
| Thomas Lim | |
![]() Thomas Lim Organiser, SyScan'13, CEO, COSEINC |
Thomas Lim is the Founder and CEO of COSEINC and SyScan. Previously as the head of IT Security in one of the largest IT services companies in Singapore, he was highly disappointed with the so-called Security seminars organised by the various vendors to be nothing but a sales and marketing pitch. In 2004, he founded SyScan, a true-blue technical-based and vendor neutral IT security conference with a strong emphasis on cutting edge security research. Today, in its 8th year, SyScan is one of the most recognised security conference in the security community. As for COSEINC, this is the only privately based and funded security research company in Singapore, which became highly prominent in the security community after the publication of "BluePill" - the first hardware based VM rootkit back in 2006. |
| Alex Ionescu | |
![]() Alex Ionescu |
Alex is coauthor of Windows Internals 5th edition. He teaches Windows OS internals to Microsoft employees and other organizations worldwide.
He is the founder of Winsider Seminars & Solutions Inc., specializing
in low-level system software for administrators and developers. Alex was
the lead kernel developer for ReactOS, an open source clone of Windows
XP/2003 written from scratch, where he wrote most of the NT-based
kernel. For more information on Alex, see his web site and blog. |
| Halvar Flake | |
![]() Halvar Flake |
Halvar has been practicing, teaching, and improving reverse engineering for a long while now. He likes to think that he has a history of having around one good idea per year. He started zynamics to build better reverse engineering tools; zynamics was bought by Google in 2011. He now works on security and reverse-engineering-related stuff at Google. |
| Georg Wicherski | |
![]() Georg Wicherski CrowdStrike |
Georg Wicherski is a Senior Security Researcher with CrowdStrike, mostly analyzing advanced targeted threats but also putting himself in attackers' shoes from time to time. He loves to work on a low level, abandoning all syntactic sugar that HLL offer and working on instructions or bytecode. Recently, he has developed an interest for the ARM architecture in addition to his old x86 adventures. |
| Pedro Vilaca | |
![]() Pedro Vilaca COSEINC |
Pedro has a broad scope of interests and speciliaties, you can see him as a secuirty consultant, reverse engineer, hacker, visionary, economist, pr even MBA. He used to handle and secure the millions and billions of the Portuguese ATM network until he got bored and left for a full-time MBA. Currently doing freelancing projects on software anti-piracy, reverse engineering and developing a security and mobile device management product for iOS. He has one of the most famous blogs dedicated to OS X and iOS reverse engineering and security, http://reverse.put.as.
http://reverse.put.as
|
| Stefan Esser | |
![]() Stefan Esser SektionEins |
Stefan Esser is best known in the security community as the PHP security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like CVS, Samba, OpenBSD or Internet Explorer. In 2003 he was the first to boot Linux directly from the hard disk of an unmodified XBOX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to develop a more secure version of PHP, known as Hardened-PHP, which evolved into the Suhosin PHP Security System in 2006. Since 2007 he works as head of research and development for the German web application company SektionEins GmbH that he co-founded. In 2010 and 2011 he got a lot of attention for presenting about iPhone security topics and supplying the jailbreaking scene with an exploit that survived multiple updates by Apple. |
| Mateusz "j00ru" Jurczyk | |
![]() Mateusz "j00ru" Jurczyk |
Mateusz is a big fan of memory corruption. His main areas of interest are client software security, vulnerability exploitation and mitigation techniques, and delving into the darkest corners of low-level kernel internals with a very strong emphasis on Microsoft Windows. He is currently working as an Information Security Engineer at Google. |
| Gynvael Coldwind | |
![]() Gynvael Coldwind |
Computer security researcher. His main areas of interest are low-level security (kernel, OS, client), web security and reverse-engineering. Currently working as an Information Security Engineer at Google. |
| Michele Aubizieri | |
![]() Michele Aubizieri |
Miaubiz started fuzzing in 2010 and it soon found him to its liking. In the last two years miaubiz found over a hundred WebKit vulnerabilities. He collects four leaf clovers and lucky seeds. |
| Nguyen Anh Quynh | |
![]() Nguyen Anh Quynh COSEINC |
Nguyen Anh Quynh is a security researcher. His interests include Operating System, Virtual machine, computer forensic and malware analysis. In the past years, he has published papers, and presented his works in various academic and industrial conferences all around the world. Quynh holds a PhD degree in Computer Science, and is a member of Vnsecurity, a pioneer research group in Vietnam. |
| Barnaby Jack | |
![]() Barnaby Jack |
Barnaby Jack is a Research Architect with the TRACE research team at McAfee. Jack's role within TRACE involves researching new and emerging threats with a specific focus on embedded technology. Jack has over 10 years of experience in the security research space and previously held research positions at IOActive, Juniper Networks, eEye digital Security, and FoundStone. Over the course of his career, Jack has targeted everything from low-level Windows drivers to the exploitation of Automated Teller Machines. He has been credited with the discovery of numerous vulnerabilities, and has published multiple papers on new exploitation methods and techniques. Jack's work has been featured in many major media outlets including CNN, Forbes, MSNBC, Reuters and Wired. Jack has been an invited speaker at international security conferences in both the government and private sector including Black Hat, CanSecWest, IT-Defense and SysCan. Jack is often called upon for his opinions regarding the future of security research. |
| Mario Heiderich | |
![]() Mario Heiderich |
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it. |
| Collin Mulliner | |
![]() Collin Mulliner |
|
| Hubert Seiwert | |
![]() Hubert Seiwert |
Hubert is an experienced penetration tester with 7 years industry experience in the UK and Australia. His main interests are web and mobile application security. He has given talks and presented tools related to iPhone security and privacy issues at a number of conferences. |
| Emmanuel Gadaix | |
![]() Emmanuel Gadaix |
|


























