schedule
schedule


SyScan'14 Speaker - Joxean Koret


Topic:

"Breaking Anti-Virus Software" 

Joxean Koret
 Joxean Koret has been working for the past 14 years in many different computing areas. He started working as database software developer and DBA for a number of different RDBMS. Afterwards he got interested in reverse engineering and applied this knowdlege to the DBs he was working with, for which he has discovered dozens of vulnerabilities in products from the major database vendors, specially in Oracle software. He also worked in other security areas like malware analysis and anti-malware software development for an Antivirus company or developing IDA Pro at Hex-Rays. He is currently a security researcher in Coseinc.


SyScan'14 Speaker - Corey Kallenberg, Xeno Kovah, John Butterworth & Sam Cornwell


Topic:

"Setup for Failure: Defeating SecureBoot" 

Corey Kallenberg
 Corey Kallenberg is a security researcher for The MITRE Corporation who has spent several years investigating operating system and firmware security on Intel computers. In 2012 he coauthored work presented at DEFCON and IEEE S&P on using timing based attestation to detect Windows kernel hooks. In 2013 he helped discover critical problems with current implementations of the Trusted Computing Group's "Static Root of Trust for Measurement" and co-presented this work at NoSuchCon and Blackhat USA. Later, he discovered several vulnerabilities which allowed bypassing of "signed BIOS enforcement" on a number of systems, allowing an attacker to make malicious modifications to the platform firmware. These attacks were presented at EkoParty, HITB, and PacSec. 


Xeno Kovah
 Xeno is a Lead InfoSec Engineer at The MITRE Corporation, a not-­‐for-­‐profit company that runs 6 federally funded research and development centers (FFRDCs) as well as manages CVE. He is the team lead for the BIOS Analysis for Detection of Advanced System Subversion project. On the predecessor project, Checkmate, he investigated kernel/userspace memory integrity verification & timing-­‐based attestation. Both projects have a special emphasis on how to make it so that the measurement agent can't just be made to lie by an attacker. Xeno has also contributed 8 days of classes on deep system security to OpenSecurityTraining.info, with an additional 2 day class on Intel TXT to be added soon. 


John Butterworth
 John Butterworth is a security researcher at The MITRE Corporation who specializes in low level system security. He is applying his electrical engineering background and firmware engineering background to investigate UEFI/BIOS security.



Sam Cornwell
 Sam Cornwell is a Sr. InfoSec Engineer at The MITRE Corporation. Since 2011 he has been working on projects such as Checkmate, a kernel and userspace memory integrity verification & timing-­‐based attestation tool, Copernicus, a BIOS extractor and configuration checker, and numerous other private security sensors designed to combat sophisticated threats.


SyScan'14 Speaker - Alfredo Ortega


 Topic:

"Deep-Submicron Backdoor" 

Alfredo Ortega
 Alfredo Ortega is a programmer and exploit developer with more than ten years of experience, working mostly in embedded and Unix systems. He is member of the ITBA (Instituto Tecnologico de Buenos Aires) Optoelectronics laboratory and co-founder of Groundworks Tech- nologies, a startup specialized in firmware and embedded security.


SyScan'14 Speaker - Nils & Jon Butler


Topic:

"Mission mPOSsible"


@nils
Nils is a security researcher for MWR Labs. He likes to break and exploit stuff, which he demonstrated at pwn2own 2009, 2010, 2013 and mobile pwn2own 2012. He has spent a considerable amount of time researching different mobile platforms and how to evade the exploitation mitigations techniques in place on these platforms. His current area of interest are embedded payment systems. 


@securitea
 Jon works at MWR InfoSecurity, heading up their independent research in the UK. He is interested in all aspects of vuln dev, and has used these skills to win recent Pwn2Own competitions against the Samsung Galaxy S3 and Google Chrome. He has presented at various conferences in the past on topics relating to browser security, reverse engineering C++ applications, and software exploitation on ARM platforms. His current research interests include sandboxing technologies, static binary analysis, and payment card security.


SyScan'14 Speaker - Josh "m0nk" Thomas


Topic:

 "How to train your Snapdragon: Exploring Power Regulation Frameworks on Android" 


m0nk  
Chief Breaking Officer for Atredis, Security researcher, mobile phone geek, mesh networking evangelist and general breaker of things electronic. Typical projects of interest span the hardware / software barrier and rarely have a UI. m0nk has spent the last year or two digging deep into Android and iOS internals, with a major focus on both the network stack implementation and the driver and below hardware interfaces. He uses IDA more frequently than Eclipse (and a soldering iron more that both). His life dreams are to ride a robot unicorn on a moonlit beach and make the world a better place, but mostly the unicorn thing...


SyScan'14 Speaker - Snare & Scollinsonz


Topic:

"Thunderbolts and Lightning: Very Very Frightening"

 

Snare

snare and scollinsonz were slated to play Batman and Robin in the next Batman movie until Ben Affleck bought his way into the role of Batman. scollinsonz immediately quit in protest and became a researcher at the University of Auckland, where he hacks on FPGAs and stares at ChipScope all day. snare subsequently sank far into the depths of depression, but after a brief stint at the Betty Ford Center he's back flipping burgers at Azimuth Security.


