Speakers

Nils Albartus Ph.D. student @ Max Planck Institute for Security and Privacy

Nils Albartus is a PhD student in the Embedded Security group at the Max Planck Institute for Security and Privacy, where he is adviced by Prof. Christof Paar. He received both his B.Sc. and M.Sc. degree in IT Security from Ruhr University Bochum. His research interests include building of and defending against hardware Trojans, reverse engineering of hardware and the creation of strong hardware obfuscation methods against reverse engineering.

Talk: The Painful Life of a Hardware Reverse Engineer

Eran Ayalon Security Researcher @ Cybereason Security Research Team

Eran Ayalon, Security Researcher at the Cybereason Security Research Team specializes in detecting different attack frameworks on multiple OS. Eran started his career six years ago as a security researcher in the Israeli Air Force, where he specialized in malware analysis, forensics, and incident response. Eran's previous employment was in the banking sector, where he led the threat hunting and incident response in corporate environments.

Talk: Container Escape: All you need is cap (capabilities)

Pietro Borrello Ph.D. student @ Sapienza University of Rome

Pietro Borrello is a PhD Student at the Sapienza University of Rome, working on System Security.
His focus is applying Fuzzing and Program Analysis techniques to find and mitigate architectural and microarchitectural vulnerabilities.
He is a passionate CTF player focusing on exploitation and reverse-engineering with both TRX and mhackeroni teams, which he co-founded. BlackHat speaker and 2x PwnieAward winner, he is also the co-founder and current lead of the DEFCON Group in Rome.

Talk: ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture

Matt Bromiley Lead Solutions Engineer @ LimaCharlie

Matt Bromiley is the lead solutions engineer at LimaCharlie, where he helps organizations design and build world-class security infrastructure. He also serves as a subject-matter expert for the SANS Securing The Human and technical writer for the SANS Analyst Programs. Matt brings his passion for digital forensics to the classroom as a SANS instructor for FOR508: Digital Forensics, Incident Response, and Threat Hunting, and FOR572: Advanced Network Forensics, where he focuses on providing students with implementable tools and concepts. He has helped organizations of all types and sizes, from multinational conglomerates to small, regional companies. Matt’s wide-ranging career gives him a broad, technical perspective on incident response, digital forensics, cyber risk management, and enterprise information security.

Talk: Striking Down Cobalt Strike

Alessio Leoncini Technical Leader @ Spike Reply

Alessio obtained a PhD in Machine learning, Data mining and Cybersecurity in 2013 from the University of Genoa, after a MSC in Electronic Engineering from the same faculty. He is now the Technical Leader of the penetration testing team at Spike Reply, the cybersecurity company of Reply, focusing on hardware analysis of embedded systems and automotive security. His main technical interests include Cryptography, Computer & Hardware Security, and performance-oriented coding.

Talk: Exploiting embedded devices in 2022

Omri Misgav Fortinet

Omri has over a decade of experience in cyber-security. He serves as the CTO of a security research group at Fortinet focused on OS internals, malware and vulnerabilities and spearheads development of new offensive and defensive techniques. Prior to Fortinet, Omri was the security research team leader at enSilo. Before that, He led the R&D of unique network and endpoint security products for large-scale enterprise environments and was part of an incident response team, conducting investigations and hunting for nation-state threat actors.

Talk: DSE, KDP and Everything In Between: New Techniques to Run Unsigned Rootkits

Roberto Paleari Senior manager @ Spike Reply

Roberto Paleari is a senior manager at Spike Reply, where he leads the offensive security unit. His team includes skilled cybersecurity professionals, who support customers through activities ranging from traditional penetration testing services to niche security assessments (embedded firmware & hardware analysis). He has an extensive track record in analyzing complex systems and reverse engineering low-level software, and loves finding vulnerabilities in "secure" systems to dismantle the myth of unbreakable things. Roberto got a PhD in Computer Science from the University of Milan, focusing on system security and malware analysis.

Talk: Exploiting embedded devices in 2022

Bobby Rauch

Bobby is a Boston, Massachusetts, USA - based security researcher and penetration tester who has found high severity vulnerabilities in Fortune 500 companies including Microsoft, Apple, and Oracle. Bobby has had his research work published by Brian Krebs, Bleeping Computer, and has spoken at cybersecurity events in Boston. Bobby holds a Bachelor's Degree in Computer Science from MIT, and the OSCP and OSWE certifications.

Talk: “GIFShell” — Covert Attack Chain and C2 Utilizing Microsoft Teams GIFs

Ilan Sokol Security Researcher @ Cybereason Security Research Team

Ilan Sokol, Security Researcher at the Cybereason Security Research Team specializes in Linux research. Prior to Cybereason, his work focused on research in the offensive security field. Ilan has a deep understanding of the malicious operations prevalent in the current threat landscape. Ilan loves digital forensics and incident response, but is also interested in offensive aspects such as vulnerability research.

Talk: Container Escape: All you need is cap (capabilities)

Julian Speith Ph.D. student @ Max Planck Institute for Security and Privacy

Julian Speith is a PhD student in the Embedded Security group at the Max Planck Institute for Security and Privacy, where he is adviced by Prof. Christof Paar. His research involves various aspects of hardware security and, in particular, includes developing new approaches for hardware reverse engineering as well as hardware Trojan deployment and detection. He did both his B.Sc. and M.Sc. in IT security at Ruhr University Bochum, one of Europes most prestigious research hubs for cyber security.

Talk: The Painful Life of a Hardware Reverse Engineer

Paolo Stagno Vulnerability Researcher and Exploit Developer @ Exodus Intelligence

Paolo Stagno (aka VoidSec) has worked as a Penetration Tester for a wide range of clients across top tier international banks, major tech companies and Fortune 1000 industries. He was responsible for discovering and exploiting vulnerabilities in applications, network infrastructure components, protocols, and technologies. He is now a Vulnerability Researcher and Exploit Developer at Exodus Intelligence, focused on Windows offensive application security (kernel and user-land). He enjoys understanding the digital world we live in, disassembling, reverse engineering and exploiting complex products and code. In his own research, he discovered various vulnerabilities in software of multiple vendors and tech giants like eBay, Facebook, Google, HP, McAfee, Microsoft, Oracle, TIM and many others.
Since the beginning of his career, he has enjoyed sharing his expertise with the security community with his website and blog. He is also an active speaker in various security conferences around the globe like: HITB, Typhooncon, Hacktivity, SEC-T, Droidcon, HackInBo, TOHack, Meethack and m0leCon.

Talk: The Talented Mr. RiPPLey