
| Thomas Lim | |
![]() Thomas Lim Organiser, SyScan'11, CEO, COSEINC |
Thomas Lim is the Founder and CEO of COSEINC and SyScan. Previously as the head of IT Security in one of the largest IT services companies in Singapore, he was highly disappointed with the so-called Security seminars organised by the various vendors to be nothing but a sales and marketing pitch. In 2004, he founded SyScan, a true-blue technical-based and vendor neutral IT security conference with a strong emphasis on cutting edge security research. Today, in its 8th year, SyScan is one of the most recognised security conference in the security community. As for COSEINC, this is the only privately based and funded security research company in Singapore, which became highly prominent in the security community after the publication of "BluePill" - the first hardware based VM rootkit back in 2006. |
| Stefan Esser | |
![]() Stefan Esser SektionEins PHP達人 |
Stefan Esser is best known in the security community as the PHP security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like CVS, Samba, OpenBSD or Internet Explorer. In 2003 he was the first to boot Linux directly from the hard disk of an unmodified XBOX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to develop a more secure version of PHP, known as Hardened-PHP, which evolved into the Suhosin PHP Security System in 2006. Since 2007 he works as head of research and development for the German web application company SektionEins GmbH that he co-founded. In 2010 and 2011 he got a lot of attention for presenting about iPhone security topics and supplying the jailbreaking scene with an exploit that survived multiple updates by Apple. |
| Halvar Flake | |
![]() Halvar Flake 逆向工程達人 |
Halvar has been practicing, teaching, and improving reverse engineering for a long while now. He likes to think that he has a history of having around one good idea per year. He started zynamics to build better reverse engineering tools; zynamics was bought by Google in 2011. He now works on security and reverse-engineering-related stuff at Google. |
| The Grugq | |
![]() The Grugq COSEINC 呱呱 |
The Grugq is a pioneering information security researcher with over a decade of professional experience. He has worked extensively with digital forensic analysis, binary reverse engineering, rootkits, Voice over IP, telecommunications and financial security. The Grugq's professional career has included Fortune 100 companies, leading information security firms and innovative start-ups. Currently living in Thailand, the Grugq works as a senior security researcher for COSEINC. While not on engagements, the Grugq continues his research on security, forensics and beer. Claims to fame:
The Grugq has spoken at dozens of conferences over the last 7 years; provided expert training courses to .gov, .mil, police and businesses; domain expertise on forensics, voip, telecommunications and financial systems. |
| Charlie Miller | |
![]() Charlie Miller Accuvant I-phone達人 |
Charlie Miller is Principal Research Consultant at Accuvant Labs. He was the first with a public remote exploit for both the iPhone and a phone running Android. He won the CanSecWest Pwn2Own competition for the last four years. He's hacked Second Life and Batteries. He has authored two information security books and holds a PhD from the University of Notre Dame. |
| Tarjei Mandt | |
![]() Tarjei Mandt 內核內存達人 |
Tarjei Mandt is a security researcher at Norman. He holds a Masters degree in Information Security and has previously spoken at security conferences such as Black Hat, Infiltrate, and Hackito Ergo Sum. In his free time, he enjoys spending countless hours challenging security mechanisms and researching intricate issues in low-level system components. Recently, he has done extensive research on modern kernel pool exploitation and discovered several vulnerabilities in the Windows kernel. |
| Ben Nagy | |
![]() Ben Nagy COSEINC Fuzzing達人 |
Ben Nagy is a senior security researcher with COSEINC, currently working from Kathmandu, Nepal - braving 14 hours per day of scheduled power cuts, wild dog packs and amusing diseases such as typhoid and cholera. For more than two years, he has been exploring ways to improve fuzzing scalability, especially against complex, closed source targets like Windows and Office, and has been credited (inordinately) with 'pioneering' industrial fuzzing. Ben is a one-eyed Ruby zealot and a firm believer in Not Invented Here, Beer and Enraged Ranting. latest, from infiltrate |
| Tavis Ormandy | |
![]() Tavis Ormandy 殺蟲大王 |
