whitehat

Bill Breen

IRL Name: 
Bill Breen
Biography: 

Bill Breen has been a senior planner for the DEF CON security conference for over 12 years, and is on their CFP review board. In addition, he is a member of the Ninja Network hacker group, and has been involved in the hacking community for over 20 years. Currently, he lives in the Philippines with his wife.

Pictures: 
References

Orange Tsai

IRL Name: 
Cheng-Da Tsai
Biography: 

Cheng-Da Tsai, also as known as Orange Tsai, is member of DEVCORE and CHROOT from Taiwan. He is a speaker at conferences such as HITCON, WooYun and AVTokyo. He participates in numerous Capture-the-Flags (CTF), and won 2nd place in DEF CON 22 as team member of HITCON. Orange is currently focusing on vulnerability research & web application security. Orange enjoys finding vulnerabilities and participates in Bug Bounty Program. He is enthusiastic about finding Remote Code Execution (RCE) on big vendors, and uncovered RCE in several vendors, such as Facebook, Uber, Apple, GitHub, Yahoo and Imgur.

Pictures: 
References

0x00string

Biography: 

0x00string is a hacker and security researcher, a recent addition to Exploitee.rs who has presented at BSidesSATX and ISSW. His previous published work includes Reverse Engineering The Kankun Smart Plug, and Hacking The Samsung Allshare Cast Hub. His hobbies include bug collecting and hacking all the things.

References

Artem Kondratenko

IRL Name: 
Artem Kondratenko
Biography: 

Artem Kondratenko is a penetration tester who researchers on software and hardware security for appliances. Author of multiple CVE's on VMware Virtualization Platforms (CVE-2016-5331, CVE-2016-7458, CVE-2016-7459, CVE-2016-7460). He enjoys contributing to the community by writing penetration testing tools such as Invoke-Vnc (PowerShell vnc injector, part of CrackMapExec) and Rpivot (reverse socks4 proxy, now part of BlackArch Linux Distro).

Pictures: 
References

Mathy Vanhoef

IRL Name: 
Mathy Vanhoef
Biography: 

Mathy Vanhoef researches on stream-ciphers, discovered a new attack on RC4 that made it possible to exploit RC4 as used in TLS in practice (the RC4 NOMORE attack), and found the HEIST attack against TLS. He also focuses on wireless security, where he turns commodity wifi cards into state-of-the-art jammers, defeats MAC address randomization, and breaks protocols like WPA-TKIP.

Pictures: 
References

Indrajeet Bhuyan

IRL Name: 
Indrajeet Bhuyan
Biography: 

Indrajeet Bhuyan is an Indian security researcher who previously made the smallest possible code of 2kb which could crash WhatsApp which affected 500 million people and also reported security holes in the WhatsApp web client that in some way exposes its users’ privacy. In August 2015, he found a flaw in Indian banking system affecting 20,000+ Indian banks using which an attacker can see the bank balance and transaction history of anyone.

Pictures: 
References

Christof Paar

IRL Name: 
Christof Paar
Biography: 

Christof Paar co-founded CHES (Cryptographic Hardware and Embedded Systems), an international conference on applied cryptography. Christof’s research interests include efficient crypto implementations, hardware security, and security analysis of real-world systems. He also works on applications of embedded security, e.g., in cars or consumer devices. He holds an ERC Advanced Grant in hardware security and is spokesperson for two doctoral research schools. Christof has over 200 peer-reviewed publications and is co-author of the textbook Understanding Cryptography (Springer, 2009).

Pictures: 
References

Patrick Paumen

IRL Name: 
Patrick Paumen
Biography: 

Patrick Paumen is a biohacker who is the co-founder of hackerspace ACKspace in Netherlands. He has been experimenting with implants since 2011 and as of this writing (2018), he has 12 implants total; 5 biomagnets and 7 RFID transponders from biohacking company Dangerous Things. The biomagnets allow Patrick to sense magnetic fields, as well as lift small objects. The different RFID implants are mostly for access control applications like unlocking doors at his home, office, and car, as well as unlocking his smartphone and logging into his laptop. He can also share contact details or other data, control electronics, and measure body temperature.

Pictures: 
References

Sergei Skorobogatov

IRL Name: 
Sergei Skorobogatov
Biography: 

Dr Sergei Skorobogatov has background in chemistry, electronics, physics and computers. He received PhD degree in Computer Science from the University of Cambridge in 2005 and MSc degree in Physics in 1997. His research interests include hardware security analysis of smartcards, microcontrollers, FPGAs and ASICs. He pioneered optical fault injection attacks in 2001, which have influenced major rethink within semiconductor industry on the security protection of ICs and forced introduction of new evaluation procedures and countermeasures. Sergei's previous research has substantially improved side-channel attacks and optical fault injection attacks. His recent research set new standards on direct data extraction from EEPROM and Flash memory, while latest achievements demonstrated superior imaging capabilities of embedded memory.

Pictures: 
References

Andrew Zonenberg

IRL Name: 
Andrew Zonenberg
Biography: 

Dr. Andrew Zonenberg is into Integrated Circuit (IC) security, IC reverse engineering, and embedded/hardware security. Andrew has a PhD in computer science from Rensselaer Polytechnic Institute, focusing on System on Chip (SoC) and Operating System security. During his time at RPI he designed and taught a new one-semester course on semiconductor reverse engineering.

Pictures: 
References
Syndicate content