schedule
Thomas Lim

Thomas Lim
Organiser, SyScan'14, CEO, COSEINC

Thomas Lim is the Founder and CEO of COSEINC and SyScan. Previously as the head of IT Security in one of the largest IT services companies in Singapore, he was highly disappointed with the so-called Security seminars organised by the various vendors to be nothing but a sales and marketing pitch.

In 2004, he founded SyScan, a true-blue technical-based and vendor neutral IT security conference with a strong emphasis on cutting edge security research. Today, in its 9th year, SyScan is one of the most recognised security conference in the security community.

As for COSEINC, this is the only privately based and funded security research company in Singapore, which became highly prominent in the security community after the publication of "BluePill" - the first hardware based VM rootkit back in 2006.


top ^

Charlie Miller & Chris Valasek

Charlie Miller
Twitter



Chris Valasek
IOActive

Charlie Miller is a computer security researcher with Twitter. He was the first with a public remote exploit for both the iPhone and a phone running Android. He won the CanSecWest Pwn2Own competition for the last four years. He's hacked Second Life and Batteries. He has authored two information security books and holds a PhD from the University of Notre Dame.

Chris Valasek is the Directory of Security Intelligence at IOActive focusing on attack trends while continuing various research projects. Prior to IOActive, Valasek was a Senior Research Scientist at Accuvant LABS, IBM Internet Security Systems, and Coverity. Valasek's research focus spans areas such as vulnerability discovery, exploitation techniques, and reverse engineering, contributing public disclosures and authoring research on these topics to the broader security community. While Valasek is best known for his publications regarding the Microsoft Windows Heap, his research has broken new ground in areas such as vulnerability discovery, exploitation techniques, reverse engineering, source code and binary auditing, and protocol analysis. Valasek has presented his research at major international security conferences including Black Hat USA and Europe, ekoparty, INFILTRATE, and RSA, and is the chairman of SummerCon, the nation's oldest hacker convention.


top ^

Adam Laurie

Adam Laurie
Aperture Labs Ltd.

Adam "Major Malfunction" Laurie is the author of the open source RFID python library 'RFIDIOt' which is widely used by the hacking and research community, and comes pre-installed on distributions such as Backtrack/Kali. He is also responsible for many of the breakthrough 'hacks' on RFID devices, such as credit cards, access control systems and passports, and has a working knowledge of implementation as well as theory. His company, Aperture Labs Ltd., have recently launched a Kickstarter project to create a Software Defined RFID reader 'RFIDler'.


top ^

Alex Ionescu

Alex Ionescu
 

Alex Ionescu is the founder of Winsider Seminars & Solutions Inc., specializing in low-level system software for administrators and developers as well as reverse engineering and security trainings for various organizations and is a coauthor of the Windows Internals series.

From 2003-2007, Alex was the lead kernel developer for ReactOS, an open source clone of Windows XP/Server 2003 written from scratch, for which he wrote most of the Windows NT–based kernel. During his studies in Computer Science, Alex worked at Apple on the iOS kernel, boot loader, firmware, and drivers on the original core platform team behind the iPhone, iPad and AppleTV. Returning to his Windows security roots, Alex is now Chief Architect at CrowdStrike, a security startup focused on nation-state adversaries and other highly sophisticated actors.

Alex continues to be very active in the security research community, discovering and reporting several vulnerabilities related to the Windows kernel and presenting talks at conferences such as Blackhat, Breakpoint, SyScan, and Recon. His work has led to the fixing of many critical kernel vulnerabilities, as well as to over a few dozen non-security bugs

For more information on Alex, see his web site and blog.


top ^

Snare & Scollinsonz

@snare
Azimuth Security



@scollinsonz
University of Auckland

snare and scollinsonz were slated to play Batman and Robin in the next Batman movie until Ben Affleck bought his way into the role of Batman. scollinsonz immediately quit in protest and became a researcher at the University of Auckland, where he hacks on FPGAs and stares at ChipScope all day. snare subsequently sank far into the depths of depression, but after a brief stint at the Betty Ford Center he's back flipping burgers at Azimuth Security.


top ^

Josh "m0nk" Thomas

m0nk
Atredis

Chief Breaking Officer for Atredis, Security researcher, mobile phone geek, mesh networking evangelist and general breaker of things electronic. Typical projects of interest span the hardware / software barrier and rarely have a UI. m0nk has spent the last year or two digging deep into Android and iOS internals, with a major focus on both the network stack implementation and the driver and below hardware interfaces. He uses IDA more frequently than Eclipse (and a soldering iron more that both). His life dreams are to ride a robot unicorn on a moonlit beach and make the world a better place, but mostly the unicorn thing...


top ^

Nils & Jon Butler

@nils
MWR InfoSecurity



@securitea
MWR InfoSecurity

Nils is a security researcher for MWR Labs. He likes to break and exploit stuff, which he demonstrated at pwn2own 2009, 2010, 2013 and mobile pwn2own 2012. He has spent a considerable amount of time researching different mobile platforms and how to evade the exploitation mitigations techniques in place on these platforms. His current area of interest are embedded payment systems.

