Speakers
Adrian Furtuna

Adrian Furtuna is a Security Consultant at KPMG Romania, where he leads the penetration testing team in verifying the security of web applications, mobile applications and network infrastructures.

He has a PhD in Computer Science obtained at the Military Technical Academy of Bucharest, Romania. During his PhD program he has extensively studied various attack techniques utilized in Red Teaming engagements and he has designed a set of scenarios for cyber defense exercises.

Adrian is also the founder of http://pentest-tools.com, a place where penetration testers can find a collection of ethical hacking tools that can be used online in their engagements.

Practical exploitation of rounding vulnerabilities in internet banking applications

Glenn Wilkinson

Glenn is a Zimbabwean currently working for SensePost's UK office as a security analyst. His research has been presented at several security conferences, including BlackHat Vegas and 44Con London. As a Rhodes Scholar, he holds two masters degrees from the University of Oxford.

The Machines that Betrayed their Masters

Omair

Omair is a Security Researcher whose core research resolves around fuzzing software to find exploitable vulnerabilities, mostly client side softwares. He has been crashing applications for a couple of years and has uncovered critical vulnerabilities. He spends most of his time reading RFC's and understanding the functionality of a software through reverse engineering. And when he doesn't think about fuzzing, the fuzzing still continues.

Fuzzing Practical Applications

Rafal Wojtczuk

Rafal Wojtczuk has over 15 years of experience with computer security. Specializing primarily in kernel and virtualization security, over the years he has disclosed many security vulnerabilities in popular operating system kernels and virtualization software. He is also well known for his articles on advanced exploitation techniques, including novel methods for exploiting buffer overflows in partially randomized address space environments. Recently he was researching advanced Intel security-related technologies, particularly TXT and VTd. He is also the author of libnids, a low-level packet reassembly library. He holds a Master's Degree in Computer Science from University of Warsaw.

Endpoint security via application sandboxing and virtualization — past, present, future

Mario Heiderich

Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) “security researcher” is from Berlin, likes everything between lesser- and greater-than, leads a small yet exquisite pen-test company and pesters peaceful attendees on various capitalist conferences with his powerpoint-slides. Now it's time for him to go east and face the hard realities of life. And see Mother Russia for the very first time!

JSMVCOMFG — To sternly look at JavaScript MVC and Templating Frameworks

Roman Korkikyan

I am currently working for Kudelski Security where I am happily occupied with semiconductor vulnerability analysis, i.e. smart-cards and set-top-boxes security treats. At the same time I am a PhD student in Sorbonne. Previously I worked for Altis Semiconductor, STMicroelectronics, and Transas. I published several articles in russian and international journals. Mathematical background was obtained in Saint Petersburg State polytechnic university while security track was got in French university called Eurecom.

Timing analysis

Gal Diskin

Gal Diskin is the Chief Research Officer at Cyvera LTD (www.cyvera.com). Cyvera provides game-changing security solutions to protect organizations from targeted attacks. The company philosophy is centered around obstruction methodology in difference from the old-school detection approach common today.

Prior to working for Cyvera Gal was the Security Evaluation Architect of the Software and Services Group at Intel®. As part of his work for Intel Gal has worked on the security of virtualization features, trusted execution environments (TEEs), BIOS as well as other software, hardware and firmware features. Prior to that Gal has worked as part of the development team for the PIN binary instrumentation engine.

Before Intel Gal has done various jobs in information security, programming and IT including consulting, running his own startup company (Diskin Security Technologies), working for the military and various other gigs.

Gal is a frequent speaker in conferences and has presented his research in BlackHat, Defcon, Hack In The Box and various other conferences.

Virtually Impossible: The Reality Of Virtualization Security

Peter Hlavaty

Peter Hlavaty has recently reached his fourth year at ESET where he works as a software engineer. He is currently working on the core components of the antivirus — improving the malware detection and removal algorithms and also implementing various exploit detection and prevention methods. His research interests include vulnerability analysis, hacking deep into the Windows kernel, and looks for new exploit-mitigation techniques.

DbiFuzz framework

Mateusz Jurczyk

Mateusz is a big fan of memory corruption. His main areas of interest are client software security, vulnerability exploitation and mitigation techniques, and delving into the darkest corners of low-level kernel internals with a very strong emphasis on Microsoft Windows. He is currently working as an Information Security Engineer at Google.

