whitehat

Alex Ionescu

IRL Name: 
Alex Ionescu
Biography: 

Alex Ionescu was born on April 26th, 1986, in the city of Bucharest, Romania. Son of a doctor and an engineer, he took up a passion with computers at the age of six, when he first hacked DOS 4.00's command line parser unsuccessfully until the age of seven, when he discovered hex editing. At that time, he was already fluent in QBASIC and was working on password protection programs and graphical shells.

He has been active in the area of NT Kernel Development, offering help and advice for driver developers, as well as in the NT Reverse Engineering/Security field, where he has published a number of articles and source code, such as on the topic of NTFS Advanced Data Streams.

He was the lead kernel developer for ReactOS, an open source clone of Windows XP/2003 written from scratch, where he wrote most of the NT-based kernel. Alex is also very active in the security research community, discovering and reporting several vulnerabilities related to the Windows kernel and presenting talks at conferences such as Blackhat and Recon. In the last three years, he has also contributed to patches and development in two major commercially used operating system kernels.

Pictures: 
References

Sebastian Porst

IRL Name: 
Sebastian Porst
Biography: 

Sebastian Porst is a known binary file reverse engineer who is also the lead developer of the reverse engineering IDE BinNavi, the collaborative RE information sharing tool BinCrowd, and the malware PDF analysis tool PDF Inspector.

Pictures: 
References

Ilfak Guilfanov

IRL Name: 
Ilfak Guilfanov
Biography: 

Ilfak Guilfanov is a software developer, computer security researcher and blogger who is the system architect and lead developer of IDA Pro, which is Hex-Rays' commercial version of the Interactive Disassembler he created. IDA Pro is used today by security specialists to dissect viruses and malware.

Pictures: 
References

Igor Skochinsky

IRL Name: 
Igor Skochinsky
Biography: 

Igor Skochinsky was interested in "how stuff works" since childhood and got into software reverse engineering while attending Belarusian State University. After graduating cum laude in Computer Science, he spent several years at a big software company but continued to pursue his RE hobby in free time.

References

Georg Wicherski

IRL Name: 
Georg Wicherski
Biography: 

Georg Wicherski is a x86/ARM Assembly writer and reverse engineer, malware analyst and hobbyist exploit developer. He was a member of the Honeynet Project and his last public project was mwcollectd v4, a low interaction malware collection honeypot.

Pictures: 
References

Stephan Chenette

IRL Name: 
Stephan Chenette
Biography: 

Stephan Chenette has been in involved in security research for many years and has presented at numerous conferences including: Blackhat, CanSecWest, RSA, RECon, AusCERT, ToorCon, SecTor, SOURCE and PacSec. He has released public analysis on various vulnerabilities and malware.

Pictures: 
References

Jerry Hoff

IRL Name: 
Jerry Hoff
Biography: 

Jerry Hoff is the co-founder and managing partner at Infrared Security prior to joining Whitehat Security. He has taught for over seven years at Washington University's CAIT program, and the microcomputer program at University of Missouri in St. Louis.

Pictures: 
References

Juliano Rizzo

IRL Name: 
Juliano Rizzo
Biography: 

Juliano Rizzo is a security researcher who has been involved on working with vulnerability research, reverse engineering and development of exploits. He and Thai Duong is responsible for disclosing CRIME ("Compression Ratio Info-leak Made Easy") and BEAST (Browser Exploit Against SSL/TLS) Exploits.

Pictures: 
References

http://en.wikipedia.org/wiki/CRIME_(security_exploit)

http://en.wikipedia.org/wiki/BEAST_(computer_security)#TLS_1.0

Matt Tesauro

IRL Name: 
Matt Tesauro
Biography: 

Matt Tesauro is an independent security researcher who is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. He has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.

Pictures: 
References

Justin Searle

IRL Name: 
Justin Searle
Biography: 

Justin Searle is a former Senior Security Analyst with InGuardians, specializing in the penetration testing of web applications, networks, and embedded devices, especially those pertaining to the Smart Grid. He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and currently plays key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP). He has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences, and is currently an instructor for the SANS Institute.

Pictures: 
References
Syndicate content