SlideShare a Scribd company logo
MicheleSpagnuoloSENIOR INFORMATION SECURITY ENGINEER @ GOOGLE SWITZERLAND
Currently in Zürich, Switzerland
 (+1) 765 314 3141 |  mikispag@gmail.com |  miki.it |  mikispag |  michelespagnuolo |  mikispag
Experience
Google Zürich, Switzerland
SENIOR INFORMATION SECURITY ENGINEER Jan. 2014 - PRESENT
• Currently working on making Content Security Policy (CSP) useful in the real world to mitigate XSS vulnerabilities at scale.
• Performed security code audits and design reviews for Google/Alphabet products.
• Developed technical solutions to help mitigate classes of security vulnerabilities.
• Conducted research to identify new web attack vectors.
Spreaker (remote)
SECURITY CONSULTANT AND SYSTEM ADMINISTRATOR Jan. 2011 - Dec. 2011
• Carried out security audits, performed penetration tests and white/black-box analysis of frontend and backend systems.
• DeployedagrowingarchitectureonAWS,designedPostgreSQLdatabasereplicationwithcontinuousarchiving(warmstandbyserver).
Education
Politecnico di Milano Milan, Italy
M.S. IN ENGINEERING OF COMPUTING SYSTEMS 2011 - 2013
• 110/110 cum laude
University of Illinois at Chicago Chicago, IL, USA
M.S. IN COMPUTER SCIENCE 2011 - 2013
• GPA 4.0
Alta Scuola Politecnica Milan & Turin, Italy
ALTA SCUOLA POLITECNICA DIPLOMA 2011 - 2013
Projects
Rosetta Flash
BEAT SAME ORIGIN POLICY PLAYING WITH BYTES Jul. 2014
• Combine DEFLATE, Flash, and JSONP in a creative way and break the web! Working with Adobe and popular web frameworks, I
prevented sensitive data exfiltration and forged authenticated requests in most of the modern web.
• Presented at major international conferences, nominated for a Pwnie Award and voted in the Whitesec Top 5 vulnerabilities.
BitIodine
EXTRACT KNOWLEDGE FROM THE BITCOIN BLOCK CHAIN 2013 - 2015
• Perform complex queries on Bitcoin transactions, group addresses together by controlling entity, and much more.
• Used by lawyers, malware analysts and law enforcement to investigate the Silk Road case, CryptoLocker and the Mt. Gox scandal.
• Served as a base for professional Bitcoin forensic frameworks.
Publications
CSP is Dead, Long Live CSP: On the Insecurity of Whitelists and the Future
of the Content Security Policy
2016
PROCEEDINGS OF THE 23RD ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM L. Weichselbaum, M. Spagnuolo, S. Lekies, A. Janc
BitIodine: Extracting intelligence from the Bitcoin network 2014
INTERNATIONAL CONFERENCE ON FINANCIAL CRYPTOGRAPHY AND DATA SECURITY M. Spagnuolo, F. Maggi, S. Zanero
JANUARY 21, 2017 MICHELE SPAGNUOLO · RÉSUMÉ 1
Honors & Awards
AWARDS
2014 Internet Bug Bounty, for Rosetta Flash, in the Adobe Flash category
2014 Nomination, Pwnie Awards, for Rosetta Flash
SECURITY HALLS OF FAME
2011 - … Google, Twitter, Opera, eBay, Tumblr, Nokia, Shopify, Mailchimp, Starbucks, …
Conferences
Global Conference on Money Laundering and Digital Currencies Doha, Qatar
EXTRACTING KNOWLEDGE FROM CRYPTOCURRENCIES Jan. 2017
IEEE SecDev Boston, USA
ADOPTING STRICT CONTENT SECURITY POLICY FOR XSS PROTECTION Nov. 2016
ACM CCS Vienna, Austria
CSP IS DEAD, LONG LIVE CSP: ON THE INSECURITY OF WHITELISTS AND THE FUTURE OF THE CONTENT
SECURITY POLICY
Oct. 2016
OWASP AppSecEU & Area41 & VOXXED Days Rome, Italy & Zürich, Switzerland
MAKING CSP GREAT AGAIN! Apr. - Jun. 2016
Hack In The Box Amsterdam, The Netherlands
CSP ODDITIES May 2016
OWASP AppSecEU Amsterdam, The Netherlands
ROSETTA FLASH May 2015
Tetcon Saigon, Vietnam
ROSETTA FLASH Jan 2015
Hack In The Box Kuala Lumpur, Malaysia
ROSETTA FLASH May 2015
IFCA Financial Cryptography and Data Security Christ Church, Barbados
BITIODINE: EXTRACTING INTELLIGENCE FROM THE BITCOIN NETWORK Mar. 2014
CVEs
2016 CVE-2016-4167 (Adobe DNG SDK)
2014
CVE-2014-4671, CVE-2014-5333, CVE-2015-3042 (Adobe Flash), CVE-2014-4500 (libicu), CVE-2014-8962, CVE-2014-9028
(libFLAC), CVE-2014-8964 (PCRE), CVE-2014-8145 (sox), CVE-2014-8139, CVE-2014-8140, CVE-2015-8141 (unzip)
Skills
Web Security Deep understanding of web security, mitigations, and the Open Web Platform (OWP).
Coding Fluent in Java, C(++), Go, Rust, Python, JS (Closure), PHP, Delphi, and scripting languages.
Languages Perfect English and Italian, basic German and Swiss German.
JANUARY 21, 2017 MICHELE SPAGNUOLO · RÉSUMÉ 2