Windows Kernel Trap Handler and NTVDM Vulnerabilities — Case Study

Meder Kydyraliev

Meder has been working in the area of application security for nearly a decade. He's poked at, broken, and helped fix a lot of code businesses and parts of the Internet depends on (Struts2, JBoss Seam, Google Web Toolkit, and Ruby on Rails, to name a few). Some of the things that excite him include: karaoke, server-side security, kumys and making software security easier.

Mining Mach Services within OS X Sandbox

Gregor Kopf

Gregor Kopf joined the Recurity Labs team early 2008. Prior to Recurity Labs, Gregor worked as a freelancer for a number of large customers. Gregor is experienced in source code audits, black box analysis and penetration testing. Furthermore, Gregor also performs software/system design work at Recurity Labs. Besides customer engagements, Gregor works on internal research projects, where he applies his taste for cryptography.

State of Crypto Affairs

Krzysztof Kotowicz

Web security researcher specialized in discovery and exploitation of HTML5 vulnerabilities. Author of multiple recognized HTML5/UI redressing attack vectors and several penetration testing tools for detecting and exploiting client-side vulnerabilities. Speaker at international IT security conferences & various security community meetings:
  • SecurityByte 2011, India
  • KrakYourNet 2012, Poland
  • Confidence 2012, Poland
  • Hack in Paris 2012, France
  • Black Hat 2012, USA
  • BruCON 2012, Belgium
  • Security B-Sides Warsaw 2012, Poland
  • Secure 2012, Poland
  • Hack in Paris 2013, France
  • OWASP Appsec Europe Research 2013, Germany
  • OWASP InfoSec India 2013, India

Hacking HTML5

Inbar Raz

Inbar has been teaching and lecturing about Internet Security and Reverse Engineering for nearly as long as he has been doing that himself. He started programming at the age of 9, on his Dragon 64. For his Bar-Mitzva he got a PC, and promptly started Reverse Engineering at the age of 14. Through high-school he was a key figure in the Israeli BBS scene, but all that didn’t prevent him from ending up in the Tank Corps. Eventually he found his way to one of the most technologically advanced units and stayed in the army until the age of 36, getting his B.A. in Computer Sciences from the Academic College of Tel-Aviv in the process. Since late 2011, Inbar has been running the Malware Research at Check Point.

Physical (In)Security – it’s not –ALL– about Cyber

Sahand

Sahand has been working as a senior software engineer in aerospace industry, designing software for a range of sub-systems including satellite communications. He holds a MSc degree in Robotics and has over 13 years of experience in embedded systems and kernel development. His research interests include security implementations in the embedded systems world and digital communication protocols.

HONEY, I’M HOME!! — HACKING Z-WAVE HOME AUTOMATION SYSTEMS

Tomas Hlavacek

Tomas Hlavacek works for CZ.NIC Labs, research and development branch of CZ.NIC — Czech domain registry. His research interests include DNS, routing policies, RPSL, BGP routing dynamics and RPKI. He graduated from Charles University in Prague, Czech Republic in 2011.

IP fragmentation attack

Georgy Nosenko

George is an infosec researcher, he works for ERPscan research center.

When he was secondary school pupil, he became interested of information security and low-level programming.

In 2008, he graduated with honors the Petersburg State Transport University, he is a specialist in the information security.

For several years, George has been involved in the development of protection software of against unauthorized access.

An introduction to the use SMT solvers for software security

Viktor Alyushin

A postgraduate student at National Research Nuclear University “MEPhI”. Has two specialist diplomas: in applied mathematics and information security. Currently engaged in developing software for reducing noise and interference in voice messages. Participates in collegiate programming contests since 2003. Interested in information security since 2006. Participates in CTF and hackquests since 2011 (both as an individual and as part of the team ReallyNonamesFor). Took up OS Android a year ago, been struck by it ever since.

Advanced exploitation of Android Master Key Vulnerability (bug 8219321)

Dmitry 'D1g1' Evdokimov

Dmitry Evdokimov works for ERPScan research center in Russia. He focuses on SAP security, particularly on Kernel and Mobile security (iOS, Android, WP). He has official acknowledgements from SAP and Oracle for the vulnerabilities he found. His interests cover reverse engineering, software verification/program analysis (SMT, DBI, IL), vulnerability research and development of exploits, software for static and dynamic code analysis written in Python (author of “Python Arsenal for RE”). “Security soft” and “X-Tools” section editor in Russian hacker magazine “XAKEP”. One of the Defcon Russia (DCG #7812) organizers.

