Antonio Nappa

ANTONIO NAPPA, PH.D IS THE APPLICATION ANALYSIS TEAM LEADER AT ZIMPERIUM INC. BEFORE JOINING ZIMPERIUM HE WORKED AT BRAVE SOFTWARE AND CORELIGHT.

ANTONIO HAS BEEN ACTIVE IN THE CYBERSECURITY INDUSTRY SINCE 17 YEARS. HE HAS BEEN A VISITING SCHOLAR AT UC BERKELEY, EURECOM, VSB-TUO. HE HAS PUBLISHED MORE THAN 15 PAPERS IN INTERNATIONAL PEER-REVIEWED VENUES. HE IS ALSO AN INVENTOR AND A WELL RECOGNIZED ADJUNCT PROFESSOR AT UC3M MADRID.

HE IS CO-AUTHOR OF: FUZZING AGAINST THE MACHINE: AUTOMATE VULNERABILITY RESEARCH WITH EMULATED IOT DEVICES ON QEMU, PACKT PUBLISHING 2023.

SINCE THE DEFCON 2008 FINALS WITH THE GUARD@MYLAN0 TEAM, HE NEVER GOES TO SLEEP WITH A SEGFAULT.

  • QEMU For Fuzz and Profit: Emulation & Fuzzing: Deep Dive into Cybersecurity Techniques
Arun

Arun is an experienced Red Teamer with specialized expertise in malware development and evasion. Holding certifications like OSCP, CRTP, CRTL, CodeMachine Malware Techniques, Malware on Steroids and Hacksys Windows Kernel Exploitation, he showcases a profound grasp of offensive security. His hands-on experience with top-tier organizations like Google and Mandiant enriches his understanding of real-world cyber tactics. He has volunteered as a trainer at Blackhat Europe MIPS Exploit Development, contributed at Defcon Adversary Village, and presented talks and workshops at RedTeamSummit, c0c0n, and regional Null Meetups.

  • Mastering Offensive Hooking and Unhooking
Brian Gorenc

Brian Gorenc is the Vice President of Threat Research at Trend Micro. In this role, he leads a globally dispersed research organization responsible for the delivery of comprehensive protection technology and threat intelligence to defend against sophisticated attacks. Gorenc is also responsible for the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. The ZDI works to expose and remediate weaknesses in the world's most popular software. Brian is also responsible for organizing and adjudicating the ever-popular Pwn2Own hacking competitions.

Before joining Trend Micro, Gorenc worked for Lockheed Martin on the F-35 Joint Strike Fighter (JSF) program. In this role, he led the development effort on the Information Assurance (IA) products in the JSF’s mission planning environment. In addition to degrees from Southern Methodist University and Texas A&M, Brian holds multiple certifications including (ISC)2's CISSP and CSSLP.

  • Best of the Worst: Misadventures in Bug Disclosure
Dustin Childs
  • Best of the Worst: Misadventures in Bug Disclosure
Jacob Torrey

Jacob is the Head of Labs at Thinkst Applied Research. Prior to that he managed the HW/FW/VMM security team at AWS, and was a Program Manager at DARPA's Information Innovation Office (I2O). At DARPA he managed a cyber security R&D portfolio including the Configuration Security, Transparent Computing, and Cyber Fault-tolerant Attack Recovery programs. Starting his career at Assured Information Security, he led the Computer Architectures group performing bespoke research into low-level systems security and programming languages. Jacob has been a speaker and keynote speaker at conferences around the world, from BlackHat USA, to SysCan, to TROOPERS and many more. When not in front of the computer, he enjoys trail running, volunteering as a firefighter/EMT, and hiking with his family.

  • Exploring the lay of the LLM detection landscape
John McIntosh

A security researcher @clearseclabs who is passionate about learning and sharing knowledge on various aspects of information security. He has a keen interest in binary analysis, patch diffing, and vulnerability discovery. He is the creator of several open-source security tools and also blogs regularly about his research projects and experiments with Ghidra and patch diffing. You can follow him on Twitter @clearbluejar or visit his website https://clearbluejar.github.io.

  • Patch Diffing In The Dark
Marion Marschalek

Marion Marschalek is a Senior Security Engineer at AWS, where she advises efforts to build threat detection solutions based on machine learning and AI. Priorly she held an offensive security research position at Intel and different roles in the threat detection industry, as a malware reverse engineer and incident responder. Marschalek is the founder of BlackHoodie, a hacker bootcamp for women, which is established as a global initiative to attract more diverse talent to the security industry.

  • BlackHoodie Training: Introduction to Software Reverse Engineering
  • Compiler Backdooring For Beginners
Matthew Alt (wrongbaud)

Matthew began his reverse engineering career in the aftermarket automotive industry, searching for vulnerabilities in engine control units' diagnostic protocol implementations. Next, he worked at MIT Lincoln Laboratory, where he led a team focused on embedded systems analysis. While at MIT, Matthew was awarded the Outstanding Contributor Award for his technical contributions. You can find other examples of his work and teaching style on his personal blog, the VSS research blog and through the free Ghidra course he authored at Hackaday.

  • Glitching in 3D: Low Cost EMFI Attacks
Robin David

Robin David, Phd is the automated analysis team leader at Quarkslab and full-time software security researcher. He is working on various technologies like greybox fuzzing, symbolic excution, firmware analysis and deobfuscation for which he is actively working on open-source tools to help to community.
He has been presenting his work in a variety of industrial conferences like Black Hat or BalCCon but also academic venues like S\&P, BAR, or ISSTA. He is also trainer at RingZero.

  • Binary Reversing and Whole Firmware Diffing
Ronald Broberg
  • Hack Our Drone
Soumyadeep Basu

Soumyadeep is a cybersecurity professional with expertise in both offensive and defensive security. Having earned certifications such as OSCP, OSEP, eCPTX and AZ-500, Soumyadeep possesses extensive skills and knowledge in both offensive and defensive cybersecurity domains. Soumyadeep has a strong foundation in red teaming and has worked with companies like Mandiant and Zscaler. Soumyadeep is a Cloud Threat Detection Engineer at CRED, specializing in tracking and disrupting cloud threat actors

  • Mastering Offensive Hooking and Unhooking
Thomas Dullien
  • Revisiting 2017: AI and Security, 7 years later
tieknimmers

Niek has been analyzing and testing the security of software and hardware of secure devices for over a decade. His interest is typically sparked by technologies where the hardware of the device is fundamentally part of the equation.

  • Fault Injection Characterization
Zach Hanley

Zach Hanley has been hooked on exploit development and offensive security since introduced to the world of hacking as an On-Net Operator for DoD and IC organizations. He’s since developed implants and exploits for both the government and commercial sector and competed in Pwn2Own. He currently is a vulnerability researcher and attack engineer for Horizon3.ai.

  • Rust Won't Save Us: Finding and Exploiting 0-days in Security Appliances