The Important People

Collin Mulliner [@collinrm]

Collin Mulliner is a systems security researcher with focus on software components close to the operating system and kernel. In the past he spent most of his time working on mobile and embedded systems with an emphasis on mobile and smart phones. Collin is interested in vulnerability analysis and offensive security as he believes that in order to understand defense you first have to understand offense. Collin received a Ph.D. from the Technische Universitaet Berlin in 2011, and a M.S. and B.S. in computer science from UC Santa Barbara and FH-Darmstadt. Lately Collin switched his focus to the defensive side to work on mitigations and countermeasures. Collin is also co-author of The Android Hacker's Handbook.

Corey Kallenberg

Corey Kallenberg is a co-founder of LegbaCore, a consultancy focused on evaluating and improving host security at the lowest levels. His specialty areas are trusted computing, vulnerability research and low level development. In particular, Corey has spent several years using his vulnerability research expertise to evaluate limitations in current trusted computing implementations. In addition, he has used his development experience to create and improve upon trusted computing applications. Among these are a timing based attestation agent designed to improve firmware integrity reporting, and an open source Trusted Platform Module driver for Windows. Corey is also an experienced trainer, having created and delivered several technical courses. He is an internationally recognized speaker who has presented at BlackHat USA, DEF CON, CanSecWest, Hack in the Box, NoSuchCon, SyScan, EkoParty and Ruxcon.

Dino Dai Zovi [@dinodaizovi]

Dino Dai Zovi has been working in information security for over a decade with experience in red teaming, penetration testing, software security, information security management, and cybersecurity R&D. Dino is also a regular speaker at information security conferences having presented his independent research on memory corruption exploitation techniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits over the last 10 years at conferences around the world including DEFCON, BlackHat, and CanSecWest. He is a co-author of the books "The iOS Hacker's Handbook" (Wiley, 2012), "The Mac Hacker’s Handbook" (Wiley, 2009), and "The Art of Software Security Testing" (Addison-Wesley, 2006). In 2008, eWEEK named him one of the 15 Most Influential People in Security. He is perhaps best known in the information security and Mac communities for winning the first Pwn2Own contest at CanSecWest 2007.

Charlie Miller [@0xcharlie]

Charlie Miller is a security engineer at Twitter. Back when he still had time to research, he was the first with a public remote exploit for both the iPhone and the G1 Android phone. He is a four-time winner of the CanSecWest Pwn2Own competition. He has authored three information security books and holds a PhD from the University of Notre Dame. He has hacked browsers, phones, cars, and batteries. Charlie spends his free time trying to get back together with Apple, but sadly they still list their relationship status as, "It's complicated."

Stephen A. Ridley [@s7ephen]

Stephen A. Ridley is a security researcher at Xipiter. He has more than 10 years of experience in software development, software security, and reverse engineering. Prior to Xipiter, Ridley served as the Chief Information Security O?cer of a financial services ?rm and prior to that was a Senior Researcher at Matasano. He also was Senior Security Architect at McAfee, and a founding member of the Security and Mission Assurance (SMA) group at a major U.S. defense contractor where he did vulnerability research and reverse engineering in support of the U.S. Intelligence Community. He has spoken about reverse engineering and software security at Black Hat, ReCon, CanSecWest, EuSecWest, Syscan, and other prominent information security conferences. Ridley is a co-author of "The Android Hacker's Handbook" published by Wiley & Sons.

Kelly Lum [@aloria]

Kelly has "officially" worked in Information Security since 2003, and is currently a Security Engineer at Tumblr where she brings her decadeâs worth of application security experience in the financial and government sectors to the microblogging world. She regularly speaks about reverse engineering at various conferences, including BlackHat, SummerCon, and Countermeasure. Additionally, she teaches as an adjunct professor of Application Security at NYU.

Zach Lanier [@quine]

Zach Lanier is a Senior Research Scientist with Accuvant Labs, specializing in various bits of network, application, mobile, and embedded security. Prior to joining Accuvant, Zach most recently served as a Senior Security Researcher with Duo Security. He has spoken at a variety of security conferences, such as Black Hat, DEFCON, CanSecWest, INFILTRATE, ShmooCon, and SecTor, and is a co-author of the "Android Hackers' Handbook" (Wiley, 2014).

Patroklos Argyroudis [@_argp]

Patroklos Argyroudis is a computer security researcher at CENSUS S.A., a company that builds on strong research foundations to offer specialized IT security services to customers worldwide. His main expertise is vulnerability research, exploit development, reverse engineering, and source code auditing. Patroklos has presented his research at several international security conferences (Black Hat USA and EU, Infiltrate, PH-Neutral, ZeroNights, etc) on topics such as kernel and heap exploitation, kernel protection technologies, and network security protocols. He holds a PhD from Trinity College Dublin, where he has also worked as a postdoctoral researcher on applied cryptography.

Billy Rios [@XSSniper]

Billy was once a successful Madaganese Olive Smuggler living the high life. After the great olive market crash of 2000, Billy made the move to cyber security. Since making the move to cyber security, Billy has led several prestigious security teams including security teams at Microsoft and Google. Billy was a Lead at Google where he led the front line response for externally reported security issues and incidents. Prior to Google, Billy was the Security Program Manager at Internet Explorer (Microsoft). His interests include emerging threats related to Industrial Control Systems (ICS), Critical Infrastructure (CI), and medical devices.

Julien Vanegue [@jvanegue]

Julien Vanegue is a computer security researcher from New York who spends a lot of time reading Phrack articles when he is not writing them. Julien previously presented at Summercon in 2012 and 2014 on Modern static analysis using SMT solvers and the Automated Exploitation Grand Challenge.