blob: 00623b0f630a07fed4f66cf5ca91b5d7df82394c [file] [log] [blame]
page.title=Android Security Acknowledgements
@jd:body
<!--
Copyright 2015 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<div id="qv-wrapper">
<div id="qv">
<h2>In this document</h2>
<ol id="auto-toc">
</ol>
</div>
</div>
<p>The Android Security Team would like to thank the following people and
parties for helping to improve Android security. They have done this either by
finding and responsibly reporting security vulnerabilities through the AOSP bug
tracker <a
href="https://code.google.com/p/android/issues/entry?template=Security%20bug%20report">Security
bug report</a> template or by committing code that has a positive
impact on Android security, including code that qualifies
for the <a href="https://www.google.com/about/appsecurity/patch-rewards/">Patch
Rewards</a> program.</p>
<h2 id="2017">2017</h2>
<div style="LINE-HEIGHT:25px;">
<p>Alexander Potapenko of Google Dynamic Tools team</p>
<p>Alexandru Blanda</p>
<p>Baozeng Ding of Alibaba Mobile Security Group</p>
<p>Ben Actis (<a href="https://twitter.com/ben_ra">@Ben_RA</a>)</p>
<p>Billy Lau of Android Security</p>
<p>Chenfu Bao (包沉浮) of Baidu X-Lab (百度安全实验室)</p>
<p>Chengming Yang of Alibaba Mobile Security Group</p>
<p>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>)
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p><a href="mailto:[email protected]">Dacheng Shao</a>
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>Daniel Dakhno</p>
<p>Daniel Micay of Copperhead Security</p>
<p>Daxing Guo (<a href="https://twitter.com/freener0">@freener0</a>) of Xuanwu
Lab, Tencent</p>
<p><a href="mailto:[email protected]">derrek</a>
(<a href="https://twitter.com/derrekr6">@derrekr6</a>)</p>
<p>Di Shen (<a href="https://twitter.com/returnsme">@returnsme</a>) of KeenLab
(<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p>
<p>donfos (Aravind Machiry) of Shellphish Grill Team, UC Santa Barbara</p>
<p><a href="http://www.linkedin.com/in/dzima">Dzmitry Lukyanenka</a></p>
<p>En He (<a href="http://twitter.com/heeeeen4x">@heeeeen4x</a>) of
<a href="http://www.ms509.com">MS509Team</a></p>
<p>Fang Chen of Sony Mobile Communications Inc.</p>
<p>Frank Liberato of Chrome</p>
<p>Gal Beniamini of Project Zero</p>
<p>Gengjia Chen (<a href="https://twitter.com/chengjia4574">@chengjia4574</a>)
of IceSword Lab, Qihoo 360 Technology Co. Ltd.</p>
<p>Google WebM Team</p>
<p>Guang Gong (龚广) (<a href="http://twitter.com/oldfresher">@oldfresher</a>) of
Alpha Team, <a href="http://www.360.com">Qihoo 360 Technology Co. Ltd.</a></p>
<p>Guangdong Bai of Singapore Institute of Technology (SIT)</p>
<p><a href="mailto:[email protected]">Hanxiang Wen</a> of <a
href="http://c0reteam.org">C0RE Team</a></p>
<p>Hao Chen of Alpha Team, Qihoo 360 Technology Co. Ltd.</p>
<p>Hiroki Yamamoto of Sony Mobile Communications Inc.</p>
<p><a href="mailto:[email protected]">Hongli Han</a> of
<a href="http://c0reteam.org">C0RE Team</a></p>
<p>Jeff Sharkey of Google</p>
<p>Jeff Trim</p>
<p>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) of <a
href="https://skyeye.360safe.com">Qihoo 360 Skyeye Labs</a></p>
<p>Jianqiang Zhao (<a href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>)
of IceSword Lab, Qihoo 360</p>
<p>Jon Sawyer (<a href="http://twitter.com/jcase">@jcase</a>)</p>
<p>Jun Cheng of Alibaba Inc.</p>
<p>Lenx Wei (韦韬) of Baidu X-Lab (百度安全实验室)</p>
<p><a href="mailto:[email protected]">Lubo Zhang</a>
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>ma.la of LINE Corporation</p>
<p>Makoto Onuki of Google</p>
<p>Max Spector of Google:</p>
<p>Michael Goberman of IBM Security X-Force</p>
<p>Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>)
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>Monk Avel</p>
<p>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>)
of Tesla Motors Product Security Team</p>
