The Important People

Natalie Silvanovich

Natalie Silvanovich is a security researcher on Google Project Zero. She has spent the last seven years working in mobile security, both finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets, and has spoken at several conferences on the subject of Tamagotchi hacking. She is actively involved in hackerspaces and is a founding member of Kwartzlab Makerspace in Kitchener, Ontario, Canada.

@natashenka

Nick Sullivan

Nick Sullivan is a leading cryptography and security technologist. He currently works on cryptographic products and strategy for CloudFlare. Previously, he held the prestigious title of “Mathemagician” at Apple, where he encrypted books, songs, movies and other varieties of mass media.

@grittygrease

Karl Koscher

Karl is a postdoctoral researcher at the University of California San Diego where he specializes in embedded systems security. In 2011, he and his collaborators were the first to demonstrate a complete remote compromise of a car over cellular, Bluetooth, and other channels. In addition to breaking systems, he also works on creating tools and technologies to enable developers to automatically find (and fix) potential security vulnerabilities in their embedded systems.

@supersat

Travis Goodspeed

Travis Goodspeed is a Southern Appalachian expat, trapped for the time being in the Godless North. His past projects include the Packet-in-Packet method of injecting raw radio frames from Layer 7, the Southern Appalachian Space Agency, and methods for steganography in PSK31, RTTY, and other shortwave radio protocols. You can reach him during the conference as KK4VCZ at 441MHz, TG99.

@travisgoodspeed

David Wu

David Wu is a recent graduate of Dartmouth College. There he worked with Sergey Bratus on projects involving VPN fingerprinting and Linux instrumentation. He also developed particle physics simulations for Brookhaven National Laboratory and automated website analysis tools for Ionic Security. In his free time he enjoys learning that everyone but him has a twitter account.

@davidwuuuuuuuu

Mudge

Mudge enjoys contributing to the security researcher community. In addition to pioneering buffer overflow work, the earlier security work he released contained some of the first examples of flaws in: code injection, race conditions, side-channel attacks, exploitation of embedded systems, and cryptanalysis of commercial systems. He was the original author of the password cracking software L0phtCrack.

@dotMudge

Tyler Bohan

Tyler Bohan is a Senior Research Engineer with the Cisco Talos Vulndev Team specializing in vulnerability research and exploitation. Tyler is the creator of MacDBG, a general purpose debugging framework for OSX. Previous employers include BAE Systems and Trail of Bits.

@1blankwall1

Matt Green

Dr. Matthew Green, a respected cryptographer and security technologist, has over fifteen years of industry experience in computer security. Dr. Green is an Assistant Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced storage systems, and anonymous cryptocurrencies. Dr. Green led the team that developed the first anonymous cryptocurrencies, Zerocoin and Zerocash. His research team has exposed flaws in more than one third of SSL/TLS encrypted web sites as well as vulnerabilities in encryption technologies, including RSA BSafe, Exxon/Mobil Speedpass, EZpass, and automotive security systems.

@matthew_d_green

More Soon!