Lurene Grenier manages the analyst/research team for the Sourcefire VRT, and is an active developer on the Metasploit Framework team. Her primary research revolves around the automation of exploit development when paired with intelligent fuzzing frameworks. She is an expert in reverse engineering, and has taught numerous well known professional security teams the skill. She was also responsible for the disassembly and patching of the high-profile Adobe Acrobat Reader JBIG2 0-day vulnerability.
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research