<p>Nikolay Elenkov of LINE Corporation</p>
<p>Ning You of Alibaba Mobile Security Group</p>
<p>Peng Xiao of Alibaba Mobile Security Group</p>
<p>Pengfei Ding (丁鹏飞) of Baidu X-Lab (百度安全实验室)</p>
<p>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>)
of Trend Micro</p>
<p><a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360
Technology Co. Ltd.</p>
<p>Qidan He (何淇丹) (<a href="https://twitter.com/flanker_hqd">@flanker_hqd</a>)
of KeenLab, Tencent (腾讯科恩实验室)</p>
<p>Qing Zhang of Qihoo 360</p>
<p>Quhe of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)</p>
<p>Roee Hay of IBM Security X-Force</p>
<p>Sagi Kedmi of IBM X-Force Research</p>
<p><a href="mailto:[email protected]">Sahara</a> of Secure
Communications in DarkMatter</p>
<p>salls (<a href="https://twitter.com/chris_salls">@chris_salls</a>) of
Shellphish Grill Team, UC Santa Barbara</p>
<p>Scott Bauer (<a href="http://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</p>
<p>Sean Beaupre (<a href="https://twitter.com/firewaterdevs">@firewaterdevs</a>)</p>
<p>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) of
Trend Micro Mobile Threat Research Team</p>
<p>Shinichi Matsumoto of Fujitsu</p>
<p><a href="mailto:[email protected]">Stéphane Marques</a> of <a
href="http://www.byterev.com">ByteRev</a></p>
<p>Stephen Morrow</p>
<p>Svetoslav Ganov of Google</p>
<p><a href="mailto:[email protected]">Tong Lin</a>
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of Mobile Threat
Research Team, <a href="http://www.trendmicro.com">Trend Micro</a></p>
<p>wanchouchou of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)</p>
<p>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of
Alibaba Inc.</p>
<p><a href="mailto:[email protected]">Wenke Dou</a> of
<a href="http://c0reteam.org">C0RE Team</a></p>
<p>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>)
(<a href="http://www.weibo.com/wishlinux">吴潍浠</a> 此彼) of Ant-financial Light-Year
Security Lab</p>
<p><a href="mailto:[email protected]">Xiaodong Wang</a>
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>Xuxian Jiang of <a href="http://c0reteam.org">C0RE Team</a></p>
<p><a href="mailto:[email protected]">Yanfeng Wang</a>
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>Yang Song of Alibaba Mobile Security Group</p>
<p><a href="mailto:[email protected]">Yao Jun</a> of
<a href="http://c0reteam.org">C0RE Team</a></p>
<p>Yong Wang (王勇) (<a href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>)
of Alibaba Inc.</p>
<p>Yu Pan of Vulpecker Team, Qihoo 360 Technology Co. Ltd</p>
<p><a href="mailto:[email protected]">Yuan-Tsung Lo</a> of
<a href="http://c0reteam.org">C0RE Team</a></p>
<p>Yuqi Lu (<a href="https://twitter.com/nikos233__">@nikos233</a>)
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of
Tencent Security Platform Department</p>
<p>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of
Security Research Lab, <a href="http://www.cmcm.com/">Cheetah Mobile</a></p>
<p><a href="mailto:[email protected]">Zhen Zhou</a> (
<a href="https://twitter.com/henices">@henices</a>) of
<a href="http://www.nsfocus.com">NSFocus</a></p>
<p><a href="mailto:[email protected]">Zhixin Li</a> of
<a href="http://www.nsfocus.com">NSFocus</a></p>
</div>
<h2 id="2016">2016</h2>
<div style="LINE-HEIGHT:25px;">
<p>Abhishek Arya of Google Chrome Security Team</p>
<p>Adam Donenfeld et al. of Check Point Software Technologies Ltd.</p>
<p>Adam Powell of Google</p>
<p>Alex Chapman of Context Information Security</p>
<p>Altaf Shaik of <a
href="http://www.isti.tu-berlin.de/security_in_telecommunications">Security in
Telecommunications</a></p>
<p>Andre Teixeira Rizzo</p>
<p>Andrea Biondo</p>
<p>Andrei Kapishnikov of Google</p>
<p>Andy Tyler (<a href="https://twitter.com/ticarpi">@ticarpi</a>) of
<a href="https://www.e2e-assure.com">e2e-assure</a></p>
<p>Anestis Bechtsoudis (<a href="https://twitter.com/anestisb">@anestisb</a>) of CENSUS S.A.</p>
