Monday, November 3, 2014
Monday, September 1, 2014
Wednesday, August 6, 2014
Friday, February 14, 2014
SyScan'14 Speaker - Joxean Koret
Topic:
"Breaking Anti-Virus Software"
Joxean Koret |
Joxean Koret has been working for the past 14 years in many different
computing areas. He started working as database software developer and
DBA for a number of different RDBMS. Afterwards he got interested in
reverse engineering and applied this knowdlege to the DBs he was working
with, for which he has discovered dozens of vulnerabilities in products
from the major database vendors, specially in Oracle
software. He also worked in other security areas like malware analysis
and anti-malware software development for an Antivirus company or
developing IDA Pro at Hex-Rays. He is currently a security researcher in
Coseinc.
SyScan'14 Speaker - Corey Kallenberg, Xeno Kovah, John Butterworth & Sam Cornwell
Topic:
"Setup for Failure: Defeating SecureBoot"
Corey Kallenberg |
Corey Kallenberg is a security researcher for The MITRE Corporation who has spent
several years investigating operating system and firmware security on Intel
computers. In 2012 he coauthored work presented at DEFCON and IEEE S&P on using
timing based attestation to detect Windows kernel hooks. In 2013 he helped
discover critical problems with current implementations of the Trusted Computing
Group's "Static Root of Trust for Measurement" and co-presented this work at
NoSuchCon and Blackhat USA. Later, he discovered several vulnerabilities which
allowed bypassing of "signed BIOS enforcement" on a number of systems, allowing
an attacker to make malicious modifications to the platform firmware. These
attacks were presented at EkoParty, HITB, and PacSec.
Xeno Kovah |
Xeno is a Lead InfoSec Engineer at The MITRE Corporation, a not-‐for-‐profit company
that runs 6 federally funded research and development centers (FFRDCs) as well as
manages CVE. He is the team lead for the BIOS Analysis for Detection of Advanced
System Subversion project. On the predecessor project, Checkmate, he investigated
kernel/userspace memory integrity verification & timing-‐based attestation. Both
projects have a special emphasis on how to make it so that the measurement agent
can't just be made to lie by an attacker. Xeno has also contributed 8 days of classes
on deep system security to OpenSecurityTraining.info, with an additional 2 day class
on Intel TXT to be added soon.
John Butterworth |
John Butterworth is a security researcher at The MITRE Corporation who
specializes in low level system security. He is applying his electrical engineering
background and firmware engineering background to investigate UEFI/BIOS
security.
Sam Cornwell |
Sam Cornwell is a Sr. InfoSec Engineer at The MITRE Corporation. Since 2011 he has
been working on projects such as Checkmate, a kernel and userspace memory
integrity verification & timing-‐based attestation tool, Copernicus, a BIOS extractor
and configuration checker, and numerous other private security sensors designed to
combat sophisticated threats.
SyScan'14 Speaker - Alfredo Ortega
Topic:
"Deep-Submicron Backdoor"
Alfredo Ortega |
Alfredo Ortega is a programmer and exploit developer with
more than ten years of experience, working mostly in embedded and Unix
systems. He is member of the ITBA (Instituto Tecnologico de Buenos
Aires) Optoelectronics laboratory and co-founder of Groundworks Tech-
nologies, a startup specialized in firmware and embedded security.
SyScan'14 Speaker - Nils & Jon Butler
Topic:
"Mission mPOSsible"
@nils |
Nils is a security researcher for MWR Labs. He likes to break and exploit stuff,
which he demonstrated at pwn2own 2009, 2010, 2013 and mobile pwn2own 2012. He has
spent a considerable amount of time researching different mobile platforms and
how to evade the exploitation mitigations techniques in place on these platforms.
His current area of interest are embedded payment systems.
@securitea |
Jon works at MWR InfoSecurity, heading up their independent research in the UK. He is interested in all aspects of
vuln dev, and has used these skills to win recent Pwn2Own competitions against the Samsung Galaxy S3 and
Google Chrome. He has presented at various conferences in the past on topics relating to browser security,
reverse engineering C++ applications, and software exploitation on ARM platforms. His current research interests
include sandboxing technologies, static binary analysis, and payment card security.
SyScan'14 Speaker - Josh "m0nk" Thomas
Topic:
"How to train your Snapdragon: Exploring Power Regulation Frameworks on Android"
m0nk |
Chief Breaking Officer for Atredis, Security researcher, mobile phone geek, mesh
networking evangelist and general breaker of things electronic. Typical projects of interest
span the hardware / software barrier and rarely have a UI. m0nk has spent the last year or
two digging deep into Android and iOS internals, with a major focus on both the network
stack implementation and the driver and below hardware interfaces. He uses IDA more
frequently than Eclipse (and a soldering iron more that both). His life dreams are to ride a
robot unicorn on a moonlit beach and make the world a better place, but mostly the unicorn
thing...