SyScan'14 Speaker - Alex Ionescu



Topic:

"All about the RPC, LRPC, ALPC and LPC in your PC" 


Alex Ionescu

Alex is coauthor of Windows Internals 5th edition.  He teaches Windows OS internals to Microsoft employees and other organizations worldwide. 
He is the founder of Winsider Seminars & Solutions Inc., specializing in low-level system software for administrators and developers. Alex was the lead kernel developer for ReactOS, an open source clone of Windows XP/2003 written from scratch, where he wrote most of the NT-based kernel.

Alex is also very active in the security research community, discovering and reporting several vulnerabilities related to the Windows kernel and presenting talks at conferences such as Blackhat and Recon.

Alex's experience in OS design and kernel coding dates back to his early adolescence when he first played with John Fine's educational OS, Kernel, and Boot Loader code. Since then, he has been active in the area of NT kernel development, offering help and advice for driver developers, as well as in the NT reverse engineering and security field, where he has published a number of articles and source code, such as documentation for the Linux NTFS project, extensive papers on the Visual Basic Metadata and Pseudo-code format, and NTFS Structures and Data Streams. In the last three years, he has also contributed to patches and development in two major commercially used operating system kernels.
For more information on Alex, see his web site and blog.


SyScan'14 Speaker - Mark Dowd


Topic: 

"The Right Stuff: A spectral analysis of modal progressions in popular music, 1980-1989"


 
Mark Dowd
 Mark is a director and founder of Azimuth Security, and brings over 10 years of security experience to the team. The bulk of his professional career has been focused in the area of application security research. Mark spent a number of years as a senior researcher at IBM's Internet Security Systems (ISS) X-Force, during which he discovered a number of high-profile vulnerabilities in ubiquitous Internet software. In addition to professional vulnerability research, Mark's previous experience includes serving as a principal security architect for McAfee, as well as performing a variety of information security consulting services independently and for ITAC Consulting.
Mark's vulnerability research record speaks for itself. Over the last decade, Mark has identified and helped remediate critical remotely exploitable security vulnerabilities in Sendmail, Microsoft Exchange, OpenSSH, Internet Explorer, Mozilla Firefox, Adobe Flash, Checkpoint VPN, and Microsoft's SSL implementation. In addition to his vulnerability research, Mark has published several technical research papers, and was a co-author of the Addison-Wesley Professional book "The Art of Software Security Assessment". He was the winner of the 2009 Google Native Client Security Contest. Mark regularly speaks at industry conferences, including BlackHat, CanSecWest, PacSec, and Ruxcon.


SyScan'14 Speaker - Charlie Miller & Chris Valasek


 Topic: 

Car Hacking for "Poories"

 

Charles Miller
Charlie Miller is a computer security researcher with Twitter. He was the first with a public remote exploit for both the iPhone and a phone running Android. He won the CanSecWest Pwn2Own competition for the last four years. He's hacked Second Life and Batteries. He has authored two information security books and holds a PhD from the University of Notre Dame. 



Chris Valasek
Chris Valasek is the Directory of Security Intelligence at IOActive focusing on attack trends while continuing various research projects. Prior to IOActive, Valasek was a Senior Research Scientist at Accuvant LABS, IBM Internet Security Systems, and Coverity. Valasek's research focus spans areas such as vulnerability discovery, exploitation techniques, and reverse engineering, contributing public disclosures and authoring research on these topics to the broader security community. While Valasek is best known for his publications regarding the Microsoft Windows Heap, his research has broken new ground in areas such as vulnerability discovery, exploitation techniques, reverse engineering, source code and binary auditing, and protocol analysis. Valasek has presented his research at major international security conferences including Black Hat USA and Europe, ekoparty, INFILTRATE, and RSA, and is the chairman of SummerCon, the nation's oldest hacker convention.


SyScan'14 Sponsorship


There are 4 categories of sponsorship for SyScan. They are:
  1. Diamond
  2. Platinum
  3. Gold
  4. Silver
To find more more about becoming a sponsor at SyScan, please contact organiser(at)syscan(dot)org


SyScan'14 Training Class


Course Code: ST1401

Course Title: Windows Internals for Reverse Engineers

Instructor:   Alex Ionescu

3 days training date: 31 March - 02 April 2014

Course outline:  

http://www.syscan.org/index.php/sg/training/details/sys_14_01

 

Course Code: ST1402

Course Title: Android and iOS Hands-on Exploitation

Instructor:   Subho Halder

3 days training date: 31 March - 02 April 2014

Course outline:   

http://www.syscan.org/index.php/sg/training/details/sys_14_02

 

Course Code: ST1403

Course Title: Android Forensic Analysis in Depth

Instructor:   Dr Bradley Schatz

3 days training date: 31 March - 02 April 2014

Course outline:    

http://www.syscan.org/index.php/sg/training/details/sys_14_03

 

Course Code: ST1404

Course Title: Chipping away at root: A practical exploration of real world hardware hacking

