schedule
schedule
Archive > 2008 > Singapore > SPEAKERS
Alexander Sotirov

Alexander Sotirov
VMware

Alexander Sotirov has been involved in computer security since 1998, when he started contributing to Phreedom Magazine, a Bulgarian underground technical publication. For the past ten years he has been working on advanced exploitation, reverse engineering and vulnerability research. His recent work includes the discovery of the ANI vulnerability in Windows Vista and the development of the Heap Feng Shui browser exploitation technique. Alexander is one of the organizers of the Pwnie Awards. He is currently employed as a security researcher at VMware.

Adam Laurie

Adam Laurie
Freelance Hacker

Adam Laurie is a freelance security consultant. He also help maintain Apache-SSL and am a member of The Trifinite Group.

Brett Moore

Brett Moore
Insomia Security

Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over six years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.

Eyal Udassin

Eyal Udassin
C4 Security

Eyal Udassin is the co-founder and a security expert at C4 Security, a penetration testing company which uncovers and mitigates technical security vulnerabilities by attacking the tested system or network. Mr. Udassin performed hundreds of penetration tests against financial, governmental, military and SCADA clients as part of the C4's red team. He specializes in protocol analysis, reverse engineering of binary code, passive and active reconnaissance of computer networks and exploiting vulnerabilities uncovered in proprietary software.

Gaith Taha

Gaith Taha
McAfcee Avert Labs


Gaith Taha, a Research Scientist in the Anti-Malware group, has been with McAfee Avert Labs since 2005 focusing on developing heuristic approaches to fight malware. He developed interest in the area of trusted virtualisation while doing his MSc. with the Information Security Group (ISG) at Royal Holloway, University of London. His interests revolve around pretty much everything within the so called security industry.

Kostya Kortchinsky

Kostya Kortchinsky Immunity


Kostya (Miami, FL) joined the team from EADS France in 2006. Kostya is an industry-recognized security researcher. He has published numerous vulnerabilities and is an expert exploits developer, reverse engineer and web application assessment specialist. Kostya is consistently responsible for being first to develop exploits for Microsoft vulnerabilities when they are announced. He has spoken at most of the major industry conferences and teaches Immunity vulnerability analysis classes.

Matthew Conover

Matthew Conover
Symantec

Matthew Conover is a principal software engineer in the Symantec Resarch Labs. He has worked at Symantec for the last five years. He has been involved in security since the late 1990s, publishing one of the first papers on heap overflows in 1999. He has presented at numerous security conferences, including SyScan, Xcon, CanSecWest, and RSA. Matthew is a member of the SyScan CFP committee.

Petr Matousek

Petr Matousek
COSEINC

Petr is a member of the Advanced Malware Lab (AML) of COSEINC. His research work is focused on the Windows Mobile platform and has successfully developed rootkits for mobile phone running Windows Mobile platform and other attacks vectors. Petr was formerly a member of 29A.

Richard Smith

Richard Smith
Hewlett Packard

Rich Smith leads the Research into Offensive Technologies & Threats (RiOTT) for Hewlett-Packard’s Trusted Systems Lab (TSL). Rich’s research interests lie in the areas of system exploitation techniques, vulnerability research, threat futures, malicious code analysis and agentless system identification. He applies his knowledge of these areas in an effort to create new security paradigms to secure enterprise scale systems. Much of his current work is focused on attacking non-PC systems that populate networks, with particular attention being paid to firmware. Rich is also involved in projects looking at modeling information security processes and threats, and the use of Trusted Computing technologies.

Sebastian Muniz

Sebastian Muniz
CORE Security

I've worked for several years as a senior developer on the telecommunications industry and for the last 2 1/2 years as Sr. Exploit Writer at CORE Security Technologies writing exploits for multiple platforms. In my free time i enjoy disassembling (and sometimes even desoldering) embedded systems like my (ex)DVD Player.