Peter Ferrie
("qkumba" on HackZApple, Pouet, EXETools, and CSA2)
("peterferrie" on OpenRCE, DOSBox, Reddit, and GitHub)
("peter ferrie" on MAME Dev, Tuts4You, StackExchange, Bannister, and CFFA)
("san inc." on Asimov)
virus researcher, reverse-engineer and software preservationist
email: peter.ferrie@gmail.com
NEWS
Oct 17: 0boot v3 is released.
July 21: Porting the Z1-Z5 interpreters to ProDOS (KansasFest 2018).
July 15: ProRWTS2 finally released.
November 10: Gimli permutation in 112 bytes.
August 30: From Diversi-DOS to Directi-DOS and the creation of 4LIVE (Oz KFest 2017).
BIO
Peter Ferrie began working with computers in 1981.
In 1986, he began developing anti-virus software for Apple II PCs.
From 1992-1998, he worked for an Australian distributor of anti-virus software for IBM PCs, first McAfee Viruscan then Frisk F-Prot.
From 1998-2000, he worked for Frisk Software International in Iceland.
From 2000-2003, he worked for Symantec Corporation in Australia.
From 2003-2008, he worked for Symantec Corporation in the USA.
From 2008-2016, he worked for Microsoft Corporation in the USA.
From 2016-2020, he worked for Symantec/Broadcom Corporation.
In 2020, he joined Amazon.
Ferrie specialises in the analysis of Win32/Win64/Linux/script malware, reverse engineering code on multiple platforms, and development of (anti-)emulators, (anti-)unpackers, (anti-)debuggers, and anti-rootkit technologies.
He has been a speaker at various conferences. He is the most frequent contributor ever to the Virus Bulletin journal, supplying over 100 articles in 13 years.
He joined CARO (Computer Anti-virus Research Organisation) in 2001.
He received the Virus Bulletin 2010 award for greatest contribution to anti-malware in the last 10 years.
COMPANY PRESENTATIONS
CONFERENCE PAPERS
Porting the Z1-Z5 interpreters to ProDOS (slides) - KansasFest, July 2018, Kansas City
2017 2010 2008 2007 2006 2004 2001
INTERNATIONAL PUBLICATIONS
2016 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001
UNPUBLISHED
SECURITY
Crypto: AES-256, Bel-T, BLAKE2s, ChaCha, DES, Gimli permutation, Half SipHash, HC-256, Kuznyechik, Modular exponentiation, Poly1305, Rabbit, RC6, Salsa20, Serpent-256, SHA-3/Keccak, Twofish-256
Shellcode: x86/x64 Shellcode development
Advisories: 2011 2010 2009 2008 2007 2005 2004 2002 2001
LOW-LEVEL
2015 2014 2013 2011 2010 2009 2007
FUN STUFF
The "Life In ..." series
My favourite demos
My favourite games
Compatibility fixes for demos and games
Old games that I finally beat
My Brøderbund info
My Infocom info
My Mindscape info
Scan of the Month 33
TINY CODE
Apple II stuff
Old coding stuff
Intel stuff
Every potentially executable field in a PE header
GREETINGS
painters: 007, Angel, Aster, Banish, Bizar, Chams, Custom, Droogie (gallery), Dys, Kagent, Kaine, Kerupt, KOS, Mister E, Orsam, RCF, Ree, Rize, Sink, TPee, Unique (Sinz, Spice)
Apple II: Colwyn, Home Hacker, Maz, Prototype (not the ex-virus writer on IBM PCs) (Bandits, Plasmania), Rebel, San Inc (Karateka side A, Karateka side B), Seroster, TCS, TTT
LINKS
Painters: 50mm Los Angeles
Apple II: Asimov (ftp), HackZApple
Comics: 9 Chickweed Lane, Baby Blues, General Protection Fault, Liō, Sinfest, User Friendly, Fowl Language, Blue Chair
Other: Oldskool, Old School ;-)
Is your HTML standards-compliant? Find out
Copyright (c) 1998-2020 Peter Ferrie
All rights reserved
Virus Bulletin article copyrights are held by Virus Bulletin Ltd,
but made available on this site for personal use free of charge
by permission of Virus Bulletin