BlackBox analysis of iOS apps

Alexander Bolshev

An infosec auditor at ERPScan, a Ph.D. “Another man in a dubious-color hat”. Hates Web hacking. Primarily engaged in the research of distributed systems security; also does .Net reverse engineering, hardware hacking and a little of everything else.

HART (in)security


WITH BIGDATA COMES BIG RESPONSIBILITY: PRACTICAL EXPLOITING OF MDX INJECTIONS

Alexander Malinovsky

A test engineer at Motorola Solutions. A self-educated electronics engineer. A big fan of AVR devices. “Yet another random person at conference”.

HART (in)security

Vadim Bardakov

An infosec researcher in ERPScan. Fond of Erlang.

Exploitation of AVR & MSP microchips

Aleksandr Matrosov

Aleksandr Matrosov has more than ten years of experience with malware analysis, reverse engineering and advanced exploitation techniques. Currently working at ESET as Senior Malware Researcher and Security Intelligence Team Lead since joining the company in October 2009 as a virus researcher, and working remotely from Russia. He has worked as a security researcher since 2003 for major Russian companies. He is also a Lecturer at the Cryptology and Discrete Mathematics department of the National Research Nuclear University in Moscow, and co-author of the research papers “Stuxnet Under the Microscope” and “The Evolution of TDL: Conquering x64”, and is frequently invited to speak at major security conferences (including Ekoparty, REcon and Virus Bulletin). Nowadays he specializes in the comprehensive analysis of complex threats, modern vectors of exploitation, RE automation and research of cyber crime activity.
Eugene Rodionov

Eugene Rodionov graduated with honors from the Information Security faculty of the Moscow Engineer-Physics Institute (State University) in 2009 and successfully defended Ph.D. thesis in 2012. He has been working in the past five years for several companies, performing software development, IT security audit and malware analysis. He currently works at ESET, one of the leading companies in the antivirus industry, where he performs in-depth analysis of complex threats. His interests include kernel-mode programming, anti-rootkit technologies, reverse engineering and cryptology. He is co-author of the research papers “Stuxnet Under the Microscope” and “TDL3: The Rootkit of All Evil?”. Eugene Rodionov also holds the position of Lecturer at the National Nuclear Research University MEPHI in Russia.
  Advanced Threats Reverse Engineering


HexRaysCodeXplorer: make object-oriented RE easier

Ivan Novikov aka “Vladimir d0znpp Vorontsov”

Ivan Novikov also known as “Vladimir d0znpp Vorontsov” is the founder and CEO of ONsec company. He has been engaged in research in the field of web applications security since 2004. He is security expert as well as the author of numerous researches in the field of web application security. He was awarded by Yandex for winning the "vulnerability search month" contest, by Google for Chrome vulnerabilities, by Trustwave for ModSecurity SQLi Challenge, by 1C Bitrix for competition on proactive defense bypass. He is currently actively engaged in the development of self-learning web application firewall system.

Filesystem timing attacks practice

Anton Dorfman

Anton Dorfman is a researcher, reverser and a fan of Assembler language (especially size-optimized programs like shellcodes). Does not like humdrum, so has a soft spot for all kinds of RE automation. He graduated from the Samara State Technical University with honors in 1999. He has lectured in his alma mater since 2001, being one of few Russian lecturers on reverse engineering who authored the course himself. His students can end up writing an antivirus for a specified DOS virus for their term paper, not to mention the laboratory work!

Anton Dorfman is actively engaged in scientific and practical research of computer security, having published more than 50 papers on the topic. In 2007, he successfully defended his Ph.D. thesis on analyzing and modeling malware behavior, based on an original mathematical instrument.

He has been an organizer and playing coach of student CTF teams since 2009. Also, Anton won the third place in the Best Reverser contest at PHDays 2012 and gave the audience a full load (and we mean payload) of his 4 hour workshop called “Shellcode mastering” at PHDays 2013.

Reversing data formats: what data can reveal

Vlad Ovtchinikov

Vlad is currently employed as a Lead Security Analyst for SensePost. Amongst performing large-scale social engineering exercises against FTSE 100 clients, he is also a trainer for SensePost’s Hacking by Numbers offensive security courses, having just returned from delivering the advanced penetration testing course at BlackHat in Las Vegas, USA. His role at SensePost is to ensure that, as a company, they are kept up to date with malware analysis and indeed techniques used by those to bypass defensive solutions.