SyScan'14 Speaker - Snare & Scollinsonz
Topic:
"Thunderbolts and Lightning: Very Very Frightening"
Snare |
snare and scollinsonz were slated to play Batman and Robin in the next
Batman movie until Ben Affleck bought his way into the role of Batman.
scollinsonz immediately quit in protest and became a
researcher at the University of Auckland,
where he hacks on FPGAs and stares at ChipScope all day.
snare subsequently sank far into the depths of
depression,
but after a brief stint at the Betty Ford Center he's
back flipping burgers at Azimuth Security.
SyScan'14 Speaker - Alex Ionescu
Topic:
"All about the RPC, LRPC, ALPC and LPC in your PC"
Alex Ionescu |
Alex is coauthor of Windows Internals 5th edition. He teaches
Windows OS internals to Microsoft employees and other organizations
worldwide.
He is the founder of Winsider Seminars & Solutions Inc., specializing
in low-level system software for administrators and developers. Alex was
the lead kernel developer for ReactOS, an open source clone of Windows
XP/2003 written from scratch, where he wrote most of the NT-based
kernel.
Alex is also very active in the security research community, discovering and reporting several vulnerabilities related to the Windows kernel and presenting talks at conferences such as Blackhat and Recon.
Alex's experience in OS design and kernel coding dates back to his early adolescence when he first played with John Fine's educational OS, Kernel, and Boot Loader code. Since then, he has been active in the area of NT kernel development, offering help and advice for driver developers, as well as in the NT reverse engineering and security field, where he has published a number of articles and source code, such as documentation for the Linux NTFS project, extensive papers on the Visual Basic Metadata and Pseudo-code format, and NTFS Structures and Data Streams. In the last three years, he has also contributed to patches and development in two major commercially used operating system kernels.
Alex is also very active in the security research community, discovering and reporting several vulnerabilities related to the Windows kernel and presenting talks at conferences such as Blackhat and Recon.
Alex's experience in OS design and kernel coding dates back to his early adolescence when he first played with John Fine's educational OS, Kernel, and Boot Loader code. Since then, he has been active in the area of NT kernel development, offering help and advice for driver developers, as well as in the NT reverse engineering and security field, where he has published a number of articles and source code, such as documentation for the Linux NTFS project, extensive papers on the Visual Basic Metadata and Pseudo-code format, and NTFS Structures and Data Streams. In the last three years, he has also contributed to patches and development in two major commercially used operating system kernels.
For more information on Alex, see his
web site and blog.
SyScan'14 Speaker - Mark Dowd
Topic:
"The Right Stuff: A spectral analysis of modal progressions in popular music, 1980-1989"
Mark Dowd |
Mark is a director and founder of Azimuth Security, and
brings over 10 years of security experience to the team.
The bulk of his professional career has been focused in
the area of application security research.
Mark spent a number of years as a senior researcher at
IBM's Internet Security Systems (ISS) X-Force,
during which he discovered a number of high-profile
vulnerabilities in ubiquitous Internet software.
In addition to professional vulnerability research,
Mark's previous experience includes serving as a
principal security architect for McAfee, as well as
performing a variety of information security
consulting services independently and for ITAC
Consulting.
Mark's vulnerability research record speaks for itself.
Over the last decade, Mark has identified and helped
remediate critical remotely exploitable
security vulnerabilities in Sendmail, Microsoft
Exchange, OpenSSH, Internet Explorer, Mozilla Firefox,
Adobe Flash, Checkpoint VPN, and Microsoft's SSL
implementation. In addition to his vulnerability research,
Mark has published several technical research papers,
and was a co-author of the Addison-Wesley Professional
book "The Art of Software Security Assessment". He was
the winner of the 2009 Google Native Client Security Contest.
Mark regularly speaks at industry conferences, including
BlackHat, CanSecWest, PacSec, and Ruxcon.
SyScan'14 Speaker - Charlie Miller & Chris Valasek
Topic:
Car Hacking for "Poories"
Charles Miller |
Charlie Miller is a computer security researcher with Twitter.
He was the first with a public remote exploit for both the iPhone and a phone running Android.
He won the CanSecWest Pwn2Own competition for the last four years.
He's hacked Second Life and Batteries.
He has authored two information security books and holds a PhD from the University of Notre Dame.
Chris Valasek |
Chris Valasek is the Directory of Security Intelligence at IOActive
focusing on attack trends while continuing various research projects.
Prior to IOActive, Valasek was a Senior Research Scientist at Accuvant
LABS, IBM Internet Security Systems, and Coverity. Valasek's research
focus spans areas such as vulnerability discovery, exploitation
techniques, and reverse engineering, contributing public disclosures and
authoring research on these topics to the broader security community.
While Valasek is best known for his publications regarding the Microsoft
Windows Heap, his research has broken new ground in areas such as
vulnerability discovery, exploitation techniques, reverse engineering,
source code and binary auditing, and protocol analysis. Valasek has
presented his research at major international security conferences
including Black Hat USA and Europe, ekoparty, INFILTRATE, and RSA, and
is the chairman of SummerCon, the nation's oldest hacker convention.
Subscribe to:
Posts (Atom)