
| Thomas Lim | |
![]() THOMAS LIM SyScan'09, COSEINC |
Thomas Lim is the Founder and CEO of COSEINC and SyScan. Previously as the head of IT Security in one of the largest IT services companies in Singapore, he was highly disappointed with the so-called Security seminars organised by the various vendors to be nothing but a sales and marketing pitch. In 2004, he founded SyScan, a true-blue technical-based and vendor neutral IT security conference with a strong emphasis on cutting edge security research. Today, in its 7th year, SyScan is one of the most recognised security conference in the security community. As for COSEINC, this is the only privately based and funded security research company in Singapore, which became highly prominent in the security community after the publication of "BluePill" - the first hardware based VM rootkit back in 2006. Thomas Lim是COSEINC與SyScan的創辦人兼CEO,之前則於新加坡最大IT服務公司擔任資安首席。 其間,他對於由資安廠商舉辦之大小資安會議及研討會,淪為廠商之業務推銷活動,深感遺憾,於是於2004年創辦SyScan為中立之資安技術年會, 並強調前瞻性之資安技術。 今天,在SyScan邁入第六屆時,SyScan已成為資安圈最具有影響力的會議之一。COSEINC則為一家位於新加坡之資安研究公司, 在2006年首度公開「藍色藥丸」(Blue Pill)--全球第一支以VM為基礎之rootkit後,COSEINC便聲名廣播, 為資安圈大家熟悉之尖端研究公司。 |
| Wayne Huang | |
![]() Wayne Huang CEO Armorize Technology |
Wayne is the Founder to Armorize Technologies and is a highly experienced security expert having an extensive knowledge in information, network, and software security. He is internationally known for his expertise in Web application security and has published many well-cited papers in top conferences and journals (ACM/IEEE) worldwide. He is a frequent speaker in global security conferences, including RSA, OWASP, ZendPHP, WWW, DSN, ISSRE, and HITCon. Wayne is currently a member of the OWASP Conferences committee and chairs the OWASP Taiwan Chapter. During his PhD program at EE, National Taiwan University, Wayne received Microsoft Fellowship from Microsoft Research Asia for his outstanding security research. Wayne is the first author of two award-winning papers in the International World Wide Web (WWW, jointly held by W3C and ACM) Conferences (2003, 2004), and co-author of Security in the 21st Century, chapter “Web Application Security – Past, Present, and Future.” (Springer-Verlag). Wayne為阿碼科技創 辦人兼執行長,國際開放Web軟體安全計畫 (Open Web Application Security Project, OWASP)全球會議委員以及台灣分會會長。Wayne專攻資安領域,發表多篇得獎學術論文,多篇有超過100篇引述,並曾為RSA、WWW、PHP、 SyScan、OWASP等大型國際會議講師。 阿碼科技(Armorize)為亞洲最專業之Web資安公司,研發整合性解決方案Armorize Appsec Suite,包含源碼檢測平台CodeSecure, Web掛馬監測平台HackAlert,Web應用程式防火牆SmartWAF,以及惡意程式檢測系統Archon等產品,行銷全球。 |
| Dave Aitel | |
![]() Dave Aitel Immunity |
The Founder and CTO of Immunity, Dave Aitel, was a consultant with @stake and a research scientist with the National Security Agency. Dave's background lies in Linux and Unix systems. His focus changed to Windows exploitation after founding Immunity, and in more recent years has expanded to include web applications and engine development for CANVAS such as MOSDEF, the engine's C compiler. Dave continues to write CANVAS exploits and conduct security research while leading the technical team and product and service direction at Immunity. He oversees all technical projects at Immunity. Dave Aitel是Immunity的 創辦人兼CTO。 Dave 18歲時就被美國國家安全局(NSA, National Security Agency)延攬擔任資安科學家, 六年後離開加入@stake。Dave之前的領域以Linux與Unix上之入侵技術為主,但是之後隨著他創辦 Immunity而轉為Windows上之入侵技術, 近幾年則又包含了Web應用程式之入侵。 Dave是fuzzing技術之全球先驅,他的SPIKE fuzzer於Black Hat 2002年發表後一直被資安圈所廣為使用。除了SPIKE Fuzzer, Immuntiy也一直提供各種的免費工具,如著名的SPIKE Proxy、Sharefuzz、Aircrack-ng SILICAQ Mod、DR RootKit、Unmask、DMOSDEF等。 清單可見:http://www.immunitysec.com/resources-freesoftware.shtml。Dave著有「The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks」、「The Shellcoder's Handbook」、「Beginning Python」等三本書。 |
