Sign In
Get Clay Free →

Suggestions

    Matt Oh

    Security Researcher at Google

    Jeong Wook (Matt) Oh is a Security Researcher at Google who has made significant contributions to Android security. He has been credited with discovering multiple CVEs (Common Vulnerabilities and Exposures) in Android, including CVE-2024-43097, CVE-2024-43767, CVE-2024-43768, CVE-2024-47024, CVE-2024-47025, CVE-2024-47027, CVE-2024-47029, CVE-2024-47035, CVE-2024-44093, CVE-2024-44094, and CVE-2024-44095.1

    Prior to his role at Google, Matt Oh worked at Microsoft as a security researcher for about ten years. He is also known for being the author of DarunGrim, a binary diffing tool, which he developed approximately ten years ago.2

    Matt Oh is the founder of DarunGrim company and has expertise in using Intel PT (Processor Trace) for security analysis, including exploit analysis and general availability analysis.2

    Highlights

    Android security acknowledgements
    Jul 4 · youtube.com
    vOPCDE #6-Decoding and interpreting Intel PT traces for ... - YouTube
    vOPCDE #6-Decoding and interpreting Intel PT traces for ... - YouTube

    Related Questions

    What are some notable achievements of Jeong Wook (Matt) Oh in the field of security research?
    How did Jeong Wook (Matt) Oh start his career in security research?
    What projects has Jeong Wook (Matt) Oh worked on at Google?
    How many CVEs has Jeong Wook (Matt) Oh contributed to?
    What is Jeong Wook (Matt) Oh's educational background?
    Matt Oh
    Matt Oh, photo 1
    Matt Oh, photo 2
    Get intro to Matt
    Add to my network

    Location

    Redmond, Washington, United States