Instructor:   Josh Thomas & Nathan Keltner

2 days training date: 01 - 02 April 2014

Course outline:    

http://www.syscan.org/index.php/sg/training/details/sys_14_04

  

Course Code: ST1405

Course Title: RFID: Soup to Nuts

Instructor:   Adam Laurie

2 days training date: 01 - 02 April 2014

Course outline:    

http://www.syscan.org/index.php/sg/training/details/sys_14_05

 

Course Code: ST1406

Course Title: Mobile Application – Scan, Attack and Exploit

Instructor:   Hemil Shah

2 days training date: 01 - 02 April 2014

Course outline:   

http://www.syscan.org/index.php/sg/training/details/sys_14_06

 

Course Code: ST1407

Course Title: The Exploit Laboratory Advanced Edition

Instructor:   Saumil Shah

3 days training date: 31 March - 02 April 2014

Course outline:

http://www.syscan.org/index.php/sg/training/details/sys_14_07

 

Course Code: ST1408

Course Title: iOS 7 Exploitation (Focus: MobileSafari Case Study)

Instructor:   Stefan Esser

3 days training date: 31 March - 02 April 2014

Course outline:

http://www.syscan.org/index.php/sg/training/details/sys_14_08

 

Course Code: ST1409

Course Title: Introductory BIOS and SMM Security

Instructor:   Jon Butterworth

 2 days training date: 01 - 02 April 2014

Course outline:

http://www.syscan.org/index.php/sg/training/details/sys_14_09

 

Course Code: ST1410

Course Title: Development Kernel Exploit for Microsoft Windows

Instructor:   Nikita Tarakanov

 2 days training date: 01 - 02 April 2014

Course outline:

http://www.syscan.org/index.php/sg/training/details/sys_14_10

 

 

Course Code: ST1411

Course Title: Malware Analysis Basic Course

Instructor:   Udi Shamir & Joxean Koret

 2 days training date: 01 - 02 April 2014

Course outline:

http://www.syscan.org/index.php/sg/training/details/sys_14_11

 

 

 



SyScan'14 Training Class



Register at http://www.syscan.org/index.php/sg/training

SyScan'14 - Registration Start!





SyScan'14 - Call For Paper






SyScan'13 Singapore_Speaker list is out, check it now!


Please visit our website for more details, http://www.syscan.org/index.php/sg/speakers



News: SyScan360 Beijing 2012


http://tech.ccidnet.com/zt/syscan360/ ..... more




News: SyScan360 Beijing 2012


http://special.csdn.net/syscan360/index.html/2   ........ more






http://www.cnetnews.com.cn/2012/1215/2136256.shtml  ....... more






SyScan'13 SINGAPORE- CALL FOR PAPER





Articles about SyScan Singapore 2012




Ready to "0wned" these phones during Syscan'12 Singapore?




Lucky draw prize for Syscan'12 Singapore is here!




Speaker - Paul Craig


 
Paul Craig  Security-Assessment.com Singapore 

Paul Craig is the Principal Security Consultant for Security-Assessment.com based in Singapore and working throughout the SE Asia region. Paul is avid fan of technology exploitation, and enjoys shells, privileged access and stealing rights. One of the few self-proclaimed (ethical) hackers in Singapore, Paul spends his day-to-day breaking into banks, insurance and investment companies in an attempt to increase the security bar of this humid nation. In his spare time Paul tries to learn Singlish, keep cool, and avoid being caned by the authorities (Cheeko ang mo no get rotan). Previously Paul has spoken at many international security conferences including Defcon, Syscan, Hack In The Box, Hack.Lu and Kiwicon.


Speaker - Aaron Lemasters


 
Aaron Lemasters  MANDIANT

Aaron LeMasters is a Senior Security Researcher at MANDIANT. His career has spanned a broad range of cyber security disciplines from computer forensics to vulnerability research and exploitation. Aaron spent five years responding to cyber incidents across global DOD networks at DISA and NSA, providing education and tools to network defenders to counter advanced threats such as rootkits. He most recently worked at Raytheon SI performing vulnerability research. Aaron's research interests include operating system integrity analysis, malware analysis, and reverse engineering. He is a co-author of Hacking Exposed: Malware and Rootkits (McGraw-Hill, 2009).


Speaker - Loukas


 
Loukas  Assurance Pty Ltd (Melbourne, Australia)

Security consultant, former software engineer, long time Mac fanboy, avid musician, and aficionado of the world's beers (all of them).


Speaker - Ryan MacArthur


 
Ryan MacArthur iSIGHT Partners

Ryan MacArthur Neophyte security researcher who has a penchant for booze. Tinkerer that has spiralled down into the kernel. Visionary Street Fighter IV player. I've no impressive list of CVE's and no string of acronyms after my name. Mere dwarf standing on the shoulders of giants. I've researched automated malware analysis while getting my masters in security informatics from Johns Hopkins. I then joined Symantec as a malware analyst where I reverse engineered malware and file formats to aid in detection of exploits. After that I joined iSIGHT Partners Lab to build/break things for our customers.