| Ben Nagy | |
![]() Ben Nagy Senior Security Researcher, COSEINC-VRL |
Ben Nagy is a security researcher with COSEINC, currently working out of Kuala Lumpur. For the past few months he has been working full time in the guts of the Word 2007 Binary Format and integrating the results into Metafuzz, his ruby-based fuzzing framework. Previously working on liver destruction with eEye in Geneva and Bangkok, Ben has written whitepapers on a number of subjects and presented at several conferences in Europe (Infosecurity in London) and Asia (Ruxcon). These papers include:
Ben Nagy是COSEINC的研究員,最近致力於Word之binary格式研究,以及如何將成果運用於他開發的Metafuzz--一套用ruby寫的fuzzing framework。 Ben常於各資安會議演講,包含Infosecurity以及Ruxcon等。Ben最近發表的論文包括:「SEH security changes in XPSP2」與「Generic Anti-Exploitation Technology for Windows」等。 Ben之前為eeye之研究員。 |
| Charles Miller | |
![]() Charles Miller Independent Security Evaluator |
Charlie Miller: Pwn2Own winner 2008, 2009. Popular Mechanics top 10 hackers 2008. Previous publications/presentations:
Fuzzing 大師 Charlie Miller 是近年資安界的新紅人:CanSecWest 的 Pwn2Own 2008/2009兩屆冠軍) (2009年繁體中文報導: Pwn2Own 駭客大會 Safari 及 IE 8首日就被攻陷、2008年繁體中文報導: PWN2OWN 大賽, 僅 Linux 全身而退、2009年簡體中文報導:Pwn2Own黑客大赛冠军:Mac比Windows安全、2008年簡體中文報導:PWN2OWN大赛, 仅Linux全身而退)。Charlie似乎什麼都駭,包含Mac、iphone、android都逃不過他的fuzzing技術。近兩年內, Charlie在各大駭客年會上都有給演講,包含:
Charlie並著有以下書籍:「The Mac Hacker’s Handbook」、 「 Fuzzing for Software Security Testing and Quality Assurance」、 「Open Source Fuzzing Tools」等。 |
| Justine Osborne | |
![]() Justine Osborne iSecPartners |
Justine Osborne is a Security Consultant for iSEC Partners, an information security organization. At iSEC, Justine specializes in application security, focusing on web application penetration testing, code review, and secure coding guidelines. She also performs independent security research, and has presented at security conferences such as Blackhat, Defcon and DeepSec. Her research interests include emerging web application technologies, dynamic vulnerability assessment tools, Rich Internet Applications (RIA), and mobile device security. Justine Osborne是iSEC Partners的資安研究員,專精應用程式安全,著重於Web應用程式之滲透測試, code review,以及安全的程式開發原則。她也致力於自己的獨立資安研究,並常在各大國際資安年會上演講,近期之演講有: BlackHat 2008, Living in the RIA World: Blurring the Line Between Web and Desktop Security DEFCON 2008, Living in the RIA World (Paper / 投影片 / Video) |
| Jeremy Chiu aka "Birdman" | |
![]() Jeremy Chiu aka "Birdman" |
Jeremy (aka Birdman) has more than ten years of experience with host-based security, focusing on kernel technologies for both the Win32 and Linux platforms. In early 2001 he was investigated and subsequently held prison by Taiwan Criminal Investigation Bureau for creating Taiwan’s first widespread trojan BirdSPY. The court dropped charges after Jeremy committed to allocate part of his future time to assist Taiwan law enforcement in digital forensics and incidence response. Jeremy specializes in rootkit/backdoor design. He has been contracted by military organizations to deliver military-grade implementations. Jeremy also specializes in reverse engineering and malware