
| Thomas Lim | |
![]() Thomas Lim Organiser, SyScan'12, CEO, COSEINC |
Thomas Lim is the Founder and CEO of COSEINC and SyScan. Previously as the head of IT Security in one of the largest IT services companies in Singapore, he was highly disappointed with the so-called Security seminars organised by the various vendors to be nothing but a sales and marketing pitch. In 2004, he founded SyScan, a true-blue technical-based and vendor neutral IT security conference with a strong emphasis on cutting edge security research. Today, in its 8th year, SyScan is one of the most recognised security conference in the security community. As for COSEINC, this is the only privately based and funded security research company in Singapore, which became highly prominent in the security community after the publication of "BluePill" - the first hardware based VM rootkit back in 2006. |
| Stefan Esser | |
![]() Stefan Esser SektionEins |
Stefan Esser is best known in the security community as the PHP security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like CVS, Samba, OpenBSD or Internet Explorer. In 2003 he was the first to boot Linux directly from the hard disk of an unmodified XBOX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to develop a more secure version of PHP, known as Hardened-PHP, which evolved into the Suhosin PHP Security System in 2006. Since 2007 he works as head of research and development for the German web application company SektionEins GmbH that he co-founded. In 2010 and 2011 he got a lot of attention for presenting about iPhone security topics and supplying the jailbreaking scene with an exploit that survived multiple updates by Apple. |
| Chris Valasek and Tarjei Mandt | |
![]() Chris Valasek Coverity ![]() Tarjei Mandt |
Chris Valasek is a Senior Security Researcher at Coverity. As part of the security research team in the Office of the CTO, Valasek is focused on reverse engineering and researching new and existing security vulnerabilities; building this knowledge into the Coverity technology portfolio and share it broadly across the development community. Prior to Coverity, Valasek was a Senior Research Scientist at Accuvant LABS and IBM Internet Security Systems. Valasek's research focus spans areas such as vulnerability discovery, exploitation techniques, and reverse engineering, contributing public disclosures and authoring research on these topics to the broader security community. While Valasek is best known for his publications regarding the Microsoft Windows Heap, his research has broken new ground in areas such as vulnerability discovery, exploitation techniques, reverse engineering, source code and binary auditing, and protocol analysis. Valasek has presented his research at major international security conferences including Black Hat USA and Europe, ekoparty, INFILTRATE, and RSA, and is the chairman of SummerCon, the nation's oldest hacker convention. Tarjei Mandt is a senior vulnerability researcher at Azimuth Security. He holds a Masters degree in Information Security and has previously spoken at security conferences such as Black Hat USA, INFILTRATE, SyScan, H2HC, and Hackito Ergo Sum. In his free time, he enjoys spending countless hours challenging security mechanisms and researching intricate issues in low-level system components. Recently, he has done extensive research on modern kernel pool exploitation and discovered several vulnerabilities in Windows kernel components. |
| Alex Ionescu | |
![]() Alex Ionescu |
Alex is coauthor of Windows Internals 5th edition. He teaches Windows OS internals to Microsoft employees and other organizations worldwide.
He is the founder of Winsider Seminars & Solutions Inc., specializing
in low-level system software for administrators and developers. Alex was
the lead kernel developer for ReactOS, an open source clone of Windows
XP/2003 written from scratch, where he wrote most of the NT-based
kernel. For more information on Alex, see his web site and blog. |
| Edgar Barbosa | |
![]() Edgar Barbosa COSEINC |
Edgar Barbosa is a senior security researcher in the Advanced Malware Lab (AML) of COSEINC. He was a member of the team within AML to develop Blue Pill , a virtual machine rootkit, and has published several papers. Edgar has experience in kernel development, rootkit research, code reverse engineering and virtualization technologies. He is currently working on program analysis and the applications of SMT solvers for bug finding. |
| Jon Oberheide | |
![]() Jon Oberheide |
Jon Oberheide is CTO of Duo Security, an Ann Arbor-based startup developing kick-ass two-factor authentication. In his free time, Jon dabbles in kernel exploitation, mobile security, and beer brewing. |
| Brett Moore | |
![]() Brett Moore Insomnia Security |
Brett has been evading arrest for the last 10 years through the use of a cunning concealment plan that involves using corporate security firms as a front for his nefarious plans to take over the world. Currently he heads up Insomnia Security where he spends most of his time writing tools, papers, advisories and increasing the number of cockroaches on the Internet. |
| James Burton | |
![]() James Burton Insomnia Security |
James Burton is an intrepid Entomologist and the Chief Exploitation Officer (CXO) of Insomnia Security's Malicious Engineering Research & Development Department. He spends much of his time hunting for bugs in the hope they will mature into fully-fledged remote shells. |
| SeungJin Lee and Ryan MacArthur | |
![]() SeungJin Lee Independent Security and Drinking Researcher ![]() Ryan MacArthur iSIGHT Partners |
SeungJin Lee The fact that beist only requires 15 minutes rest after much soju should be more than enough for his bio, but here is the rest of the story: Suntory Premium Malts is currently his favorite beer, but Guinness comes in a close second. Beist has been a member of the IT security field since 2000. His first company was Cyber Research based in Seoul, South Korea and first focused on pen-testing. He then got a Computer Engineering B.A. degree from Sejong University. He has won more than 10 global CTF hacking contests in his country as well as passed DefCon quals 5 times. He has sold his research to major security companies like iDefense and ZDI (Recon ZDI contest). He has run numerous security conferences and hacking contests in Korea. Hunting bugs and exploiting them are his main interest. Ryan MacArthur Neophyte security researcher who has a penchant for booze. Tinkerer that has spiralled down into the kernel. Visionary Street Fighter IV player. I've no impressive list of CVE's and no string of acronyms after my name. Mere dwarf standing on the shoulders of giants. I've researched automated malware analysis while getting my masters in security informatics from Johns Hopkins. I then joined Symantec as a malware analyst where I reverse engineered malware and file formats to aid in detection of exploits. After that I joined iSIGHT Partners Lab to build/break things for our customers. |
| Loukas | |
![]() Loukas Assurance Pty Ltd (Melbourne, Australia) |
Security consultant, former software engineer, long time Mac fanboy, avid musician, and aficionado of the world's beers (all of them). |
| Aaron Lemasters | |
![]() Aaron Lemasters MANDIANT |
Aaron LeMasters is a Senior Security Researcher at MANDIANT. His career has spanned a broad range of cyber security disciplines from computer forensics to vulnerability research and exploitation. Aaron spent five years responding to cyber incidents across global DOD networks at DISA and NSA, providing education and tools to network defenders to counter advanced threats such as rootkits. He most recently worked at Raytheon SI performing vulnerability research. Aaron's research interests include operating system integrity analysis, malware analysis, and reverse engineering. He is a co-author of Hacking Exposed: Malware and Rootkits (McGraw-Hill, 2009). |
| Paul Craig | |
![]() Paul Craig Security-Assessment.com Singapore |
Paul Craig is the Principal Security Consultant for Security-Assessment.com based in Singapore and working throughout the SE Asia region. Paul is avid fan of technology exploitation, and enjoys shells, privileged access and stealing rights. One of the few self-proclaimed (ethical) hackers in Singapore, Paul spends his day-to-day breaking into banks, insurance and investment companies in an attempt to increase the security bar of this humid nation. In his spare time Paul tries to learn Singlish, keep cool, and avoid being caned by the authorities (Cheeko ang mo no get rotan). Previously Paul has spoken at many international security conferences including Defcon, Syscan, Hack In The Box, Hack.Lu and Kiwicon. |

