More Related Content

What's hot

1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
Anton Chuvakin
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
Michael Boman
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
 
Gets cisco security training
Gets cisco security trainingGets cisco security training
Gets cisco security training
qosnetworking
 
Machine Learning implications in Security
Machine Learning implications in SecurityMachine Learning implications in Security
Machine Learning implications in Security
Big Data Value Association
 
Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013
Dave Eilken
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber Crime
Rahul Neel Mani
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
Rahul Neel Mani
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic Security
Elasticsearch
 
Public cloud data protection
Public cloud data protectionPublic cloud data protection
Public cloud data protection
Ulf Mattsson
 
Webinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy WebinarWebinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy Webinar
Blueliv
 
Brute Force Attack Network Project Ideas
Brute Force Attack Network Project IdeasBrute Force Attack Network Project Ideas
Brute Force Attack Network Project Ideas
Network Simulation Tools
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
Adi Saputra
 
Webinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanWebinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking Trojan
Blueliv
 
George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)
PROBOTEK
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattsson
Ulf Mattsson
 

What's hot (20)

1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Gets cisco security training
Gets cisco security trainingGets cisco security training
Gets cisco security training
 
Machine Learning implications in Security
Machine Learning implications in SecurityMachine Learning implications in Security
Machine Learning implications in Security
 
Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber Crime
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic Security
 
Public cloud data protection
Public cloud data protectionPublic cloud data protection
Public cloud data protection
 
Webinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy WebinarWebinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy Webinar
 
Brute Force Attack Network Project Ideas
Brute Force Attack Network Project IdeasBrute Force Attack Network Project Ideas
Brute Force Attack Network Project Ideas
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 
Webinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanWebinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking Trojan
 
George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattsson
 

Similar to CV | Michele Spagnuolo

What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
Ulf Mattsson
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
Carlos Chalico
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
Fabio Ghezzi
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PROIDEA
 
SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...
SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...
SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...
South Tyrol Free Software Conference
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
APNIC
 
MichaelParker(2)
MichaelParker(2)MichaelParker(2)
MichaelParker(2)
Michael Parker
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
Anastasija Nikiforova
 
kyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terrorkyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terror
PacSecJP
 