<p>Ao Wang (<a href="https://twitter.com/ArayzSegment">@ArayzSegment</a>) of
<a href="http://www.pkav.net">PKAV</a>, Silence Information Technology</p>
<p>Askyshang of Security Platform Department, Tencent</p>
<p>Baozeng Ding of Alibaba Mobile Security Group</p>
<p>Ben Hawkes of Google Project Zero</p>
<p>Billy Lau of Android Security</p>
<p>Brad Ebinger of Google Telecom Team</p>
<p>Broadgate Team</p>
<p>Chad Brubaker of Android Security</p>
<p>Chao Yang of Alibaba Mobile Security Group</p>
<p>Chenfu Bao (包沉浮) of Baidu X-Lab</p>
<p>Chengming Yang of Alibaba Mobile Security Group</p>
<p><a href="mailto:[email protected]">Chi Zhang</a> of <a
href="http://c0reteam.org">C0RE Team</a></p>
<p>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>) of
<a href="http://c0reteam.org">C0RE Team</a> from <a href="http://www.360safe.com/">Qihoo 360</a></p>
<p>Christian Seel</p>
<p>Christopher Tate of Google</p>
<p><a href="mailto:[email protected]">Constantinos Patsakis</a> of University
of Piraeus</p>
<p>Cory Pruce of Carnegie Mellon University</p>
<p>Cristiano Giuffrida of Vrije Universiteit Amsterdam</p>
<p>Daniel Micay of Copperhead Security</p>
<p>David Benjamin of Google</p>
<p>David Riley of the Google Pixel C Team</p>
<p>Dawei Peng (<a href="http://weibo.com/u/5622360291">Vinc3nt4H</a>) of
<a href="http://jaq.alibaba.com">Alibaba Mobile Security Team</a></p>
<p>Di Shen (<a href="https://twitter.com/returnsme">&#64;returnsme</a>) of KeenLab
(<a href="https://twitter.com/keen_lab">&#64;keen_lab</a>), Tencent</p>
<p>Dianne Hackborn of Google</p>
<p>Dmitry Vyukov of Google Dynamic Tools team</p>
<p>Dominik Schürmann of <a href="https://www.ibr.cs.tu-bs.de">Institute for
Operating Systems and Computer Networks</a>, TU Braunschweig</p>
<p><a href="mailto:[email protected]">Dongdong She</a> of UC Riverside</p>
<p>Dongkwan Kim (<a href="mailto:[email protected]">[email protected]</a>) of System Security Lab, KAIST</p>
<p>dosomder</p>
<p>dragonltx of Alibaba mobile security team</p>
<p>DS</p>
<p>Dzmitry Lukyanenka (<a href="http://www.linkedin.com/in/dzima">www.linkedin.com/in/dzima</a>)</p>
<p>Ecular Xu (徐健) of Trend Micro</p>
<p><a href="mailto:[email protected]">Efthimios Alepis</a> of University of Piraeus</p>
<p>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) of <a
href="http://www.ms509.com">MS509Team</a></p>
<p>Gal Beniamini (<a href="https://twitter.com/@laginimaineb">@laginimaineb</a>,
<a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p>
<p>Gengjia Chen (<a href="https://twitter.com/@chengjia4574">@chengjia4574</a>)
of Lab 0x031E, Qihoo 360 Technology Co. Ltd</p>
<p>Gengming Liu (刘耕铭) (<a href="http://twitter.com/dmxcsnsbh">@dmxcsnsbh</a>)
of KeenLab, Tencent</p>
<p><a href="mailto:[email protected]">George Piskas</a> of
<a href="https://www.epfl.ch">École polytechnique fédérale de Lausanne</a></p>
<p>Giovanni Vigna of University of California, Santa Barbara</p>
<p>Greg Kaiser of Google Android Team</p>
<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>)
of <a href="http://www.360.com/">Qihoo 360 Technology Co. Ltd.</a></p>
<p><a href="mailto:[email protected]">Hang Zhang</a> of UC Riverside</p>
<p><a href="mailto:[email protected]">Hanxiang Wen</a> of <a
href="http://c0reteam.org">C0RE Team</a></p>
<p>Hao Chen of Vulpecker Team, Qihoo 360 Technology Co. Ltd.</p>
<p>Hao Qin of Security Research Lab, <a href="http://www.cmcm.com">Cheetah Mobile</a></p>
<p>Herbert Bos of Vrije Universiteit Amsterdam</p>
<p>Hongil Kim (<a href="mailto:[email protected]">[email protected]</a>) of System Security Lab, KAIST</p>
<p>Imre Rad of <a href="http://www.search-lab.hu/">Search-Lab Ltd.</a></p>
<p><a href="http://www.iwobanas.com">Iwo Banas</a></p>
<p>Jake Valletta of Mandiant, a FireEye company</p>
<p>James Forshaw of Google Project Zero</p>
<p>Jann Horn (<a href="https://thejh.net/">https://thejh.net</a>)</p>
<p><a href="http://keybase.io/jasonrogena">Jason Rogena</a></p>
