Andreas Sandblad

Andreas Sandblad

Security Researcher

Followers of Andreas Sandblad155 followers
location of Andreas SandbladLund, Skåne ili, İsveç

Connect with Andreas Sandblad to Send Message

Connect

Connect with Andreas Sandblad to Send Message

Connect
  • Timeline

  • About me

    Senior Software Architect, Sony Electronics

  • Education

    • Umeå University

      1999 - 2004
      Master of Science in Engineering Physics / Computing Science and Engineering
  • Experience

    • Secunia

      May 2004 - Jul 2006
      Security Researcher

      Tracked and analyzed security vulnerabilities disclosed by vendors and third-parties.High profile vulnerabilities discovered by Andreas Sandblad during his work at Secunia (all vulnerabilities were responsibly reported to the vendors):Secunia Research: Opera Download Dialog Spoofing Vulnerabilityhttp://secunia.com/secunia_research/2004-19/Mozilla / Firefox Property Manipulation Cross-Site Scriptinghttp://secunia.com/secunia_research/2005-15/Mozilla / Firefox "Save Link As" Download Dialog Spoofing Vulnerabilityhttp://secunia.com/secunia_research/2004-21/Microsoft Internet Explorer "createControlRange()" Memory Corruptionhttp://secunia.com/secunia_research/2004-12/Yahoo! Messenger File Transfer Filename Spoofinghttp://secunia.com/secunia_research/2005-2/Opera Download Dialog Spoofing Vulnerabilityhttp://secunia.com/secunia_research/2005-25/Mozilla Firefox Download Dialog Spoofing Vulnerabilitieshttp://secunia.com/secunia_research/2004-11/Microsoft Internet Explorer Four Vulnerabilitieshttp://secunia.com/secunia_research/2004-8/Netscape Property Manipulation Cross-Site Scriptinghttp://secunia.com/secunia_research/2005-16/Microsoft Internet Explorer Keyboard Shortcut Processing Vulnerabilityhttp://secunia.com/secunia_research/2005-7/Sun Java Plug-In Predictable File Location Weaknesshttp://secunia.com/secunia_research/2004-7/Microsoft Internet Explorer "createTextRange()" Code Executionhttp://secunia.com/secunia_research/2006-7/Internet Explorer Exception Handling Memory Corruption Vulnerabilityhttp://secunia.com/secunia_research/2006-41/Microsoft Windows Object Packager Dialog Spoofinghttp://secunia.com/secunia_research/2006-54/Mozilla Thunderbird Attachment Spoofing Vulnerabilityhttp://secunia.com/secunia_research/2005-22/Panda ActiveScan Three Vulnerabilitieshttp://secunia.com/secunia_research/2006-64/ Show less

    • Obigo AB

      Aug 2006 - Jul 2007
      Developer

      C Programming, Obigo web browser

    • Sony

      Aug 2007 - now
      Senior Software Architect

      Current assignments:* Software Architect for Sony Android TV (leading team of approx 15 developers, yet still very active in coding)* Innovation and research for TV businessPast assignments:* Software Architect for Sony Mobile, Xperia Assist / Xperia Tips & Actions (leading team of approx 15 developers)* Innovation project for watches (Android + Firefox OS).* Innovation project for IMS / RCS related features.* Software Architect for the Android web browser.* Software Architect for the mobile web browser on the OSE platform.My key accomplishments:* Started up SW application framework for Sony Android TV in Lund supporting Tokyo* Invented and developed Glove mode for the Xperia Sola mobile phone:http://developer.sonymobile.com/2012/09/28/ics-update-lets-you-use-xperia-sola-with-your-gloves-on-video/* Joint inventor and developer/architect for an Sony Mobile project which led to the operator driven RCS feature Enriched Calling:http://www.enrichedcalling.com/* Software architect for Xperia Tips & Actions bringing personal and intelligent device assistant to the Xperia mobile line, from initial design to product launch:https://www.sonymobile.com/global-en/products/phones/xperia-xz1/intelligence/ Show less

  • Licenses & Certifications