analysis, and has been contracted by law enforcements to assist in forensics operations. Jeremy is a sought-after speaker for topics related to security, kernel programming, and object-oriented design; in addition to frequently speaking at security conferences, Jeremy is also a contract trainer for militaries, law enforcements, intelligence organizations, and conferences like Hacks In Taiwan. In 2005, Jeremy founded X-Solve Inc. and successfully developed forensics and anti-malware products Archon and MTDS, which both received good market adoption. In July 2007, X-Solve was acquired by Armorize Technologies and Jeremy helped Armorize launch a new product line Protector, which remotely detects Web malware and informs website owners. Jeremy regularly speaks at top security conferences including OWASP, SyScan and HTCIA. 阿碼科技 X-Solve 實驗室首席研究員。 Birdman 利用其所研發之 Archon 與 HackAlert 技術,長期監控亞洲所有網站被掛馬之情況, 專長各種惡意程式分析與抗毒技術。由於同時具有人鳥雙免疫系統, Birdman 本體也是百毒不侵,在 H1N1 病毒 威脅之年代,birdman為進化最完美之人鳥合一、 人機合一之毒類終結者。唯鳥類有飛行之考量,其基因含控制體重因子,長期造成birdman體重無法 上升之困擾。 |
| Fyodor Yarochkin | |
![]() Fyodor Yarochkin |
Fyodor Yarochkin is a security analyst for GuardInfo. He is a frequent speaker at international security conferences, including BlackHat 2001 HK, BlackHat 2001 Singapore, BlackHat 2002, Ruxcon 2003, XCon 2003 / 2006, HITB 2004 and 2005, SyScan 2005, Bellua 2005, HITCon 2006 / 2007, and VNSecurity 2007, SyScan TW 2008, OWASP Asia 2008, Deepsec 2008, Coscup 2008. He has also published many well-cited papers on top security conferences and magazines, including Usenix and Phrack Magazine. Fyodor is an early developer to snort, maintainer of the snort FAQ, and founder to Xprobe. Fyodor has a MS degree in computer science from Kyrgyz Russian Slavic University and is current under his PhD program at EE, National Taiwan University. Fyodor經常擔任各國際駭客年會之講師,包含BlackHat 2001 HK、BlackHat 2001 Singapore、BlackHat 2002、 Ruxcon 2003、XCon 2003 / 2006、HITB 2004 / 2005、SyScan 2005 / 2008、Bellua 2005、VNSecurity 2007、 SyScan TW 2008、OWASP Asia 2008、Deepsec 2008、以及Coscup 2008。 他於頂尖資安學術會議與地下雜誌皆有重要文章發表,包含Usenix Conference與Phrack Magazine(最具影響力之地下駭客雜誌)。 Fyodor並為Snort最早的開發者之一,目前仍為Snort FAQ的維護者。Fyodor為XProbe的創辦人,有10年以上Web滲透測試經驗, 並與Wayne在同一實驗室,為台大電機博士班候選人。 |
| Cédric Blancher | |
![]() Cédric Blancher EADS |
Cédric has been working for 7 years in network security field, performing audits and penetration tests. In 2004, he joined EADS Innovation Works and now runs the Computer Security Research Lab in Suresnes, France. His research focuses on network security, wireless links and protocols security, Wi-Fi in particular. He is an active member of Rstack team and French Honeynet Project with studies on honeynet containment, honeypot farms and network traffic analysis. He had delivered technical resentations and trainings worldwide, written papers and articles on network security and wrote Wi-Fi traffic injection tool Wifitap. Cédric's website: http://sid.rstack.org/ |
| Lukas Grunwald | |
![]() Lukas Grunwald CTO, GmbH |
