
| Justine Aitel | |
|
Justine Aitel Immunity, Inc. |
To be updated |
| Edgar Barbosa | |
|
Edgar Barbosa COSEINC |
Edgar Barbosa is a researcher in the Advanced Malware Labs of COSEINC and is specialized in reverse engineering of Window kernel binaries and kernel mode rootkits. He has presented several advanced attacks against rootkit detection tools in the past few years. He has a deep knowledge of Windows kernel internals and x86/x64 CPU architectures, including hardware virtualization technologies. Edgar is one of the crucial member in the development of Blue Pill (an intellectual property of COSEINC). |
| Paul Craig | |
|
Paul Craig Security Assessment |
Paul Craig is a security consultant for Security-Assessment.com, and provides Security-Assessment.com Ltd clients with application audit reviews, vulnerability assessment and intrusion testing. |
| Stephane Duverger | |
|
Stephane Duverger EADS |
Stephane Duverger is a French IT Security Research engineer at EADS CCR lab in FRANCE where he works on kernel security topics. Stephane has a Master Degree in Computer (Security) Sciences. |
| The Grugq | |
|
The Grugq |
The Grugq, a South African who moves to London to boycott Apartheid, was the key developer of a well known European HIPS. He is a well known security forensic and anti-forensic expert. Since moving to Bangkok , where he has found the love of his life, he has focused his research on VoIP and is now a highly recognized expert in this field. |
| Brad Hill | |
|
Brad Hill iSECPartners |
Brad Hill is a Senior Security Consultant at iSEC Partners where he performs security assessments on a wide variety of top-tier software products. He has presented at several OWASP events and been an invited speaker at Microsoft Corporation. Prior to joining iSEC, Brad worked for nearly a decade as a developer and security expert in the high-tech and financial sectors. He is based in Seattle in the United States. |
| Marcel Holtmann | |
|
Marcel Holtmann |
Marcel Holtmann is the maintainer and the core developer of the official Linux Bluetooth stack which is called BlueZ. He started working with the Bluetooth technology back in 2001. His work includes new hardware drivers, upper layer protocol implementations and the integration of Bluetooth into other subsystems of the Linux kernel. In January 2004 he overtook the maintainer role from the original developer Max Krasnyansky. Together with Jean Tourrilhes he maintains the OpenOBEX project. He is also responsible for the IrDA and Bluetooth integrations of the Gnokii project. |
| Alexander Kornbrust | |
|
Alexander Kornbrust Red Database Security |
Alexander Kornbrust is the founder of Red-Database-Security GmbH, a company specialised in Oracle security. He is responsible for Oracle security audits and Oracle Antihacker training. Before that he worked several years for Oracle Germany , Oracle Switzerland and IBM Global Services as consultant. Alexander Kornbrust is working with Oracle products as DBA and developer since 1992. During the last 6 years found over 200 security bugs in various Oracle products like database or application server. |
| Collin Mulliner | |
|
Collin Mulliner |
Collin Mulliner is a programmer, researcher, and a hacker and holds a Master's of Science in Computer Science degree from UC Santa Barbara. Collin's main interests are mobile devices, their security and pretty much everything that is somehow related. Collin started working on PalmOS-based projects in 1997, and by now has done projects for pretty much every portable device he can get hold of. In recent years Collin was mainly working on Bluetooth-based projects where he created the first Bluetooth port-scanner. Collin also is a member of trifinite -a group of hackers that focus on the security of mobile devices and wireless technologies. Lately Collin's focus shifted towards mobile Linux devices and PocketPC-based smart phones. During the day Collin develops software for a company that makes Linux-based portable media players. |
| Nguyen Anh Quynh | |
|
Nguyen Anh Quynh |
Nguyen Anh Quynh is a postdoctoral researcher at National Institute of Advanced Industrial Science and Technology (AIST), Japan . His research interests include computer security, networking, data forensic, virtualization, Trusted Computing and Operating System. His papers have been published in various academic conferences, such as ACM, IEEE, LNCS, Usenix among others. Quynh is a contributor of numerous open source projects (notably are Xen Virtual Machine and Linux kernel). He loves to get involved with the industry, and he gave talks at hacking conferences such as EusecWest, HackInTheBox, Hack.lu. Quynh obtained PhD degree of computer science in Keio University , Japan . He is also a member of Vnsecurity, a pioneer information security research group in Vietnam. |
