schedule
Alex Ionescu

Alex Ionescu
 

Alex Ionescu is the founder of Winsider Seminars & Solutions Inc., specializing in low-level system software for administrators and developers as well as reverse engineering and security trainings for various organizations and is a coauthor of the Windows Internals series.

From 2003-2007, Alex was the lead kernel developer for ReactOS, an open source clone of Windows XP/Server 2003 written from scratch, for which he wrote most of the Windows NT–based kernel. During his studies in Computer Science, Alex worked at Apple on the iOS kernel, boot loader, firmware, and drivers on the original core platform team behind the iPhone, iPad and AppleTV. Returning to his Windows security roots, Alex is now Chief Architect at CrowdStrike, a security startup focused on nation-state adversaries and other highly sophisticated actors.

Alex continues to be very active in the security research community, discovering and reporting several vulnerabilities related to the Windows kernel and presenting talks at conferences such as Blackhat, Breakpoint, SyScan, and Recon. His work has led to the fixing of many critical kernel vulnerabilities, as well as to over a few dozen non-security bugs

Alex Ionescu will be teaching:


top ^

Subho Halder

Subho Halder
XYSec Labs


Subho Halder is a Mobile Security Researcher. Being the Lead developer and creator of AFE (Android Framework for Exploitation) he has done in-depth research and analysis on mobile platforms. He has been also listed multiple number of times in various Hall Of Fame for finding out critical Vulnerabilities in Google, Apple, Facebook, Microsoft, and many more. He has presented many talks and conducted workshops at conferences like BlackHat, Defcon, ToorCon, SysCan, ClubHack, NullCon, OWASP AppSec, RSA Conference and many more. He has also been working with private and government clients providing them Services as well as conducting Training related to Mobile Security, Exploit Development and WebApp Pen-testing.

In his work with XYSEC, he is committed to perform VAPT and malware analysis. He is currently working on a secure BYOD solution for enterprises to mitigate the security risks which comes along BYOD implementation

Subho Halder will be teaching:


top ^

Dr Bradley Schatz

Dr Bradley Schatz
Schatz Forensic


Dr Bradley Schatz divides his time between research and practice in the area of digital forensics. His research ranges from enabling live forensics to digging into the lowest layers of the hardware/software stack, while his practice ranges from investigating claims of IP theft to reconstructing the behaviour of software. The practical outcomes of Bradley’s past research may be found in the AFF4 forensic file format and the Volatility memory forensics framework.

Dr Bradley Schatz will be teaching:


top ^

Josh Thomas & Nathan Keltner

Josh Thomas
Atredis

Josh: Chief Breaking Officer for Atredis, Security researcher, mobile phone geek, mesh networking evangelist and general breaker of things electronic. Typical projects of interest span the hardware / software barrier and rarely have a UI. m0nk has spent the last year or two digging deep into Android and iOS internals, with a major focus on both the network stack implementation and the driver and below hardware interfaces. He uses IDA more frequently than Eclipse (and a soldering iron more that both). His life dreams are to ride a robot unicorn on a moonlit beach and make the world a better place, but mostly the unicorn thing...

Nathan Keltner is best known for his research related to reversing proprietary Smart Grid radio frequency systems and other Smart Grid research, and his contributions to the Metasploit Framework. Nathan has spoken at BlackHat USA, DefCon, ReCon and other notable security conferences on exploiting smart grid radio frequency systems, advanced analysis of purpose-built system-on-chip architectures, and exploitation under limited-access user security models on the Windows platform.

Josh Thomas & Nathan Keltner will be teaching:


top ^

Adam Laurie

Adam Laurie
Aperture Labs Ltd.

Adam "Major Malfunction" Laurie is the author of the open source RFID python library 'RFIDIOt' which is widely used by the hacking and research community, and comes pre-installed on distributions such as Backtrack/Kali. He is also responsible for many of the breakthrough 'hacks' on RFID devices, such as credit cards, access control systems and passports, and has a working knowledge of implementation as well as theory. His company, Aperture Labs Ltd., have recently launched a Kickstarter project to create a Software Defined RFID reader 'RFIDler'.

Adam Laurie will be teaching:


top ^

Hemil Shah

Hemil Shah
eSphere Security

Hemil Shah, CISSP, CSSLP, ACP is the founder and Director of eSphere Security, company that provides Professional services in Security Arena. He has worked with HBO, KPMG, IL&FS and Net-Square in security space. He has published several advisories, tools, and whitepapers, and has presented at numerous conferences. Hemil is expert in Mobile Application Security, Application Security, researching new methodologies and training designs. He has performed more than 1000 security consulting assignments in the area of penetration testing, code reviews, web application assessments, security architecture reviews and Mobile application security review.

Hemil Shah will be teaching:


top ^

Saumil Shah

Saumil Shah
Net-Square Solutions Pvt. Ltd.

Saumil Shah is the founder and CEO of Net-Square, providing cutting edge information security services to clients around the globe. Saumil is an internationally recognized speaker and instructor, having regularly presented at conferences like Blackhat, RSA, CanSecWest, PacSec, EUSecWest, Hack.lu, Hack-in-the-box and others. He has authored two books titled "Web Hacking: Attacks and Defense" and "The Anti- Virus Book".

Saumil graduated with an M.S. in Computer Science from Purdue University, USA and a B.E. in Computer Engineering from Gujarat University. He spends his leisure time breaking software, flying kites, traveling around the world and taking pictures.

Saumil Shah will be teaching:


top ^

Stefan Esser

Stefan Esser
SektionEins

Stefan Esser is best known in the security community as the PHP security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like CVS, Samba, OpenBSD or Internet Explorer. In 2003 he was the first to boot Linux directly from the hard disk of an unmodified XBOX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to develop a more secure version of PHP, known as Hardened-PHP, which evolved into the Suhosin PHP Security System in 2006. Since 2007 he works as head of research and development for the German web application company SektionEins GmbH that he co-founded.

In 2010 and 2011 he got a lot of attention for presenting about iPhone security topics and supplying the jailbreaking scene with an exploit that survived multiple updates by Apple.

Stefan Esser will be teaching:


top ^

John Butterworth

John Butterworth

John Butterworth specializes in low level system security He is applying his electrical engineering background and firmware engineering background to investigate UEFI/BIOS security. Over the past year his "BIOS Chronomancy" work was presented in a number of venues including NoSuchCon, BlackHat, EkoParty, Breakpoint, Hack.lu, ToorCon, SecTor, and others. This work analyzed a Dell laptop implementation of the Trusted Computing Group’s “Static-­‐Core Root of Trust for Measurement” (S-­‐CRTM) and showed how it had weaknesses that made it untrustworthy. It also showed how even if a full measurement was performed it could still not be trusted, because a "tick" malware could still attach itself to the BIOS and forge measurements. Or a "flea" could infect the BIOS and hop between BIOS revisions to persist. But this work also proposed a solution by doing a better measurement of the BIOS using TPM-­‐timing-­‐based attestation. John is also wrote the initial version of Copernicus, a tool for checking the security of your BIOS on Windows.

John Butterworth will be teaching:


top ^