Jon works at MWR InfoSecurity, heading up their independent research in the UK. He is interested in all aspects of vuln dev, and has used these skills to win recent Pwn2Own competitions against the Samsung Galaxy S3 and Google Chrome. He has presented at various conferences in the past on topics relating to browser security, reverse engineering C++ applications, and software exploitation on ARM platforms. His current research interests include sandboxing technologies, static binary analysis, and payment card security.


top ^

Alfredo Ortega

@ortegaalfredo
Groundworks Technologies

Alfredo Ortega is a programmer and exploit developer with more than ten years of experience, working mostly in embedded and Unix systems. He is member of the ITBA (Instituto Tecnologico de Buenos Aires) Optoelectronics laboratory and co-founder of Groundworks Technologies, a startup specialized in firmware and embedded security.


top ^

Corey Kallenberg, Xeno Kovah,
John Butterworth & Sam Cornwell

Corey Kallenberg
MITRE



Xeno Kovah
MITRE



John Butterworth
MITRE



Sam Cornwell
MITRE


Corey Kallenberg is a security researcher for The MITRE Corporation who has spent several years investigating operating system and firmware security on Intel computers. In 2012 he coauthored work presented at DEFCON and IEEE S&P on using timing based attestation to detect Windows kernel hooks. In 2013 he helped discover critical problems with current implementations of the Trusted Computing Group's "Static Root of Trust for Measurement" and co-presented this work at NoSuchCon and Blackhat USA. Later, he discovered several vulnerabilities which allowed bypassing of "signed BIOS enforcement" on a number of systems, allowing an attacker to make malicious modifications to the platform firmware. These attacks were presented at EkoParty, HITB, and PacSec.

Xeno is a Lead InfoSec Engineer at The MITRE Corporation, a not-­‐for-­‐profit company that runs 6 federally funded research and development centers (FFRDCs) as well as manages CVE. He is the team lead for the BIOS Analysis for Detection of Advanced System Subversion project. On the predecessor project, Checkmate, he investigated kernel/userspace memory integrity verification & timing-­‐based attestation. Both projects have a special emphasis on how to make it so that the measurement agent can't just be made to lie by an attacker. Xeno has also contributed 8 days of classes on deep system security to OpenSecurityTraining.info, with an additional 2 day class on Intel TXT to be added soon.

John Butterworth is a security researcher at The MITRE Corporation who specializes in low level system security. He is applying his electrical engineering background and firmware engineering background to investigate UEFI/BIOS security.

Sam Cornwell is a Sr. InfoSec Engineer at The MITRE Corporation. Since 2011 he has been working on projects such as Checkmate, a kernel and userspace memory integrity verification & timing-­‐based attestation tool, Copernicus, a BIOS extractor and configuration checker, and numerous other private security sensors designed to combat sophisticated threats.


top ^

Joxean Koret

@matalaz
COSEINC

Joxean Koret has been working for the past 14 years in many different computing areas. He started working as database software developer and DBA for a number of different RDBMS. Afterwards he got interested in reverse engineering and applied this knowdlege to the DBs he was working with, for which he has discovered dozens of vulnerabilities in products from the major database vendors, specially in Oracle software. He also worked in other security areas like malware analysis and anti-malware software development for an Antivirus company or developing IDA Pro at Hex-Rays. He is currently a security researcher in Coseinc.


top ^

Daniel Bilar

Daniel Bilar
Siege Technologies

Daniel is Director of Research and Senior Principal Scientist for Siege Technologies, a 2009 startup R & D company specializing in offensive cyber-security supporting the US DoD and IC. Daniel has researched, published and lectured world-wide on highly evolved malware detection and classification, cyber warfare and quantitative compositional risk analysis/ management of computer systems. He holds a Ph.D. (2003) in Engineering Sciences from Dartmouth College (NH), a Master’s of Engineering (1997) in Operations Research and Industrial Engineering from Cornell University (NY) and a Bachelor’s of Arts (1995) in Computer Science from Brown University (RI).


top ^

The Grugq

@thegrugq

The Grugq is a pioneering information security researcher with over a decade of professional experience. He has worked extensively with digital forensic analysis, binary reverse engineering, rootkits, Voice over IP, telecommunications and financial security. The Grugq's professional career has included Fortune 100 companies, leading information security firms and innovative start-ups.