| James O'Connor | |
|
James O'Connor Symantec |
James was born and raised in the South-East of Ireland , and moved to Dublin in 2000 to attend University. He graduated from Dublin City University in 2004 with a BSc Hons Computer Applications. James has a general interest in all aspects of technology , and enjoys working on personal software/hardware projects in my spare time. James has been working in Symantec Security Response as an En gineer since 2004, starting out on the S pyware Team, before moving to his current posit ion on the Malware Team. His day-to-day duties include analyzing malware (blackboxing, whiteboxing etc) to create AV definitions and repair/removal code, creating technical write-ups for new threats, and assisting in vendor disputes / customer support issues etc Outside of these core duties, he also perform general computer security research and help create new tools / infrastructure for the team. |
| Hendrik Scholz | |
|
Hendrik Scholz Freenet Cityline |
Hendrik Scholz is a VoIP developer and systems engineer at Freenet Cityline GmbH in Kiel, Germany. He joined Freenet more than two years ago after studying and working around the world in Australia and the United States . He has spent of his time working in the security and network field around Linux and *BSD. Nowadays the average work day consists of a healthy mix of design, development and debugging SIP based infrastructure equipment. Having access to all sorts of VoIP devices hacking on those became a spare time passion as well as did hacking the SIP Express Router. Hendrik also is a regular speaker and attendant at Security conferences around the globe (i.e. SyScan, CanSecWest, Black Hat, CCC). |
| Alexander Sotirov | |
|
Alexander Sotirov Determina |
Alexander Sotirov has been involved in computer security since 1998, when he became one of the editors of Phreedom Magazine, a Bulgarian underground technical publication. For the past nine years he has been working on reverse engineering, exploit code development and research in automated source code auditing. His most well-known work is the development of highly reliable exploits for Apache/mod_ssl, ProFTPd and Windows ASN.1. He graduated with a Master's degree in computer science in 2005. His current job is as a vulnerability researcher at Determina Inc, a HIPS startup in Redwood City, CA. |
| Sun Bing | |
|
Sun Bing |
Sun Bing is the Research Scientist at an Information Security company currently, and has held security related positions at several famous companies heretofore, such as Rising and Siemens. SUN BING has more than 6 years of experience in Windows Kernel and Security Techniques (Anti-Virus, Firewall, IPS etc) research development, especially with deeply delving into Buffer Overflow Prevention, Rootkit Detection and x86 Virtualization. His main works previously involve participating in Rising Anti-Virus Softwares development, publishing the paper (The Design Of Anti-Virus Engine) at xfocus, taking charge of the design and development of a desktop security product-LinkTrust IntraSec, and speaking at security conferences such as XCON2006, POC2006, EuSecWest 2007, and BlackHat EU 2007... |
| Nicolas Waisman | |
|
Nicolas Waisman Immunity, Inc. |
Nicolas Waisman is a Senior Security Researcher and Regional Manager at Immunity, Inc, which he joined in 2004. Nico is one of the driving forces behind the CANVAS attack framework. His security research is concentrated on win32 vulnerability development, specifically reliable heap exploitation techniques. Nico has spoken on and taught these techniques to Government and private sector researchers in Japan , Europe , North and South America . Nico is also the Manager and main point of contact for Immunity South America, where he is leading Immunity's newest project, the vulndev oriented Immunity Debugger. |
| Jonathan Limbo | |
|
Jonathan Limbo Cisco |
Jonathan is a Security Researcher in the IPS Signature team for Cisco in the Asia Pacific region. He currently focuses on vulnerabilities, exploits, attack vectors and evolving obfuscation techniques. Previous roles include working for the Asia Pacific Security team in Technical Support specializing in Denial of Service attack mitigation, and various technical support and network administrator roles. Jonathan has extensive experience in network security including access control, perimeter defense, security tools, encryption, and self-defending network strategies. |











