Pedram currently serves as the Chief Scientist at OPSWAT (https://www.opswat.com), dedicating his expertise to advancing machine learning, threat intelligence, and spearheading R&D innovation across diverse security solutions. In 2024, OPSWAT acquired InQuest (https://www.inquest.net), where Pedram was the CTO of a pioneering startup committed to safeguarding DoD users globally. At InQuest, he developed two flagship technologies: Deep File Inspection (DFI) for real-time threat detection, and "RetroHunting," a revolutionary method that applies today's threat intelligence to past data. InQuest is renowned for its large-scale malware analysis, and you can explore our research and continuously updated data at our open research portal, launched at Blackhat 2019: https://labs.inquest.net.
Pedram also holds advisory roles at Mozilla for their GenAI Bug Bounty program 0Din.ai, Exodus Intelligence (https://exodusintel.com), and AttackIQ (https://attackiq.com). Beyond his professional achievements, he is an angel investor, Austin business owner (https://sanjacsaloon.com), and a Jiu-Jitsu aficionado.
Pedram holds a computer science degree from Tulane University with minors in business, robotics, and mathematics. He began his professional career in 2002 as one of the founding members of iDEFENSE Labs, a security start-up in the Washington DC metro area which was acquired by Verisign in 2005. At iDEFENSE he architected and managed the Vulnerability Contributor Program (VCP) which consisted of a network of over 1,000 independent security researchers worldwide.
In 2005 Pedram moved to Austin, Texas to create the Zero Day Initiative (ZDI, https://www.zerodayinitiative.com) under the network security company TippingPoint. Similar to the VCP, the ZDI is a program for rewarding independent researchers for responsibly disclosing security vulnerabilities. This program has grown to be the largest and most successful of its kind. In the 5 years that Pedram ran the program, it unearthed and helped patch over 1,100 critical security flaws with contributions from over 1,600 researchers worldwide... that trend continues today. TippingPoint was acquired by 3Com and later Hewlett-Packard.
After the HP acquisition in 2010, Pedram founded and developed Jumpshot (archived website, Kickstarter launch), a consumer product for out-of-band malware removal. A unique software solution, Jumpshot differed from typical malware removal products in that the potentially infected computer is actually turned off. Jumpshot then took control of the system hardware and cleaned viruses and other undesirables from a forensic viewpoint with crowd-driven support from the cloud. A portion of the system was granted US patent #8812832. Jumpshot was unveiled from stealth mode in July of 2012 on the crowdfunding site Kickstarter. Soon after releasing the software to the general public, driven by excellent reviews on the efficacy of the product, Jumpshot was acquired by Avast. In September of 2013 Jumpshot was re-branded as GrimeFighter. (Please note, this is not the infamous data sciences firm Jumpshot.)
Pedram authored "Fuzzing: Brute Force Vulnerability Discovery", has presented at BlackHat, DefCon, RECon, Ekoparty, Microsoft Bluehat, ShmooCon, ToorCon and Virus Bulletin, and taught numerous sold out reverse engineering courses. His most recent in-person presentation was at Blackhat USA 2019:
Worm Charming: Harvesting Malware Lures for Fun and Profit
Recent blogs (@InQuest):
- Follina, the Latest in a Long Chain of Microsoft Office Exploits
- ZLoader 4.0 Macrosheets Evolution
- Getting Sneakier: Hidden Sheets, Data Connections, and XLM Macros
- Adobe XMP: Tales of an Overlooked Anchor
- Base64 Encoded Powershell Pivots
- Extracting "Sneaky" Excel XLM Macros
Fuzzing: Brute Force Vulnerability Discovery
- http://www.amazon.com/Fuzzing-Brute-Force-Vulnerability-Discovery/dp/0321446119
- Published: July 9, 2007
Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system
- http://www.google.com/patents/US8812832
- Published: Aug 19, 2014
OpenRCE: Open Reverse Code Engineering Community
- http://www.openrce.org
- Launched: June 1, 2005
Citations
For an older talk but of particular interest to the vulnerability and exploitation markets and history, see his presentation from EkoParty Buenos Aires 2009 titled "Mostrame la guita! Adventures in buying vulnerabilities":
If you want to take a gander at a much younger albeit fatter Pedram, he's archived here unveiling the Paimei reverse engineering framework at the first RECON conference in Montreal.