Tavis Ormandy is a UNIX security researcher and an active participant in open source security. As an information security engineer on Google's Security Team, he is responsible for identifying and analyzing vulnerabilities and exploits in a wide range of software. Recent publications include the co-authored Exposing Application Internals, and Hostile Virtualized Environments. |
| Chris Valasek | |
![]() Chris Valasek Accuvant LABS 香檳駭客 |
Chris Valasek is the Senior Research Scientist for Accuvant LABS. His focus on original research in areas such as vulnerability discovery, exploitation techniques and reverse engineering has allowed him to contribute massive results to the community in these niche areas. While Chris is best known for his publications regarding the Microsoft Windows Heap, his research has broken new ground in areas such as vulnerability discovery, exploitation techniques, reverse engineering, source code and binary auditing, and protocol analysis. Chris' most recent major speaking engagements include "Understanding the Low Fragmentation Heap" (Black Hat USA 2010 / EkoParty 2010), "Exploitation in the Modern Era" (Blackhat Europe 2011), and "Modern Heap Exploitation using the Low Fragmentation Heap" (Infiltrate 2011). |
| Jeremy Chiu & Benson Wu | |
![]() Jeremy Chiu ![]() Benson Wu Xecure-Lab |
Jeremy Chiu (aka Birdman) has more than ten years of experience with host-based security, focusing on kernel technologies for both the Win32 and Linux platforms. In early 2001 he was created Taiwan's first widespread trojan BirdSPY. The court dropped charges after Jeremy committed to allocate part of his future time to assist Taiwan law enforcement in digital forensics and incidence response. Jeremy specializes in rootkit/backdoor design. Jeremy also specializes in reverse engineering and malware analysis, and has been contracted by law enforcements to assist in forensics operations. Jeremy is a sought-after speaker for topics related to security, kernel programming, and object-oriented design; in addition to frequently speaking at security conferences, Jeremy is also a contract trainer for law enforcements, intelligence organizations, and conferences such as DEFCON 18, SySCAN (09 08), Hacks in Taiwan (07 06 05), HTICA(06 08) and OWASP Asia (08 07). In 2005, Jeremy founded X-Solve Inc. and successfully developed forensics and anti-malware products. In July 2007, X-Solve was acquired by Armorize Technologies. In Oct 2010, he left Armorize and created a new research team, Xecure-Lab. Benson Wu focuses research on detect and counter advanced persistent threat, code review, secure coding and SDLC process implementation. He graduated from National Taiwan University with PhD in Electrical Engineering and National Chiao-Tung University with MS in Computer Science; and held ECSP, CEI, CSSLP certifications. Currently, he is with Xecure Lab as Lead Security Researcher, and Research Center for Information Technology Innovation, Academia Sinica as Postdoctoral. He had spoken at NIST SATE 2009, DEFCON 18 (with Birdman), OWASP China 2010, BoT (Botnets in Taiwan) 2011, HIT (Hacks in Taiwan) 2011, and wrote the "Web Application Security Guideline" for the Taiwan government since year 2007. |
| Garrett Held & Kevin Stadmeyer | |
![]() Garrett Held Trustwave ![]() Kevin Stadmeyer Trustwave |
Garrett Held is a Managing Consultant in the Application Security Group in Trustwave’s SpiderLabs –the advanced security team focused on penetration testing, incident response, and application security. He has been involved in the Information Technology industry for more than 15 years, with over10 years specializing in Information Security. In addition to methodically testing applications and reviewing source code, Garrett co-developed and teaches the Trustwave Secure Development Training class and advises client executives on security policy and application architecture. Kevin is a Managing Consultant in the Application Security Group in Trustwave’s SpiderLabs. He has worked in the information security field for over 8 years. His main focus has been on application security assessments and he has worked in this capacity for a number of companies with the primary the emphasis being on the banking and pharmaceutical industries. His work included testing web applications as well as designing information security programs for these clients. In this capacity he has tested 500+ distinct applications for a variety of business sectors, these tests include code review as well as black box application testing. Kevin has spoken at a variety of security-‐oriented conferences across the globe, including Black Hat, FROC, and You Sh0t The Sherriff. |
























