The Important People
Collin Mulliner is a systems security researcher with focus on software
components close to the operating system and kernel. In the past he
spent most of his time working on mobile and embedded systems with an
emphasis on mobile and smart phones. Collin is interested in
vulnerability analysis and offensive security as he believes that in
order to understand defense you first have to understand offense. Collin
received a Ph.D. from the Technische Universitaet Berlin in 2011, and a
M.S. and B.S. in computer science from UC Santa Barbara and
FH-Darmstadt. Lately Collin switched his focus to the defensive side to
work on mitigations and countermeasures. Collin is also co-author of The
Android Hacker's Handbook.
Corey Kallenberg
Corey Kallenberg is a co-founder of LegbaCore, a consultancy focused on
evaluating and improving host security at the lowest levels. His
specialty areas are trusted computing, vulnerability research and low
level development. In particular, Corey has spent several years using
his vulnerability research expertise to evaluate limitations in current
trusted computing implementations. In addition, he has used his
development experience to create and improve upon trusted computing
applications. Among these are a timing based attestation agent designed
to improve firmware integrity reporting, and an open source Trusted
Platform Module driver for Windows. Corey is also an experienced
trainer, having created and delivered several technical courses. He is
an internationally recognized speaker who has presented at BlackHat USA,
DEF CON, CanSecWest, Hack in the Box, NoSuchCon, SyScan, EkoParty and
Ruxcon.
Dino Dai Zovi has been working in information security for over a decade with experience in red teaming, penetration testing, software security, information security management, and cybersecurity R&D. Dino is also a regular speaker at information security conferences having presented his independent research on memory corruption exploitation techniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits over the last 10 years at conferences around the world including DEFCON, BlackHat, and CanSecWest. He is a co-author of the books "The iOS Hacker's Handbook" (Wiley, 2012), "The Mac Hacker’s Handbook" (Wiley, 2009), and "The Art of Software Security Testing" (Addison-Wesley, 2006). In 2008, eWEEK named him one of the 15 Most Influential People in Security. He is perhaps best known in the information security and Mac communities for winning the first Pwn2Own contest at CanSecWest 2007.
Charlie Miller is a security engineer at Twitter. Back when he still had time to research, he was the first with a public remote exploit for both the iPhone and the G1 Android phone. He is a four-time winner of the CanSecWest Pwn2Own competition. He has authored three information security books and holds a PhD from the University of Notre Dame. He has hacked browsers, phones, cars, and batteries. Charlie spends his free time trying to get back together with Apple, but sadly they still list their relationship status as, "It's complicated."
Stephen A. Ridley [@s7ephen]
Stephen A. Ridley is a security researcher at Xipiter. He has more than 10 years of experience in software development, software security, and reverse engineering. Prior to Xipiter, Ridley served as the Chief Information Security O?cer of a financial services ?rm and prior to that was a Senior Researcher at Matasano. He also was Senior Security Architect at McAfee, and a founding member of the Security and Mission Assurance (SMA) group at a major U.S. defense contractor where he did vulnerability research and reverse engineering in support of the U.S. Intelligence Community. He has spoken about reverse engineering and software security at Black Hat, ReCon, CanSecWest, EuSecWest, Syscan, and other prominent information security conferences. Ridley is a co-author of "The Android Hacker's Handbook" published by Wiley & Sons.
Kelly has "officially" worked in Information Security since
2003, and is currently a Security Engineer at Tumblr where she brings her
decadeâs worth of application security experience in the financial and
government sectors to the microblogging world. She regularly speaks about
reverse engineering at various conferences, including BlackHat, SummerCon,
and Countermeasure. Additionally, she teaches as an adjunct professor of
Application Security at NYU.
Zach Lanier [@quine]
Zach Lanier is a Senior Research Scientist with Accuvant
Labs, specializing in various bits of network, application, mobile, and
embedded security. Prior to joining Accuvant, Zach most recently served as
a Senior Security Researcher with Duo Security. He has spoken at a variety
of security conferences, such as Black Hat, DEFCON, CanSecWest, INFILTRATE,
ShmooCon, and SecTor, and is a co-author of the "Android Hackers' Handbook"
(Wiley, 2014).
Patroklos Argyroudis [@_argp]
Patroklos Argyroudis is a computer security researcher at
CENSUS S.A., a
company that builds on strong research foundations to offer specialized IT
security services to customers worldwide. His main expertise is
vulnerability
research, exploit development, reverse engineering, and source code
auditing.
Patroklos has presented his research at several international security
conferences (Black Hat USA and EU, Infiltrate, PH-Neutral, ZeroNights, etc)
on
topics such as kernel and heap exploitation, kernel protection
technologies, and
network security protocols. He holds a PhD from Trinity College Dublin,
where he has
also worked as a postdoctoral researcher on applied cryptography.
Billy was once a successful Madaganese Olive Smuggler living the high life. After the great olive market crash of 2000, Billy made the move to cyber security. Since making the move to cyber security, Billy has led several prestigious security teams including security teams at Microsoft and Google. Billy was a Lead at Google where he led the front line response for externally reported security issues and incidents. Prior to Google, Billy was the Security Program Manager at Internet Explorer (Microsoft). His interests include emerging threats related to Industrial Control Systems (ICS), Critical Infrastructure (CI), and medical devices.
Julien Vanegue is a computer security researcher from New York who spends a lot of time reading Phrack articles when he is not writing them. Julien previously presented at Summercon in 2012 and 2014 on Modern static analysis using SMT solvers and the Automated Exploitation Grand Challenge.