<p>Jeremy C. Joslin of Google</p>
<p>jfang of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p>
<p>Jianqiang Zhao (<a href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) of IceSword Lab, Qihoo 360</p>
<p>Joshua Drake (<a href="https://twitter.com/jduck">@jduck</a>)</p>
<p>Jouni Malinen PGP id EFC895FA</p>
<p>Kai Lu (<a href="https://twitter.com/K3vinLuSec">@K3vinLuSec</a>) of
Fortinet's FortiGuard Labs</p>
<p>Kandala Shivaram reddy</p>
<p>Kaveh Razavi of Vrije Universiteit Amsterdam</p>
<p>Kenny Root of Google</p>
<p>Lee Campbell of Google</p>
<p><a href="mailto:[email protected]">Lubo Zhang</a> of <a
href="http://c0reteam.org">C0RE Team</a></p>
<p>Maciej Szawłowski of the Google Security Team</p>
<p>Madhu Priya Murugan of CISPA, Saarland University</p>
<p>Makoto Onuki of Google</p>
<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of KeenLab
(<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p>
<p>Marco Nelissen of Google</p>
<p>Mark Brand of Google Project Zero</p>
<p>Mark Renouf of Google</p>
<p>Martin Barbella of Google Chrome Security Team</p>
<p>Martina Lindorfer of University of California, Santa Barbara</p>
<p>Max Spector of Google</p>
<p>MengLuo Gou (<a href="https://twitter.com/idhyt3r">@idhyt3r</a>) of Bottle
Tech</p>
<p>Michał Bednarski (<a href="https://github.com/michalbednarski">github.com/michalbednarski</a>)</p>
<p>Mike Maarse</p>
<p>Min Chong of Android Security</p>
<p>Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>)
of <a href="http://c0reteam.org">C0RE Team</a>, <a href="http://www.360safe.com/">Qihoo 360</a></p>
<p>Miriam Gershenson of Google</p>
<p>Nancy Wang of Vertu Corporation LTD</p>
<p><a href="mailto:[email protected]">Nasim Zamir</a></p>
<p>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of
Tesla Motors Product Security Team</p>
<p>Nico Golde (<a href="https://twitter.com/iamnion">@iamnion</a>) of Qualcomm Product Security Initiative</p>
<p>Nightwatch Cybersecurity Research
(<a href="https://twitter.com/nightwatchcyber">@nightwatchcyber</a>)</p>
<p>Ning You of Alibaba Mobile Security Group</p>
<p>Oleksiy Vyalov of Google</p>
<p>Oliver Chang of Google Chrome Security Team</p>
<p>Paul Stone of Context Information Security</p>
<p>Peng Xiao of Alibaba Mobile Security Group</p>
<p>Pengfei Ding (丁鹏飞) of Baidu X-Lab</p>
<p>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of Trend Micro</p>
<a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360</p>
<p>Quan Nguyen of Google Information Security Engineer Team</p>
<p>Qianwei Hu (<a href="mailto:[email protected]">[email protected]</a>) of
<a href="http://www.wooyun.org/">WooYun TangLab</a></p>
<p>Qidan He (<a href="https://twitter.com/@Flanker_hqd">@Flanker_hqd</a>) of
KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p>
<p>Richard Shupak</p>
<p>Ricky Wai of Google</p>
<p>Robin Lee of Google</p>
<p>Roee Hay, IBM Security X-Force Researcher</p>
<p>Roeland Krak</p>
<p>Romain Trouvé (<a href="https://twitter.com/bouuntyyy">@bouuntyyy)</a> of
<a href="https://labs.mwrinfosecurity.com/">MWR Labs</a></p>
<p>Ronald L. Loor Vargas (<a href="https://twitter.com/loor_rlv">@loor_rlv</a>)
of TEAM Lv51</p>
<p>Sagi Kedmi, IBM Security X-Force Researcher</p>
<p>Samuel Tan of Google</p>
<p>Santos Cordon of Google Telecom Team</p>
<p><a href="mailto:[email protected]">Scott Bauer</a>
(<a href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</p>
<p>Sen Nie (<a href="https://twitter.com/@nforest_">@nforest_</a>) of KEEN lab,
Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p>
<p>Sergey Bobrov (<a href="http://twitter.com/Black2Fan">@Black2Fan</a>) of
Kaspersky Lab</p>
<p>Seven Shen (<a href="https://twitter.com/@lingtongshen">@lingtongshen</a>)
of Trend Micro (<a href="http://www.trendmicro.com">www.trendmicro.com</a>)</p>
<p>Sharvil Nanavati of Google</p>
<p>Shinjo Park (<a href="https://twitter.com/ad_ili_rai">@ad_ili_rai</a>) of