Claims to fame:

  • pioneered anti-forensics
  • developed "userland exec"
  • released voip attack software
  • decade of experience in info sec
  • long term liaison w/ digital underground
  • described as "extremely handsome" [by his mom]
  • 1992 sussex County 3-legged race, 2nd place

The Grugq has spoken at dozens of conferences over the last 7 years; provided expert training courses to .gov, .mil, police and businesses; domain expertise on forensics, voip, telecommunications and financial systems.


top ^

Georg Wicherski

Georg Wicherski
CrowdStrike


Georg Wicherski is a Senior Security Researcher with CrowdStrike, mostly analyzing advanced targeted threats but also putting himself in attackers' shoes from time to time. He loves to work on a low level, abandoning all syntactic sugar that HLL offer and working on instructions or bytecode. Recently, he has developed an interest for the ARM architecture in addition to his old x86 adventures.


top ^

Alex Plaskett & Nick Walker

Alex Plaskett
MWR InfoSecurity



Nick Walker
MWR InfoSecurity

Alex is currently head of mobile security at MWR InfoSecurity in the UK. Alex is best known for the first public exploit demo against Windows Phone 7 and identifying a large number of OEM introduced weaknesses on the platform. Alex has previously presented at Deepsec, BlueHat, T2.Fi, 44con.

Nick is one of MWR InfoSecurity go to guys for Android security and has previously presented about Android Security at a number of security conferences (BruCON, NetworkShop 41, Securi-Tay 2012). Nick has recently been involved in long term research projects focusing on Windows Phone 8, adapting vulnerabilities and concepts identified on Android to the new platform.


top ^

Mathias Payer

gannimo
UC Berkeley


Mathias Payer (gannimo) is a security nerd and computer science researcher and PostDoc at UC Berkeley. His interests are related to system security, binary exploitation, user-space software-based fault isolation, binary translation/recompilation, and (application) virtualization.

He graduated from ETH with a Dr. sc. ETH in 2012. The topic of his thesis is related to low-level binary translation and security. After developing a fast binary translation system (fastBT) he started to analyze different exploit techniques and wondered how binary translation could be used to raise the guard of current systems (with TRuE and libdetox as a prototype implementation of the security framework). At UC Berkeley Mathias is working on novel protection mechanisms against control flow hijack attacks and malware detection mechanisms.

Mathias is a vivid attendee of different hacker conferences, including the chaos communication conferences from 21c3 to 29c3, defcon, and Swiss cyber storm 2011. After being attende for several years, he started to enjoy speakers privileges and spoke at Swiss cyber storm 2011 and 3 times at CCC (26c3, 27c3, and 28c3). This year at 30c3, he will present a talk on scaling symbolic execution to trigger vulnerabilities hidden after sets of input transformations. Apart from hacker conferences Mathias presented his research at the top academic security conferences, including Oakland (IEEE Symposium on Security and Privacy) 2012 and 2013, Usenix ATC 2013, ACM VEE 2011 and 2012, ESORICS 2012, and IEEE PST 2013.


top ^

Dean Carter & Shahn Harris

fosm
Confide Limited



fobski
Internal Security Consultant for a New Zealand Financial


Dean is a well-known member of the New Zealand Information Security industry through his time working as a QSA and is a member of a number of New Zealand Information Security Groups. Dean has presented 3 times at Kiwicon (twice as Faily), in Hong Kong and several times in Australia.

Shahn has worked in the New Zealand InfoSec across multiple sectors either internally or in a consulting capacity. He has presented at Kiwicon in 2011 and 2013 as well as presenting on a regular basis at local New Zealand security groups.


top ^

Anton Sapozhnikov

snowytoxa
KPMG

Anton Sapozhnikov has more than 6 years of experience in penetration testing. He worked with many companies from Fortune Global 500 list. In his spare time he participates in CTFs with More Smocked Leet Chicken.


top ^

Michele Aubizieri

Michele Aubizieri
 

Miaubiz started fuzzing in 2010 and it soon found him to its liking. In the last two years miaubiz found over a hundred WebKit vulnerabilities. He collects four leaf clovers and lucky seeds.


top ^