CPA presentation: Fintech, blockchain and crypto
CPA presentation: Fintech, blockchain and cryptoCPA presentation: Fintech, blockchain and crypto
CPA presentation: Fintech, blockchain and crypto
Joseph Pham
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
Ulf Mattsson
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
pbink
 
Question of trust
Question of trustQuestion of trust
Question of trust
ssuserd8f6cf1
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
alvin chin
 
Cv luca nizzardo_full
Cv luca nizzardo_fullCv luca nizzardo_full
Cv luca nizzardo_full
Luca Nizzardo, PhD
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
Nixu Corporation
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
Guido Schmutz
 

Similar to CV | Michele Spagnuolo (20)

What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...
SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...
SFSCON23 - Carlo Falciola - Opensource to help increase organizations Cyberse...
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
MichaelParker(2)
MichaelParker(2)MichaelParker(2)
MichaelParker(2)
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
 
kyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terrorkyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terror
 
CPA presentation: Fintech, blockchain and crypto
CPA presentation: Fintech, blockchain and cryptoCPA presentation: Fintech, blockchain and crypto
CPA presentation: Fintech, blockchain and crypto
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Question of trust
Question of trustQuestion of trust
Question of trust
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Cv luca nizzardo_full
Cv luca nizzardo_fullCv luca nizzardo_full
Cv luca nizzardo_full
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
 

Recently uploaded

How to write job description to attract talents
How to write job description to attract talentsHow to write job description to attract talents
How to write job description to attract talents
recruitment2015
 
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
mesfe
 
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
mshd9m30
 
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
mshd9m30
 
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
akhxc
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
Aggregage
 
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
mshd9m30
 
Webinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation StrategyWebinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation Strategy
PayScale, Inc.
 

Recently uploaded (8)

How to write job description to attract talents
How to write job description to attract talentsHow to write job description to attract talents
How to write job description to attract talents
 
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
 
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
高仿迈阿密大学毕业证(um毕业证)硕士文凭证书原版一模一样
 
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
原版制作英属哥伦比亚大学毕业证研究生文凭证书原版一模一样
 
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
学校原版(curtin毕业证书)澳洲科廷科技大学毕业证双学位证书原版一模一样
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
 
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
加急制作美国密歇根州立大学毕业证(msu毕业证书)本科文凭原版一模一样
 
Webinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation StrategyWebinar - How to Craft a Winning Compensation Strategy
Webinar - How to Craft a Winning Compensation Strategy
 