<a href="http://www.isti.tu-berlin.de/security_in_telecommunications">Security in
Telecommunications</a></p>
<p>Stuart Henderson</p>
<p>Su Mon Kywe of Singapore Management University</p>
<p>Tao (Lenx) Wei (韦韬) of Baidu X-Lab</p>
<p>Thom Does</p>
<p>Tieyan Li of Huawei</p>
<p>Tim Strazzere (<a href="https://twitter.com/timstrazz">@timstrazz</a>) of
SentinelOne / RedNaga</p>
<p>Tom Craig of Google X</p>
<p>Tom Rootjunky</p>
<p><a href="mailto:[email protected]">Tong Lin</a> of
<a href="http://c0reteam.org">C0RE Team</a></p>
<p><a href="mailto:[email protected]">Tongxin Li</a> of Peking University</p>
<p>trotmaster (<a href="https://twitter.com/trotmaster99">@trotmaster99</a>)</p>
<p>Vasily Vasilev</p>
<p>Victor Chang of Google</p>
<p>Victor van der Veen of Vrije Universiteit Amsterdam</p>
<p>Vignesh Venkatasubramanian of Google</p>
<p>Vishwath Mohan of Android Security</p>
<p>Wei Wei (<a href="https://twitter.com/Danny__Wei">@Danny__Wei</a>) of Xuanwu
LAB, Tencent</p>
<p>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of Alibaba Inc</p>
<p>Wen Niu (<a href="https://twitter.com/NWMonster">@NWMonster</a>) of KeenLab
(<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p>
<p><a href="mailto:[email protected]">Wenke Dou</a> of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>Wenlin Yang of Alpha Team, Qihoo 360 Technology Co. Ltd.</p>
<p>William Roberts (<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>) (<a
href="http://weibo.com/wishlinux">吴潍浠</a>) of <a
href="http://blog.trendmicro.com/trendlabs-security-intelligence/category/mobile/">Mobile
Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro
Inc.</a></p>
<p><a href="mailto:[email protected]">Xiaodong Wang</a> of
<a href="http://c0reteam.org">C0RE Team</a></p>
<p><a href="mailto:[email protected]">Xiaofeng Wang</a> of Indiana University Bloomington</p>
<p>Xiling Gong of Tencent Security Platform Department</p>
<p>Xingyu He (何星宇) (<a href="https://twitter.com/Spid3r_">@Spid3r_</a>)
of <a href="http://www.alibaba.com/">Alibaba Inc</a></p>
<p><a href="mailto:[email protected]">Xinhui Han</a> of Peking University</p>
<p>Xuxian Jiang of <a href="http://c0reteam.org">C0RE Team</a>,
<a href="http://www.360safe.com/">Qihoo 360</a></p>
<p>Yabin Cui from Android Bionic Team</p>
<p>Yacong Gu of TCA Lab, Institute of Software, Chinese Academy of Sciences</p>
<p>Yakov Shafranovich of
<a href="https://wwws.nightwatchcybersecurity.com">Nightwatch Cybersecurity</a></p>
<p>Yang Dong of Alibaba Mobile Security Group</p>
<p>Yang Song of Alibaba Mobile Security Group</p>
<p>Yanick Fratantonio of University of California, Santa Barbara</p>
<p><a href="mailto:[email protected]">Yao Jun</a> of
<a href="http://c0reteam.org">C0RE Team</a></p>
<p><a href="mailto:[email protected]">Yeonjoon Lee</a> of Indiana University Bloomington</p>
<p>Yi Zhang of Alibaba Mobile Security Group</p>
<p>Yingjiu Li of Singapore Management University</p>
<p>Yong Shi of Eagleye team, SCC, Huawei</p>
<p>Yong Wang (王勇) (<a href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>)
of Alibaba Inc.</p>
<p>Yongke Wang (<a href="https://twitter.com/Rudykewang">@Rudykewang</a>) of
Xuanwu LAB, Tencent</p>
<p>Yongzheng Wu of Huawei</p>
<p>Yuan-Tsung Lo (<a href="mailto:[email protected]">[email protected]</a>)
of <a href="http://c0reteam.org">C0RE Team</a></p>
<p>Yulong Zhang of Baidu X-Lab</p>
<p><a href="http://yurushao.info">Yuru Shao</a> of University of Michigan Ann Arbor</p>
<p>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of
Tencent Security Platform Department</p>
<p>Zach Riggle (<a href="https://twitter.com/@ebeip90">@ebeip90</a>) of the
Android Security Team</p>
<p>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of
Security Research Lab, <a href="http://www.cmcm.com">Cheetah Mobile</a></p>
<p>Zhe Jin (金哲) of Chengdu Security Response Center, Qihoo 360 Technology Co.
