Valid HTML 3.2!

Peter Ferrie
("qkumba" on HackZApple, Pouet, EXETools, and CSA2)
("peterferrie" on OpenRCE, DOSBox, Reddit, and GitHub)
("peter ferrie" on MAME Dev, Tuts4You, StackExchange, Bannister, and CFFA)
("san inc." on Asimov)

virus researcher, reverse-engineer and software preservationist
email: peter.ferrie@gmail.com


Wizard of Oz





NEWS

Oct 17: 0boot v3 is released.
July 21: Porting the Z1-Z5 interpreters to ProDOS (KansasFest 2018).
July 15: ProRWTS2 finally released.
November 10: Gimli permutation in 112 bytes.
August 30: From Diversi-DOS to Directi-DOS and the creation of 4LIVE (Oz KFest 2017).




SH!T THAT I SAID




BIO

Peter Ferrie began working with computers in 1981.
In 1986, he began developing anti-virus software for Apple II PCs.
From 1992-1998, he worked for an Australian distributor of anti-virus software for IBM PCs, first McAfee Viruscan then Frisk F-Prot.
From 1998-2000, he worked for Frisk Software International in Iceland.
From 2000-2003, he worked for Symantec Corporation in Australia.
From 2003-2008, he worked for Symantec Corporation in the USA.
From 2008-2016, he worked for Microsoft Corporation in the USA.
From 2016-2020, he worked for Symantec/Broadcom Corporation.
In 2020, he joined Amazon.

Ferrie specialises in the analysis of Win32/Win64/Linux/script malware, reverse engineering code on multiple platforms, and development of (anti-)emulators, (anti-)unpackers, (anti-)debuggers, and anti-rootkit technologies.
He has been a speaker at various conferences. He is the most frequent contributor ever to the Virus Bulletin journal, supplying over 100 articles in 13 years.
He joined CARO (Computer Anti-virus Research Organisation) in 2001.
He received the Virus Bulletin 2010 award for greatest contribution to anti-malware in the last 10 years.




COMPANY PRESENTATIONS

2011 2010 2009 2008 2007




CONFERENCE PAPERS

Porting the Z1-Z5 interpreters to ProDOS (slides) - KansasFest, July 2018, Kansas City

2017 2010 2008 2007 2006 2004 2001




INTERNATIONAL PUBLICATIONS

2016 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001




UNPUBLISHED

2018 2011 2004




SECURITY

Crypto: AES-256, Bel-T, BLAKE2s, ChaCha, DES, Gimli permutation, Half SipHash, HC-256, Kuznyechik, Modular exponentiation, Poly1305, Rabbit, RC6, Salsa20, Serpent-256, SHA-3/Keccak, Twofish-256

Shellcode: x86/x64 Shellcode development

Advisories: 2011 2010 2009 2008 2007 2005 2004 2002 2001




LOW-LEVEL

2015 2014 2013 2011 2010 2009 2007




FUN STUFF

The "Life In ..." series
My favourite demos
My favourite games
Compatibility fixes for demos and games
Old games that I finally beat
My Brøderbund info
My Infocom info
My Mindscape info
Scan of the Month 33




TINY CODE

Apple II stuff
Old coding stuff
Intel stuff
Every potentially executable field in a PE header




GREETINGS

painters: 007, Angel, Aster, Banish, Bizar, Chams, Custom, Droogie (gallery), Dys, Kagent, Kaine, Kerupt, KOS, Mister E, Orsam, RCF, Ree, Rize, Sink, TPee, Unique (Sinz, Spice)
Apple II: Colwyn, Home Hacker, Maz, Prototype (not the ex-virus writer on IBM PCs) (Bandits, Plasmania), Rebel, San Inc (Karateka side A, Karateka side B), Seroster, TCS, TTT


LINKS

Painters: 50mm Los Angeles
Apple II: Asimov (ftp), HackZApple
Comics: 9 Chickweed Lane, Baby Blues, General Protection Fault, Liō, Sinfest, User Friendly, Fowl Language, Blue Chair
Other: Oldskool, Old School ;-)

Is your HTML standards-compliant? Find out

Copyright (c) 1998-2020 Peter Ferrie
All rights reserved
Virus Bulletin article copyrights are held by Virus Bulletin Ltd,
but made available on this site for personal use free of charge
by permission of Virus Bulletin

I'm a Technical Advisor for "Silent Runners.vbs" - use it to find out what starts up with Windows!