
| Thomas Lim | |
![]() THOMAS LIM SyScan'09, COSEINC |
Thomas Lim is the Founder and CEO of COSEINC and SyScan. Previously as the head of IT Security in one of the largest IT services companies in Singapore, he was highly disappointed with the so-called Security seminars organised by the various vendors to be nothing but a sales and marketing pitch. In 2004, he founded SyScan, a true-blue technical-based and vendor neutral IT security conference with a strong emphasis on cutting edge security research. Today, in its 7th year, SyScan is one of the most recognised security conference in the security community. As for COSEINC, this is the only privately based and funded security research company in Singapore, which became highly prominent in the security community after the publication of "BluePill" - the first hardware based VM rootkit back in 2006. |
| Dave Aitel | |
![]() Dave Aitel CTO Immunity |
The Founder and CTO of Immunity, Dave Aitel, was a consultant with @stake and a research scientist with the National Security Agency. Dave's background lies in Linux and Unix systems. His focus changed to Windows exploitation after founding Immunity, and in more recent years has expanded to include web applications and engine development for CANVAS such as MOSDEF, the engine's C compiler. Dave continues to write CANVAS exploits and conduct security research while leading the technical team and product and service direction at Immunity. He oversees all technical projects at Immunity. |
| Edgar Barbosa | |
![]() Edgar Barbosa Senior Security Researcher, COSEINC-AML |
Edgar Barbosa is a senior security researcher in the Advanced Malware Lab (AML) of COSEINC. He was a member of the team within AML to develop �Blue Pill�, a virtual machine rootkit, and has published several papers. Edgar is an expert in kernel development, rootkit research, reverse engineering and virtualization technologies. |
| Stephen Ridley | |
![]() Stephen Ridley Senior Security Researcher, Matasano |
Stephen Ridley is a Senior Researcher at Matasano Security LLC, an independent security research and development firm specializing in software security and reverse engineering. Prior to Matasano, Stephen worked at McAfee as a founding member of the Security Architecture research group. Before that, Stephen did reverse engineering and software vulnerability research in a "skunkworks" team at a leading U.S. Defense/Intel contractor. He is privately credited with vulnerability discoveries in popular COTS packages as well as open-source software. Stephen has written for several trade magazines and been quoted in publications such as "Wired" and "Security Focus". He has also taught reverse engineering companies from the Fortune 500 and to Military and Defense agencies. Stephen currently lives in Manhattan, New York. |
| Ben Nagy | |
![]() Ben Nagy Senior Security Researcher, COSEINC-VRL |
Ben Nagy is a security researcher with COSEINC, currently working out of Kuala Lumpur. For the past few months he has been working full time in the guts of the Word 2007 Binary Format and integrating the results into Metafuzz, his ruby-based fuzzing framework. Previously working on liver destruction with eEye in Geneva and Bangkok, Ben has written whitepapers on a number of subjects and presented at several conferences in Europe (Infosecurity in London) and Asia (Ruxcon). These papers include:
|
| Charles Miller | |
![]() Charles Miller Independent Security Evaluator |
Charlie Miller: Pwn2Own winner 2008, 2009. Popular Mechanics top 10 hackers 2008. Previous publications/presentations:
|
| Justine Osborne | |
![]() Justine Osborne Security Consultant, iSecPartners |
Justine Osborne is a Security Consultant for iSEC Partners, an information security organization. At iSEC, Justine specializes in application security, focusing on web application penetration testing, code review, and secure coding guidelines. She also performs independent security research, and has presented at security conferences such as Blackhat, Defcon and DeepSec. Her research interests include emerging web application technologies, dynamic vulnerability assessment tools, Rich Internet Applications (RIA), and mobile device security. |
| Christian Heinrich | |
![]() Christian Heinrich Project Leader, OWASP |
cmlh is from Sydney, Australia and is the Project Leader of the OWASP "Google Hacking" Project and "Download Indexed Cache" and "TCP Input Text" code projects. cmlh has contributed to the "Spiders/Robots/Crawlers" and "Search Engine Reconnaissance" sections of the OWASP Testing Guide v3 and invented the "Speak English" Google Translate Workaround. cmlh has presented at RUXCON (AU), SecTor (CA), OWASP (US and AU) and ToorCon (US) and has a Public Profile on LinkedIn at http://www.linkedin.com/in/ChristianHeinrich |
| Matthew Conover | |
![]() Matthew Conover Symantec |
Matthew Conover is a principal software engineer in the Symantec Resarch Labs. He has worked at Symantec for the last five years. He has been involved in security since the late 1990s, publishing one of the first papers on heap overflows in 1999. He has presented at numerous security conferences, including SyScan, Xcon, CanSecWest, and RSA. Matthew is a member of the SyScan CFP committee. |
| Nguyen Anh Quynh | |
![]() Nguyen Anh Quynh |
Nguyen's research interests include computer security, networking, data forensic, virtualization, trusted computing and operating system. Being an academic guy, he also loves to get involved with the industry by presenting his research results at various hacking conferences around the world. Quynh obtained his PhD degree in computer science from Keio University, Japan. He is also a member of Vnsecurity, a pioneer information security research group in Vietnam. |
| Brett Moore | |
![]() Brett Moore Insomnia Security |
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over six years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat. |
| Berne Campbell | |
![]() Berne Campbell |
Berne Campbell is a security professional at a large telecommunications company. He has a strong background in network security and enjoys both software and protocol vulnerability research. Berne has previously presented at the Ruxcon 2009 security conference[1]. |
| Stefan Esser | |
![]() Stefan Esser Head of R&D, SektionEins GmbH |
Stefan Esser is best known in the security community as the PHP security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like CVS, Samba, OpenBSD or Internet Explorer. In 2003 he was the first to boot linux directly from the harddisk of an unmodified XBOX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to develop a more secure version of PHP, known as Hardened-PHP, which evolved into the Suhosin PHP Security System in 2006. Since 2007 he works as head of research and development for the german web application company SektionEins GmbH that he co-founded. |
| Marc Schoenfeld | |
![]() Marc Schoenfeld |
Marc Schoenfeld started his IT career in the early 80s with a C64, a datasette and a 6502 book from Rodney Zaks. After a university detour and a degree showing that he is able to arbitrarily mix business administration with IT, he returned to core IT. There he focussed on security research and presents on major internal conferences since 2002, focussing on JDK and JEE security. He discovered major security flaws in OpenOffice, JEE application servers (Glassfish, JBoss, Geronimo), and Sun and OpenJDK Java distributions. After being in the banking IT sector for over 10 years, since 2007 he joined a operating system vendor, working on security testing and response tasks. In his free-time he chases his dogs, looks for the best chow mein in the world, tortures his Wii, explores the endless world of free software and listens to Ennio Morricone's music. |
| Alfredo Ortega & Anibal Sacco | |
![]() Alfredo Ortega CORE ![]() Anibal Sacco CORE |
Alfredo Ortega:
Anibal Sacco: |



