Ltd.</p>
<p><a href="mailto:[email protected]">Zhiyun Qian</a> of UC Riverside</p>
<p><a href="http://weibo.com/ele7enxxh">Zinuo Han</a> of
<a href="http://www.pkav.net">PKAV</a>, Silence Information Technology</p>
<p>Zubin Mithra of Google</p>
</div>
<h2 id=2015>2015</h2>
<div style="LINE-HEIGHT:25px;">
<p>Abhishek Arya, Google Chrome Security Team</p>
<p>Alex Copot</p>
<p>Alex Eubanks</p>
<p>Alexandru Blanda</p>
<p>Arne Swinnen (<a href="https://www.arneswinnen.net/">www.arneswinnen.net</a>)</p>
<p>Artem Chaykin</p>
<p>Ben Hawkes</p>
<p>Brennan Lautner</p>
<p>Chiachih Wu of C0RE Team from Qihoo 360</p>
<p>Darmstadt ([email protected])</p>
<p>Daniel Micay ([email protected]) at Copperhead Security</p>
<p>Dongkwan Kim of System Security Lab, KAIST ([email protected])</p>
<p>dragonltx of Alibaba Mobile Security Team</p>
<p>Gal Beniamini (<a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p>
<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>, [email protected]) of <a href="http://www.360.cn/">Qihoo 360 Technology Co.Ltd</a></p>
<p>Hongil Kim of System Security Lab, KAIST ([email protected])</p>
<p>Ian Beer of Google Project Zero</p>
<p>Iván Arce (@4Dgifts) of Programa STIC at Fundación Dr. Manuel Sadosky, Buenos
Aires Argentina</p>
<p>Jack Tang of Trend Micro (@jacktang310)</p>
<p>jgor of <a href="http://security.utexas.edu/">The University of Texas at Austin</a> (<a href="https://twitter.com/indiecom">@indiecom</a>)</p>
<p>Joaquín Rinaudo (@xeroxnir) of Programa STIC at Fundación Dr. Manuel Sadosky,
Buenos Aires Argentina</p>
<p>Jordan Gruskovnjak of Exodus Intelligence (@jgrusko)</p>
<p>Joshua Drake of Zimperium</p>
<p>Lei Wu of C0RE Team from Qihoo 360</p>
<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of <a href="http://k33nteam.org/">KeenTeam</a> (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p>
<p>Mark Carter (<a href="https://twitter.com/hanpingchinese">@hanpingchinese</a>) of EmberMitre Ltd</p>
<p>Martin Barbella, Google Chrome Security Team</p>
<p>Michael Peck of <a href="https://www.mitre.org/">The MITRE Corporation</a> ([email protected])</p>
<p>Michał Bednarski (<a href="https://github.com/michalbednarski">https://github.com/michalbednarski</a>)</p>
<p>Michael Roland of JR-Center u'smile at University of Applied Scienses, Upper
Austria/Hagenberg</p>
<p>Natalie Silvanovich of Google Project Zero</p>
<p>Oliver Chang, Google Chrome Security Team</p>
<p>Peter Pi of Trend Micro</p>
<p>Ping Li of Qihoo 360 Technology Co. Ltd</p>
<p>Qidan He (@flanker_hqd) from KeenTeam (@K33nTeam, <a href="http://k33nteam.org/">http://k33nteam.org/</a>)</p>
<p>Roee Hay and Or Peles</p>
<p>Seven Shen of Trend Micro</p>
<p><a href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software Engineering Group</a>, EC SPRIDE Technische Universität</p>
<p>Stephan Huber of Testlab Mobile Security, <a href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> ([email protected])</p>
<p>Steven Vittitoe of Google Project Zero</p>
<p>Tony Beltramelli (<a
href="https://twitter.com/Tbeltramelli">@Tbeltramelli</a>) of <a
href="http://tonybeltramelli.com/">tonybeltramelli.com</a></p>
<p>Tzu-Yin (Nina) Tai</p>
<p>Wangtao(neobyte) of Baidu X-Team</p>
<p>Wen Xu (@antlr7) from KeenTeam (@K33nTeam, <a href="http://k33nteam.org/">http://k33nteam.org/</a>)</p>
<p>William Roberts (<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Wish Wu of Trend Micro Inc. (@wish_wu)</p>
<p>Xuxian Jiang of C0RE Team from Qihoo 360</p>
<p>Yajin Zhou of C0RE Team from Qihoo 360</p>
</div>
<h2 id=2014>2014</h2>
<div style="LINE-HEIGHT:25px;">
<p>Aaron Mangel of <a href="https://banno.com/">Banno</a> (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p>Alex Park (<a href="https://twitter.com/saintlinu">@saintlinu</a>)</p>
<p>Alexandru Gheorghita</p>
<p><a href="https://twitter.com/isciurus">Andrey Labunets</a> of <a href="https://www.facebook.com">Facebook</a></p>
<p><a href="http://www.corkami.com">Ange Albertini</a> (<a
href="https://twitter.com/angealbertini">@angealbertini</a>)</p>
<p>Axelle Apvrille of Fortinet, FortiGuards Labs</p>
<p><a href="http://www.linkedin.com/in/danamodio">Dan Amodio</a> of <a href="https://www.aspectsecurity.com/">Aspect Security</a> (<a href="https://twitter.com/DanAmodio">@DanAmodio</a>)</p>
<p><a href="http://davidmurdoch.com">David Murdoch</a></p>
<p>Henry Hoggard of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a
href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p>
