schedule
schedule
Archive > 2009 > Shanghai > SPEAKERS

Ben Nagy

Ben Nagy
Sr Researcher, COSEINC

Ben Nagy is a security researcher with COSEINC, currently working out of Kuala Lumpur. For the past few months he has been working full time in the guts of the Word 2007 Binary Format and integrating the results into Metafuzz, his ruby-based fuzzing framework. Previously working on liver destruction with eEye in Geneva and Bangkok, Ben has written whitepapers on a number of subjects and presented at several conferences in Europe (Infosecurity in London) and Asia (Ruxcon). These papers include:

  • "SEH security changes in XPSP2"
  • "Generic Anti-Exploitation Technology for Windows"

COSEINC资深安全研究人员,目前常驻吉隆坡工作。 在过去几个月里,他致力研究Word 2007 二进制形式核心并将结果整合成Metafuzz (宝石红fuzzing framework)。 之前曾在日内瓦和曼谷"eEye数字安全公司"從事研究计画。 Ben 不只写过多篇白皮书,也经常在欧洲及亚洲重要的信息 安全会议上发表最新研究。(伦敦的Infosecurity和亚洲 Ruxcon)。议题包括:

  • XPSP2中SHE保护机制的转变”
  • “Windows中溢出的相关知识和方溢出的相关技术”
Kostya Kortchinsky

Kostya Kortchinsky
Immunity

Kostya (Miami, FL) joined the team from EADS France in 2006. Kostya is an industry-recognized security researcher. He has published numerous vulnerabilities and is an expert exploit developer, reverse engineer and web application assessment specialist. Kostya is consistently responsible for being first to develop exploits for Microsoft vulnerabilities when they are announced. He has spoken at most of the major industry conferences and teaches Immunity vulnerability analysis classes.

(佛罗里达州——迈阿密)2006年从法国EADS公司 (EADS, France) 加入Immunity的研究团队。Kostya一直是信息安全界公认的资深研究员。

他曾发表为数众多的弱点分析,也是逆向工程 (reverse engineer) 专家,并擅长网页评估应用Kostya 长期专注于Windows平台弱点探测,已经发表大量的Windows平台弱点。并在今年四月份製作了一个视讯演示了利用 VMWARE 漏洞对主机系统进行攻击 (http://www.immunityinc.com/documentation/cloudburst- vista.html) 演示中, 主机执行 Vista SP1 虚拟机执行 Windows XP。

Dave Aitel

Dave Aitel
CTO, Immunity

The Founder and CTO of Immunity, Dave Aitel, was a consultant with @stake and a research scientist with the National Security Agency. Dave's background lies in Linux and Unix systems. His focus changed to Windows exploitation after founding Immunity, and in more recent years has expanded to include web applications and engine development for CANVAS such as MOSDEF, the engine's C compiler. Dave continues to write CANVAS exploits and conduct security research while leading the technical team and product and service direction at Immunity. He oversees all technical projects at Immunity.

Immunity 的创办人兼首席技术长,曾是@stake科技公司安全顾问、美国国家安全局 (National Security Agency)研究科学部门研究员。

Dave的背景在于研究Linux 和Unix系统. 在创立Immunity之后,他便将重心转换成Windows 开发, 并在近年发展重心扩大包括网络应用和对CANVAS的发动机发展,例如MOSDEF-发动机的C 编译器。 Dave不只带领Immunity的技术研究团队,也持续不断写出CANVAS程式开发利用。

Frank Fan

Frank Fan

Frank Yuan Fan CISSP, CISA, GCIH, GCIA
Vice President of OWASP China Mainland,
President of DBAPPSecurity Ltd.

Speaker of US Blackhat 2005, 2006. He has been in network and application security area for over 10 years. Hands on "Web application and Database attack and defense" experience. He holds Master of Science (Computer engineering) degree from University of California.

CISSP, CISA, GCIH, GCIA OWASP中国区付主席, 杭州安恒信息技术有限公司技术总监

美国黑帽子大会2005年2006年演讲者,10多年的网络和Web应用安全和数据库安全实践攻防经验, 毕业于美国加州大学计算机科学系。

Matthew Conover

Matthew Conover

Matthew Conover is a principal software engineer in the Symantec Resarch Labs. He has worked at Symantec for the last five years. He has been involved in security since the late 1990s, publishing one of the first papers on heap overflows in 1999. He has presented at numerous security conferences, including SyScan, Xcon, CanSecWest, and RSA. Matthew is a member of the SyScan CFP committee.

外号"shok",是Symantec Research Labs之首席工程师,也是w00w00团体的领导 者。Matt于1999年,发表了全球第一篇关于Windows heap overflow之paper,在 该领域堪称全球第一交椅,Matt也曾担任 RSA、CanSecWest、SANS与XCon研讨会讲师。

Fyodor Yarochkin

Fyodor Yarochkin

Fyodor Yarochkin is a security hobbyist and happy programmer with a few years spent in business objectives and the "security" service delivery field. These years, however, weren't completely wasted - Fyodor has been contributing his spare time to a few open and closed source projects that attracted limited use among non-business oriented computer society. He has a background of system administration and programming and holds Engineering degree in Software Engineering.

Fyodor经常担任各国际骇客年会之讲师,包含BlackHat 2001 HK、BlackHat 2001 Singapore、BlackHat 2002, Ruxcon 2003、XCon 2003 / 2006、HITB 2004 / 2005、SyScan 2005、Bellua 2005、以及VNSecurity 2007。 他于顶 尖资安学术会 议与地下杂志皆有重要文章发表,包含 Usenix Conference与Phrack Magazine (最具影响力之地下骇客杂志)。Fyodor并为Snort最早的开发者之一,目前 仍为 Snort FAQ的维护者。Fyodor并为XProbe的创办人。

Cédric Blancher

Cédric Blancher

Cédric has been working for 7 years in network security field, performing audits and penetration tests. In 2004, he joined EADS Innovation Works and now runs the Computer Security Research Lab in Suresnes, France. His research focuses on network security, wireless links and protocols security, Wi-Fi in particular. He is an active member of Rstack team and French Honeynet Project with studies on honeynet containment, honeypot farms and network traffic analysis. He had delivered technical resentations and trainings worldwide, written papers and articles on network security and wrote Wi-Fi traffic injection tool Wifitap.

Cédric's website: http://sid.rstack.org/

2004 年加入欧洲宇航防务集团创新中心(EADS Innovation Works),目前拥有计算机安全研究实验室,位于法国。已在网络安全领域工作了7年。

研究方向以网络安全(network security),无线连结(wireless links)、安全协议(protocols security)及无线保真(Wi-Fi)为主。

活跃于Rstack团队,法国蜜网(Honeynet)的防御系统,蜜罐部署分析(honeypot farms and network traffic analysis),曾发表多场技术性演说并在世界各地皆有培训课程,论文发表,网络安全文章等等。

Cédric个人网页 http://sid.rstack.org/