Lukas Grunwald is the CTO of DN-Systems Enterprise Internet Solutions GmbH (Hildesheim/Germany) a globally acting consulting firm working mainly in the field of security solutions for enterprises and federal governments in europe and asia. He is also the head of the Hacking Lab where new technology is evaluated. Mr. Grunwald has been working in the field of IT security for nearly 15 years now. He is specializing in security of wireless and wired data and communication networks, forensic analysis, audits and active networking. Mr. Grunwald regularly publishes articles, talks and press releases for specialist publications. He also participates actively at serveral conferences all over the world. Mr. Grunwald is co-author of RFDump an RFID attack and audit tool, that is free software and got some attention for the firsttime clone and attack the ePassport live at BlackHat, Mr. Grunwald spoke at many international security conferences. Lukas 目前是德國 DN-Systems Enterprise Internet Solutions GmbH 公司的 CTO, 也擔任該公司駭客實驗室的首席。 Lukas 在資安有15年以上之經驗,專精無線與有線網路安全,資安鑑識,資安稽核以及 active networking 等技術。 Lukas 號稱是去年 RFID 講師 Adam Laurie 的老師,為研究 RFID 安全之祖師, 他研發並公開之RFDump工具為最早之 RFID 攻擊工具,他並在BlackHat 2006會上做全球首度示範--如何拷貝RFID護照(繁中報導:[ZDNET]研究員:電子護照安全堪慮), 簡中報導:智能卡联盟称电子护照复制没有安全风险, BlackHat 2006講義PDF)。 其實Lukas早在BlckHat 2004,就已經給了精彩RFID演說並公佈工具,故稱為RFID攻擊之祖師,當之無愧。其他國際級資安會議不說,光是BlackHat,Lukas就於以下年次擔任過講師: BlackHat 2004, RF-ID and Smart-Labes: Myth, Technology and Attacks(PDF / 工具) BlackHat 2006, New Attack RFID-systems and Their Middleware and Backends (PDF) BlackHat 2008, Hacking and Injecting Federal Trojans (PDF / Video 1 / Video 2 / MP3_A / MP3_B) |
| Stefan Esser | |
![]() Stefan Esser SektionEins GmbH |
Stefan Esser is best known in the security community as the PHP security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like CVS, Samba, OpenBSD or Internet Explorer. In 2003 he was the first to boot linux directly from the harddisk of an unmodified XBOX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to develop a more secure version of PHP, known as Hardened-PHP, which evolved into the Suhosin PHP Security System in 2006. Since 2007 he works as head of research and development for the german web application company SektionEins GmbH that he co-founded. 在資安圈, Stefan 被稱為「PHP安全第一人」。他於2002年加入PHP核心開發團隊,除了致力開發 PHP 引擎核心之外, 也負責研究PHP安全問題。在更早時,Stefan發佈了許多資安弱點研究,包含在 CVS, Samba, OpenBSD 與IE內的弱點。 2003年, Stefan 是第一位利用緩衝區溢位漏洞,將 linux 灌進全新並完好之 XBOX 內,並開機成功。2006年他創立hardened-PHP計畫, 後來於2006年發展成 Suhosin PHP Security System。 |
| Marc Schönefel | |
![]() Marc Schönefel |
Marc Schönefeld started his IT career in the early 80s with a C64, a datasette and a 6502 book from Rodney Zaks. After a university detour and a degree showing that he is able to arbitrarily mix business administration with IT, he returned to core IT. There he focussed on security research and presents on major internal conferences since 2002, focussing on JDK and JEE security. He discovered major security flaws in OpenOffice, JEE application servers (Glassfish, JBoss, Geronimo), and Sun and OpenJDK Java distributions. After being in the banking IT sector for over 10 years, since 2007 he joined a operating system vendor, working on security testing and response tasks. In his free-time he chases his dogs, looks for the best chow mein in the world, tortures his Wii, explores the endless world of free software and listens to Ennio Morricone's music. Marc Schönefeld 於80年代即利用一台 Commodore 64,一台卡帶機與一本6502的書,開始了他的 hacking 生涯。 他於2002年開始於各大國際會議演講,主要講JDK與JEE的安全性,例如: Black Hat 2002的「Security Aspects in Java Bytecode Engineering」,Black Hat 2003:「Hunting Flaws in JDK」等。 在銀行做IT十年後, Marc 加入了一家 OS 廠商,負責資安的研究與事件的應變。有空的時候,他追他的狗, 虐待他的WII,找全世界最好吃的炒麵,探索無止盡的開放源碼世界,以及聽 Ennio Morricone 的音樂。 |























