Friday, February 14, 2014

SyScan'14 Speaker - Joxean Koret

Topic:

"Breaking Anti-Virus Software" 

Joxean Koret
 Joxean Koret has been working for the past 14 years in many different computing areas. He started working as database software developer and DBA for a number of different RDBMS. Afterwards he got interested in reverse engineering and applied this knowdlege to the DBs he was working with, for which he has discovered dozens of vulnerabilities in products from the major database vendors, specially in Oracle software. He also worked in other security areas like malware analysis and anti-malware software development for an Antivirus company or developing IDA Pro at Hex-Rays. He is currently a security researcher in Coseinc.

SyScan'14 Speaker - Corey Kallenberg, Xeno Kovah, John Butterworth & Sam Cornwell

Topic:

"Setup for Failure: Defeating SecureBoot" 

Corey Kallenberg
 Corey Kallenberg is a security researcher for The MITRE Corporation who has spent several years investigating operating system and firmware security on Intel computers. In 2012 he coauthored work presented at DEFCON and IEEE S&P on using timing based attestation to detect Windows kernel hooks. In 2013 he helped discover critical problems with current implementations of the Trusted Computing Group's "Static Root of Trust for Measurement" and co-presented this work at NoSuchCon and Blackhat USA. Later, he discovered several vulnerabilities which allowed bypassing of "signed BIOS enforcement" on a number of systems, allowing an attacker to make malicious modifications to the platform firmware. These attacks were presented at EkoParty, HITB, and PacSec. 


Xeno Kovah
 Xeno is a Lead InfoSec Engineer at The MITRE Corporation, a not-­‐for-­‐profit company that runs 6 federally funded research and development centers (FFRDCs) as well as manages CVE. He is the team lead for the BIOS Analysis for Detection of Advanced System Subversion project. On the predecessor project, Checkmate, he investigated kernel/userspace memory integrity verification & timing-­‐based attestation. Both projects have a special emphasis on how to make it so that the measurement agent can't just be made to lie by an attacker. Xeno has also contributed 8 days of classes on deep system security to OpenSecurityTraining.info, with an additional 2 day class on Intel TXT to be added soon. 


John Butterworth
 John Butterworth is a security researcher at The MITRE Corporation who specializes in low level system security. He is applying his electrical engineering background and firmware engineering background to investigate UEFI/BIOS security.



Sam Cornwell
 Sam Cornwell is a Sr. InfoSec Engineer at The MITRE Corporation. Since 2011 he has been working on projects such as Checkmate, a kernel and userspace memory integrity verification & timing-­‐based attestation tool, Copernicus, a BIOS extractor and configuration checker, and numerous other private security sensors designed to combat sophisticated threats.

SyScan'14 Speaker - Alfredo Ortega

 Topic:

"Deep-Submicron Backdoor" 

Alfredo Ortega
 Alfredo Ortega is a programmer and exploit developer with more than ten years of experience, working mostly in embedded and Unix systems. He is member of the ITBA (Instituto Tecnologico de Buenos Aires) Optoelectronics laboratory and co-founder of Groundworks Tech- nologies, a startup specialized in firmware and embedded security.

SyScan'14 Speaker - Nils & Jon Butler

Topic:

"Mission mPOSsible"


@nils
Nils is a security researcher for MWR Labs. He likes to break and exploit stuff, which he demonstrated at pwn2own 2009, 2010, 2013 and mobile pwn2own 2012. He has spent a considerable amount of time researching different mobile platforms and how to evade the exploitation mitigations techniques in place on these platforms. His current area of interest are embedded payment systems. 


@securitea
 Jon works at MWR InfoSecurity, heading up their independent research in the UK. He is interested in all aspects of vuln dev, and has used these skills to win recent Pwn2Own competitions against the Samsung Galaxy S3 and Google Chrome. He has presented at various conferences in the past on topics relating to browser security, reverse engineering C++ applications, and software exploitation on ARM platforms. His current research interests include sandboxing technologies, static binary analysis, and payment card security.

SyScan'14 Speaker - Josh "m0nk" Thomas

Topic:

 "How to train your Snapdragon: Exploring Power Regulation Frameworks on Android" 


m0nk  
Chief Breaking Officer for Atredis, Security researcher, mobile phone geek, mesh networking evangelist and general breaker of things electronic. Typical projects of interest span the hardware / software barrier and rarely have a UI. m0nk has spent the last year or two digging deep into Android and iOS internals, with a major focus on both the network stack implementation and the driver and below hardware interfaces. He uses IDA more frequently than Eclipse (and a soldering iron more that both). His life dreams are to ride a robot unicorn on a moonlit beach and make the world a better place, but mostly the unicorn thing...