CV | Michele Spagnuolo

  • 1. MicheleSpagnuoloSENIOR INFORMATION SECURITY ENGINEER @ GOOGLE SWITZERLAND Currently in Zürich, Switzerland  (+1) 765 314 3141 |  mikispag@gmail.com |  miki.it |  mikispag |  michelespagnuolo |  mikispag Experience Google Zürich, Switzerland SENIOR INFORMATION SECURITY ENGINEER Jan. 2014 - PRESENT • Currently working on making Content Security Policy (CSP) useful in the real world to mitigate XSS vulnerabilities at scale. • Performed security code audits and design reviews for Google/Alphabet products. • Developed technical solutions to help mitigate classes of security vulnerabilities. • Conducted research to identify new web attack vectors. Spreaker (remote) SECURITY CONSULTANT AND SYSTEM ADMINISTRATOR Jan. 2011 - Dec. 2011 • Carried out security audits, performed penetration tests and white/black-box analysis of frontend and backend systems. • DeployedagrowingarchitectureonAWS,designedPostgreSQLdatabasereplicationwithcontinuousarchiving(warmstandbyserver). Education Politecnico di Milano Milan, Italy M.S. IN ENGINEERING OF COMPUTING SYSTEMS 2011 - 2013 • 110/110 cum laude University of Illinois at Chicago Chicago, IL, USA M.S. IN COMPUTER SCIENCE 2011 - 2013 • GPA 4.0 Alta Scuola Politecnica Milan & Turin, Italy ALTA SCUOLA POLITECNICA DIPLOMA 2011 - 2013 Projects Rosetta Flash BEAT SAME ORIGIN POLICY PLAYING WITH BYTES Jul. 2014 • Combine DEFLATE, Flash, and JSONP in a creative way and break the web! Working with Adobe and popular web frameworks, I prevented sensitive data exfiltration and forged authenticated requests in most of the modern web. • Presented at major international conferences, nominated for a Pwnie Award and voted in the Whitesec Top 5 vulnerabilities. BitIodine EXTRACT KNOWLEDGE FROM THE BITCOIN BLOCK CHAIN 2013 - 2015 • Perform complex queries on Bitcoin transactions, group addresses together by controlling entity, and much more. • Used by lawyers, malware analysts and law enforcement to investigate the Silk Road case, CryptoLocker and the Mt. Gox scandal. • Served as a base for professional Bitcoin forensic frameworks. Publications CSP is Dead, Long Live CSP: On the Insecurity of Whitelists and the Future of the Content Security Policy 2016 PROCEEDINGS OF THE 23RD ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM L. Weichselbaum, M. Spagnuolo, S. Lekies, A. Janc BitIodine: Extracting intelligence from the Bitcoin network 2014 INTERNATIONAL CONFERENCE ON FINANCIAL CRYPTOGRAPHY AND DATA SECURITY M. Spagnuolo, F. Maggi, S. Zanero JANUARY 21, 2017 MICHELE SPAGNUOLO · RÉSUMÉ 1
  • 2. Honors & Awards AWARDS 2014 Internet Bug Bounty, for Rosetta Flash, in the Adobe Flash category 2014 Nomination, Pwnie Awards, for Rosetta Flash SECURITY HALLS OF FAME 2011 - … Google, Twitter, Opera, eBay, Tumblr, Nokia, Shopify, Mailchimp, Starbucks, … Conferences Global Conference on Money Laundering and Digital Currencies Doha, Qatar EXTRACTING KNOWLEDGE FROM CRYPTOCURRENCIES Jan. 2017 IEEE SecDev Boston, USA ADOPTING STRICT CONTENT SECURITY POLICY FOR XSS PROTECTION Nov. 2016 ACM CCS Vienna, Austria CSP IS DEAD, LONG LIVE CSP: ON THE INSECURITY OF WHITELISTS AND THE FUTURE OF THE CONTENT SECURITY POLICY Oct. 2016 OWASP AppSecEU & Area41 & VOXXED Days Rome, Italy & Zürich, Switzerland MAKING CSP GREAT AGAIN! Apr. - Jun. 2016 Hack In The Box Amsterdam, The Netherlands CSP ODDITIES May 2016 OWASP AppSecEU Amsterdam, The Netherlands ROSETTA FLASH May 2015 Tetcon Saigon, Vietnam ROSETTA FLASH Jan 2015 Hack In The Box Kuala Lumpur, Malaysia ROSETTA FLASH May 2015 IFCA Financial Cryptography and Data Security Christ Church, Barbados BITIODINE: EXTRACTING INTELLIGENCE FROM THE BITCOIN NETWORK Mar. 2014 CVEs 2016 CVE-2016-4167 (Adobe DNG SDK) 2014 CVE-2014-4671, CVE-2014-5333, CVE-2015-3042 (Adobe Flash), CVE-2014-4500 (libicu), CVE-2014-8962, CVE-2014-9028 (libFLAC), CVE-2014-8964 (PCRE), CVE-2014-8145 (sox), CVE-2014-8139, CVE-2014-8140, CVE-2015-8141 (unzip) Skills Web Security Deep understanding of web security, mitigations, and the Open Web Platform (OWP). Coding Fluent in Java, C(++), Go, Rust, Python, JS (Closure), PHP, Delphi, and scripting languages. Languages Perfect English and Italian, basic German and Swiss German. JANUARY 21, 2017 MICHELE SPAGNUOLO · RÉSUMÉ 2