The Important People

Joe Grand [@joegrand]

Joe Grand is an electrical engineer and hardware hacker. He runs Grand Idea Studio (www.grandideastudio.com) and specializes in the design of consumer and hobbyist embedded systems. Back in the day, when he was known as Kingpin, he was a member of the infamous hacker group L0pht Heavy Industries.


Aloria [@aloria]

Aloria leads the application security team at a financial organization. She has had a love/hate relationship with Microsoft programming languages since she wrote her first QBasic app at the tender age of 11. She is afraid of clowns and hasn't quite been the same since the accident.


Collin Mulliner [@collinrm]

Collin Mulliner is a researcher in the Systems Security Lab at Northeastern University. Collin's main interest is the security and privacy of mobile and embedded devices with an emphasis on mobile and smart phones. Since 1997 Collin has developed software and did security work for Palm OS, J2ME, Linux, Symbian OS, Windows Mobile, Android, and the iPhone. In 2006 he p0wnd Windows Mobile using MMS and broke iOS, Android, and Windows Mobile with SMS in 2009. Collin's specifically interested in the areas of vulnerability analysis and offensive security.


Michael Coppola [@mncoppola]

Michael Coppola is a vulnerability researcher working at a defense contractor, as well as an undergraduate student at Northeastern University. His main interests include Linux kernel exploitation and rootkit development, embedded systems, and burning things with a soldering iron.


Aaron Portnoy [@aaronportnoy]

Aaron is just your average degenerate infosec poser who still hasn't quite figured out how to read C.


Travis Goodspeed [@travisgoodspeed ]

Travis Goodspeed (@travisgoodspeed) is a neighborly reverse engineer from Southern Appalachia. He was responsible for finding PRNG vulnerabilities in all early implementations of the Zigbee Smart Energy Profile, as well as code and key extraction vulnerabilities for numerous microcontrollers. At Summercon in 2012, he presented the Packet-in-Packet attack that later won a Pwnie Award for Most Innovative Research.


Dionysus Blazakis [@justdionysus]

Dionysus Blazakis is a programmer. He once wrote an exploit. He sometimes skips sleep to curse at his computer for 12 hours or so. Mostly, he fails to find anything interesting in the dark corners of software systems. He often tries new programming languages. He lives in Baltimore with his wife and two kids.


pa_kt [@pa_kt]

pa_kt is a Senior Research Engineer on Sourcefire's Vulnerability Research team. 10+ years of experience in reverse engineering in various roles (like malware analyst or vulnerability researcher) and MSc in computer science help him to fullfil his current responsibilities at Sourcefire, which include (but are not limited to) automating various stages of vulnerability discovery and triage.


Richard Johnson [@richinseattle]

Richard Johnson is a computer security specialist who spends his time playing in the realm of software vulnerability analysis. Richard currently fills the role of Principal Research Engineer on Sourcefire's Vulnerability Research Team, offering over 10 years of expertise in the software security industry. Current responsibilities include research on exploitation technologies and automation of the vulnerability triage and discovery process. Past areas of research include memory management hardening, compiler mitigations, disassembler and debugger design, and software visualization. Richard has released public code for binary integrity monitoring, program debugging, and reverse engineering and has presented at dozens of conferences worldwide since 2004. Richard is also a co- founder of the Uninformed Journal and a long time resident of the Hick.org ranch.


redpantz [@nudehaberdasher]

Redpantz is some guy who can barely get his act together enough to get this conference semi-functional. Email him if you need anything.


Mark Trumpbour [@mtrumpbour]

Mark Trumpbour began his interest in computer security growing up in a hacker commune on the Jersey Shore in the early Eighties. His first real computer was an Atari 800 that he and his many brothers used to explore the frontiers of cyberspace, not that they called it cyberspace back then. Ever the digital pioneer, Mark was suspended from his high school for connecting a computer lab to the Internet - at a time when the World Wide Web did not yet exist and FTP was considered a wonder of the modern world. (To this day, he ignores requests from the high school alumni office.) Mark's association with Summercon began in 1998 as an attempt to rekindle the creative spirit of hacking, and to demonstrate that hacking can be a socially responsible activity. Mark works in Brooklyn for Graphient, a software development startup that builds tools to generate dynamic visual timelines. He lives in Brooklyn with his wife and an extremely lazy greyhound.