SyScan'14 Speaker - Snare & Scollinsonz

Topic:

"Thunderbolts and Lightning: Very Very Frightening"

 

Snare

snare and scollinsonz were slated to play Batman and Robin in the next Batman movie until Ben Affleck bought his way into the role of Batman. scollinsonz immediately quit in protest and became a researcher at the University of Auckland, where he hacks on FPGAs and stares at ChipScope all day. snare subsequently sank far into the depths of depression, but after a brief stint at the Betty Ford Center he's back flipping burgers at Azimuth Security.

SyScan'14 Speaker - Alex Ionescu


Topic:

"All about the RPC, LRPC, ALPC and LPC in your PC" 


Alex Ionescu

Alex is coauthor of Windows Internals 5th edition.  He teaches Windows OS internals to Microsoft employees and other organizations worldwide. 
He is the founder of Winsider Seminars & Solutions Inc., specializing in low-level system software for administrators and developers. Alex was the lead kernel developer for ReactOS, an open source clone of Windows XP/2003 written from scratch, where he wrote most of the NT-based kernel.

Alex is also very active in the security research community, discovering and reporting several vulnerabilities related to the Windows kernel and presenting talks at conferences such as Blackhat and Recon.

Alex's experience in OS design and kernel coding dates back to his early adolescence when he first played with John Fine's educational OS, Kernel, and Boot Loader code. Since then, he has been active in the area of NT kernel development, offering help and advice for driver developers, as well as in the NT reverse engineering and security field, where he has published a number of articles and source code, such as documentation for the Linux NTFS project, extensive papers on the Visual Basic Metadata and Pseudo-code format, and NTFS Structures and Data Streams. In the last three years, he has also contributed to patches and development in two major commercially used operating system kernels.
For more information on Alex, see his web site and blog.

SyScan'14 Speaker - Mark Dowd

Topic: 

"The Right Stuff: A spectral analysis of modal progressions in popular music, 1980-1989"


 
Mark Dowd
 Mark is a director and founder of Azimuth Security, and brings over 10 years of security experience to the team. The bulk of his professional career has been focused in the area of application security research. Mark spent a number of years as a senior researcher at IBM's Internet Security Systems (ISS) X-Force, during which he discovered a number of high-profile vulnerabilities in ubiquitous Internet software. In addition to professional vulnerability research, Mark's previous experience includes serving as a principal security architect for McAfee, as well as performing a variety of information security consulting services independently and for ITAC Consulting.
Mark's vulnerability research record speaks for itself. Over the last decade, Mark has identified and helped remediate critical remotely exploitable security vulnerabilities in Sendmail, Microsoft Exchange, OpenSSH, Internet Explorer, Mozilla Firefox, Adobe Flash, Checkpoint VPN, and Microsoft's SSL implementation. In addition to his vulnerability research, Mark has published several technical research papers, and was a co-author of the Addison-Wesley Professional book "The Art of Software Security Assessment". He was the winner of the 2009 Google Native Client Security Contest. Mark regularly speaks at industry conferences, including BlackHat, CanSecWest, PacSec, and Ruxcon.

SyScan'14 Speaker - Charlie Miller & Chris Valasek

 Topic: 

Car Hacking for "Poories"

 

Charles Miller
Charlie Miller is a computer security researcher with Twitter. He was the first with a public remote exploit for both the iPhone and a phone running Android. He won the CanSecWest Pwn2Own competition for the last four years. He's hacked Second Life and Batteries. He has authored two information security books and holds a PhD from the University of Notre Dame. 



Chris Valasek
Chris Valasek is the Directory of Security Intelligence at IOActive focusing on attack trends while continuing various research projects. Prior to IOActive, Valasek was a Senior Research Scientist at Accuvant LABS, IBM Internet Security Systems, and Coverity. Valasek's research focus spans areas such as vulnerability discovery, exploitation techniques, and reverse engineering, contributing public disclosures and authoring research on these topics to the broader security community. While Valasek is best known for his publications regarding the Microsoft Windows Heap, his research has broken new ground in areas such as vulnerability discovery, exploitation techniques, reverse engineering, source code and binary auditing, and protocol analysis. Valasek has presented his research at major international security conferences including Black Hat USA and Europe, ekoparty, INFILTRATE, and RSA, and is the chairman of SummerCon, the nation's oldest hacker convention.