<p>Imre Rad of <a href="http://www.search-lab.hu/">Search-Lab Ltd.</a></p>
<p><a href="http://thejh.net/">Jann Horn</a> <a href="https://android-review.googlesource.com/#/c/98197/">
<img style="vertical-align:middle;" src="../images/tiny-robot.png"
alt="Green Droid Patch Symbol"
title="This person contributed code that improved Android security">
</a></p>
<p>Jeff Forristal of <a href="http://www.bluebox.com/blog/">Bluebox
Security</a></p>
<p><a href="http://blog.redfern.me/">Joseph Redfern</a> of <a
href="https://labs.mwrinfosecurity.com/">MWR Labs</a> <br>(<a
href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p>
<p>Kunal Patel of <a href="https://www.samsungknox.com/">Samsung KNOX Security Team</a> (<a href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="http://www.linkedin.com/in/luander">Luander Michel Ribeiro</a> (<a
href="https://twitter.com/luanderock">@luanderock</a>)</p>
<p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana
University Bloomington (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p>Marc Blanchou (<a href="https://twitter.com/marcblanchou">@marcblanchou</a>)</p>
<p>Mathew Solnik (<a href="https://twitter.com/msolnik">@msolnik</a>)</p>
<p><a href="https://github.com/michalbednarski">Michał Bednarski</a></p>
<p><a href="http://www.cs.utah.edu/~rsas/">Raimondas Sasnauskas</a> of University of Utah</p>
<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/">
Trusted Systems Research Group</a>, US National Security Agency
<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol"
title="This person contributed code that improved Android security"></a></p>
<p><a href="http://www.samsung.com">Samsung Mobile</a></p>
<p>Scotty Bauer of University of Utah (<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Sebastian Brenza</p>
<p><a
href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried
Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software
Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="http://www.sonymobile.com">Sony Mobile</a></p>
<p>Stephan Huber of Testlab Mobile Security, <a
href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (<a
href="mailto:[email protected]">[email protected]</a>)
</p>
<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/">
Trusted Systems Research Group</a>, US National Security Agency
<a href=
"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png"
alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
<p>Steven Arzt of <a href="http://sseblog.ec-spride.de/">Secure Software
Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="http://www.subodh.io">Subodh Iyengar</a> of <a href="https://www.facebook.com">Facebook</a></p>
<p>Tongxin Li of Peking University (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="http://www.linkedin.com/in/tonytrummer/">Tony Trummer</a> of <a
href="http://www.themeninthemiddle.com">The Men in the Middle</a> <br>(<a
href="https://twitter.com/SecBro1">@SecBro1</a>)</p>
<p><a href="https://www.linkedin.com/in/tdalvi">Tushar Dalvi</a> (<a
href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p>
<p><a href="https://plus.google.com/u/0/109528607786970714118">Valera
Neronov</a></p>
<p>Wang Tao of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Wang Yu of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="https://twitter.com/xi4oyu">@xi4oyu</a>)</p>
<p><a href="http://www.shackleton.io/">Will Shackleton</a> of <a href="https://www.facebook.com">Facebook</a></p>
<p><a href="http://www.linkedin.com/in/billcroberts">
William Roberts</a> (<a href="mailto:[email protected]">[email protected]</a>)
<a href=
"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png"
alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
<p><a href="http://www.informatics.indiana.edu/xw7/">Xiaofeng Wang</a> of
Indiana University Bloomington (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="https://www.facebook.com/zhou.xiaoyong">Xiaoyong Zhou</a> of <a
href="http://www.cs.indiana.edu/~zhou/">Indiana University Bloomington</a> <br>(<a
href="https://twitter.com/xzhou">@xzhou</a>, <a
href="mailto:[email protected]">[email protected]</a>)</p>
<p>Xinhui Han of Peking University (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p>Yeonjoon Lee of Indiana University Bloomington (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="http://www.androbugs.com">Yu-Cheng Lin 林禹成</a> (<a
href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p>
