world example of an unusual use of Erlang.
-
Static Analysis of Regular Expressions for Encoding
The United States Department of Defense
Presented by special invitation several times, including to the United States Army (other agencies attending), the IEEE Joint Communications and Signal Processing Texas Chapter, and the University of Texas at Austin IEEE Student Chapter. This talk described mechanisms for static analysis and transformation of regular expressions to match the original input when that input has been encoded using various schemes. These techniques allowed the development of low-level traffic analysis and…
Presented by special invitation several times, including to the United States Army (other agencies attending), the IEEE Joint Communications and Signal Processing Texas Chapter, and the University of Texas at Austin IEEE Student Chapter. This talk described mechanisms for static analysis and transformation of regular expressions to match the original input when that input has been encoded using various schemes. These techniques allowed the development of low-level traffic analysis and data-mining signatures that could work on encoded data without first decoding it, for use in environments where decoding is impossible or expensive.
-
@Risk: The Consensus Security Alert
The SANS Institute
Served as co-editor for four years for one of the largest information security newsletters in the industry, read by over 250,000 subscribers weekly.
-
SANS Top-20
The SANS Institute
Served as contributor and co-editor for several of the yearly editions of the SANS Top-20 state-of-the-industry publications.
-
Building a Better Mousetrap: Effective Techniques in Intrusion Prevention
Black Hat Training
A joint presentation with Rohit Dhamankar, this is a two-day class presented four times at Black Hat USA and once at SANS Network Security, detailing how to perform live network traffic analysis, protocol decoding, and penetration testing to detect attacks and vulnerabilities, and then how to develop signatures for various network intrusion prevention systems to prevent these attacks.
-
Encrypted Protocol Identification via Statistical Analysis
Black Hat Briefings and ShmooCon
Presented at both Black Hat USA and ShmooCon, this talk describes research into detecting what clear-text protocol is encrypted, using still visible attributes like packet size and inter-packet delay.
Languages
-
English
Native or bilingual proficiency
-
French
Limited working proficiency
Recommendations received
7 people have recommended Rob
Join now to viewMore activity by Rob
-
Sunset tonight. It's almost like I paid those majestic deer to run through at the end. https://lnkd.in/esxTqHm6
Sunset tonight. It's almost like I paid those majestic deer to run through at the end. https://lnkd.in/esxTqHm6
Liked by Rob King
-
The U.S. Department of Energy (DOE)’s National Renewable Energy Laboratory (NREL) has released a public report summarizing the outcomes of the second…
The U.S. Department of Energy (DOE)’s National Renewable Energy Laboratory (NREL) has released a public report summarizing the outcomes of the second…
Liked by Rob King
-
🌟 Please join us in congratulating our June Employee of The Month - Doug Markiewicz! With almost 2 years of outstanding contributions, Doug's…
🌟 Please join us in congratulating our June Employee of The Month - Doug Markiewicz! With almost 2 years of outstanding contributions, Doug's…
Liked by Rob King
-
In case you missed this week's runZero Hour Episode 7, Brianna Cluck of GreyNoise Intelligence joined us as a special guest alongside HD Moore, Rob…
In case you missed this week's runZero Hour Episode 7, Brianna Cluck of GreyNoise Intelligence joined us as a special guest alongside HD Moore, Rob…
Liked by Rob King
-
These last few months, I've been sometimes doing 4-6 interviews for my team a day. Here are some strategies I've learned for surviving lots of…
These last few months, I've been sometimes doing 4-6 interviews for my team a day. Here are some strategies I've learned for surviving lots of…
Liked by Rob King
-
One of the ways formal methods can find bugs tests do not: invariant checking. Say you're making a banking program, and have a rule that no account…
One of the ways formal methods can find bugs tests do not: invariant checking. Say you're making a banking program, and have a rule that no account…
Liked by Rob King
-
I'm between consulting contracts this month, so I'm working hard on a new book: Logic for Programmers. All software developers are familiar with…
I'm between consulting contracts this month, so I'm working hard on a new book: Logic for Programmers. All software developers are familiar with…
Liked by Rob King
-
A couple of weeks ago, I graduated from University of Rochester with B.S. in Computer Science and BS Honors in Mathematics! It's been a great 4 years…
A couple of weeks ago, I graduated from University of Rochester with B.S. in Computer Science and BS Honors in Mathematics! It's been a great 4 years…
Liked by Rob King
-
I'm doing five interviews for my own team today, four of them Hiring Manager screens. Wish me luck. 😨
I'm doing five interviews for my own team today, four of them Hiring Manager screens. Wish me luck. 😨
Liked by Rob King
-
Westermo has disclosed critical vulnerabilities in their EDW-100 Serial to Ethernet converter product. CVE-2024-36081 is rated with a CVSS score of…
Westermo has disclosed critical vulnerabilities in their EDW-100 Serial to Ethernet converter product. CVE-2024-36081 is rated with a CVSS score of…
Liked by Rob King
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Rob King in United States
-
Rob King
-
Rob King
-
Rob King
-
Rob King
Senior Technical Recruiter, iStaff
-
Rob King
Visionary Tech & Innovation Leader
2386 others named Rob King in United States are on LinkedIn
See others named Rob King