Michael Atlas
About Michael Atlas
Michael Atlas is a Security Researcher with extensive experience in software security and reverse engineering. He has worked for several notable companies, including Cisco, Intel Corporation, and ZecOps, and possesses expertise in Android/Linux kernel privilege escalation and various programming languages.
Work at ZecOps
Michael Atlas has been employed at ZecOps as a Security Researcher since 2019. In this role, he focuses on security vulnerabilities and exploits, contributing to the development of advanced security solutions. His expertise in reverse engineering and protocol analysis is instrumental in identifying and mitigating potential threats. Atlas's work at ZecOps emphasizes the importance of mobile security, particularly in relation to Android and Linux systems.
Previous Employment History
Michael Atlas has a diverse employment history in the field of security research and software engineering. He served as an IDE Project Leader at EZchip from 1999 to 2006, followed by a role as a Software Engineer at Imperva from 2006 to 2008. He then worked as a Software Security Analyst at Cisco from 2008 to 2015 and as a Security Researcher at Intel Corporation from 2015 to 2017. Prior to his current position, he was a Security Researcher at NSO Group from 2017 to 2019.
Education and Expertise
Michael Atlas studied at Magnitogorsk State Technical University named after G.I. Nosov (MSTU) from 1992 to 1994, focusing on Computer Science. Although he did not complete his degree, he has developed significant expertise in reverse engineering and protocol analysis. His skills include automatic obfuscation and de-obfuscation techniques, as well as programming in C++, C, Assembly, and Python. Atlas is proficient in using IDAPython and IDA for security research.
Technical Skills and Research Focus
Michael Atlas possesses a strong technical skill set that includes programming in multiple languages such as C++, C, Assembly (x86-64, arm, MIPS), and Python. He conducts OS internals research, particularly focusing on *nix and QNX systems. His background includes significant experience in Solaris and Linux programming, both in user and kernel space. Atlas is also active in the reverse engineering community, engaging with peers through a profile on Stack Exchange.