<p>Zhang Dong Hui of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="http://weibo.com/shineastdh">shineastdh</a>)</p>
</div>
<h2 id=2013>2013</h2>
<div style="LINE-HEIGHT:25px;">
<p><a href="https://tsarstva.bg/sh/">Ivaylo Marinkov</a>
of <a href="http://www.ecommera.com/">eCommera</a>
(<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Jon Sawyer of <a href="http://appliedcybersecurity.com/">Applied Cybersecurity LLC
</a> (<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Joshua J. Drake of <a href="http://www.accuvant.com/">Accuvant LABS
</a> (<a href="https://twitter.com/jduck">@jduck</a>)
<a href="https://android-review.googlesource.com/#/q/change:72228+OR+change:72229">
<img style="vertical-align:middle" src="../images/patchreward.png"
alt="Patch Rewards Symbol" title="This person qualified for the Patch Rewards program!"></a></p>
<p>Kan Yuan</p>
<p>Lucas Yang (amadoh4ck) of
<a href="http://raonsecurity.com/">RaonSecurity</a>
(<a href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana
University Bloomington (<a
href="mailto:[email protected]">[email protected]</a>)</p>
<p><a href="https://lacklustre.net/">Mike Ryan</a> of
<a href="https://isecpartners.com/">iSEC Partners</a>
<br>(<a href="https://twitter.com/mpeg4codec">@mpeg4codec</a>,
<a href="mailto:[email protected]">[email protected]
</a>)</p>
<p><a href="http://cryptoonline.com/">Muhammad Naveed</a>
of <a href="http://illinois.edu/">University of Illinois
at Urbana-Champaign</a>
<br>(<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Qualcomm Product Security Initiative</p>
<p><a href="http://roeehay.blogspot.com/">Roee Hay</a> (<a href="https://twitter.com/roeehay">@roeehay</a>,
<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/">
Trusted Systems Research Group</a>, US National Security Agency
<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol"
title="This person contributed code that improved Android security"></a></p>
<p>Ruben Santamarta of IOActive
(<a href="https://twitter.com/reversemode">@reversemode</a>)</p>
<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/">
Trusted Systems Research Group</a>, US National Security Agency
<a href=
"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png"
alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
<p><a href="http://www.linkedin.com/in/billcroberts">
William Roberts</a> (<a href="mailto:[email protected]">[email protected]</a>)
<a href=
"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png"
alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
<p>Xiaorui Pan of Indiana University Bloomington (<a href="mailto:[email protected]">[email protected]</a>)<p>
<p>XiaoFeng Wang of Indiana University Bloomington (<a href="mailto:[email protected]">[email protected]</a>)</p>
</div>
<h2 id=2012>2012</h2>
<div style="LINE-HEIGHT:25px;">
<p>David Weinstein (<a href="https://twitter.com/insitusec">@insitusec</a>)
of <a href="https://viaforensics.com/">viaForensics</a></p>
<p><a href="http://thejh.net/">Jann Horn</a></p>
<p>Ravishankar Borgaonkari (<a href="https://twitter.com/raviborgaonkar">@raviborgaonkar</a>) of TU Berlin</p>
<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/">
Trusted Systems Research Group</a>, US National Security Agency
<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol"
title="This person contributed code that improved Android security"></a></p>
<p><a href="http://roeehay.blogspot.com/">Roee Hay</a> (<a href="https://twitter.com/roeehay">@roeehay</a>,
<a href="mailto:[email protected]">[email protected]</a>)</p>
<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/">
Trusted Systems Research Group</a>, US National Security Agency
<a href=
"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png"
alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
<p><a href="http://www.linkedin.com/in/billcroberts">
William Roberts</a> (<a href="mailto:[email protected]">[email protected]</a>)
<a href=
"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged">
<img style="vertical-align:middle" src="../images/tiny-robot.png"
alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
</div>
<h2 id=2011>2011</h2>
<div style="LINE-HEIGHT:25px;">
<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p>
</div>
<h2 id=2009>2009</h2>
<div style="LINE-HEIGHT:25px;">
<p>Charlie Miller (<a href="https://twitter.com/0xcharlie">@0xcharlie</a>)</p>
<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p>
</div>