When Documents Bite

Alexey Troshichev

Author of the application analysis service hackapp.com. Researcher of applications and systems. Infrastructure security engineer in Yandex. Formerly, engineer in Central Research and Development Institute of Chemistry and Mechanics, infosec auditor in ERPScan. Looking for new vectors.

Strike to the infrastructure: a story about analyzing thousands mobile apps

Alexey Tyurin

I am a pentester, and I do this great job for ERPScan. I have hacked a lot of various systems, especially remote banking systems. Probably touched all major Russian developments.

In many of the systems that I analyzed, I have found 0-day vulnerabilities. This happened, for instance, to SAP, VMware, and Citrix. But in Cisco, I have only re-opened some old bugs (alas). On top of that, I have participated in closing a major XML vector in SAP.

In all, I love hacking large systems and Windows style networks. I like various logical vulnerabilities and bugs that are features.

I like coding, and that is why I am also one of the leading developers of ERPScan Pentesting tool.

Speaking of major achievements, I am personally acquainted with Alexey Sintsov himself!

I try to make the world a better place, and that is why I am happy to share my knowledge and experience in the ][akep magazine. I have been the editor of the EasyHack column for almost three years now. I am also one of the organizers of Defcon Russia.

My interests include interesting things.

Accounting hacking — arch bugs in MS Dynamics GP


HR Hacking — bugs in PeopleSoft

Gleb Cherbov

Graduated from the Department of Information Security, Faculty of Engineering Cybernetics, Saint-Petersburg State Technical University. Whitehat, researcher, pentester, and analyst in ERPScan. “Another dude” © Anton 'toxo4ka' Karpov.

Participates and parties in the same gang with Alexey Sintsov, Alexey Tyurin, Alexander 'sh2kerr' Polyakov, Dmitry 'chipik' Chastukhin, Gleb Cherbov, Alexander Minozhenko, and other tech savvies of ERPScan.

DBO Hacking — arch bugs in BSS

Dmitry Chastukhin

Another security researcher. Sports a surname that nobody can spell correctly. Like everyone else, has a thing for infosec. Like everyone else, studied somewhere. Like everyone else, worked somewhere. Like everyone else, found vulnerabilities in certain well-known applications and resources.

Among the multiple achievements of Dmitry, his astounding capability of sneezing with open eyes must be noted, as well as a game of billiards that he has once won from Alexey Sintsov.

Thinks of his work for ERPScan as a watershed moment. Been to conferences. Presented papers. Got acknowledgements from vendors. Was listening to Never Le Nkemise 2 by Die Antwoord while writing the bio. Single)

Business Intelligence hacking – Breaking ICCube


WITH BIGDATA COMES BIG RESPONSIBILITY: PRACTICAL EXPLOITING OF MDX INJECTIONS

Alexander Polyakov

Famous for his moustache and SAP security evangelism. Conferenceholic.

EAS-SEC: business application security deployment guideline

Alexander Minozhenko



EAS-SEC: business application security development guideline

Evgeny Neyolov



Dev system hacking — arch bugs in SAP SDM

Oleg Kupreev

Hardware infection is not a myth anymore. For instance, Rakshasa, which was shown at Defcon, is capable of infecting BIOS and PCI ROM (LAN, CDROM). The author of this paper decided to continue research towards infecting the software of the devices and checked the practical possibility to infect a modern 3G modem.

The 3G modems of the Big Three mobile network operators were used: MTS, BeeLine, Megafon. Software for cross-platform infection (Windows, Linux, MacOS X) of virtual CD-ROM images has been developed.

Talk show

Vladimir Kropotov

In 2003, graduated from Ryazan State Radio engineering Academy with honors, faculty “Information security organization and technology”. From 2004 to 2008 — postgraduate study in MSTU of N.E. Bauman, where he was engaged in research work in the field of information security. He is a regular speaker at infosec conferences. At present, he is an employee of RN-inform, engaged in infosec threat monitoring and response.
Vitaly Chetvertakov

Graduated from Ryazan State Radio engineering Academy, faculty “Computer Security”. In 2010–2011, worked at the information security chair of Ryazan State Radio engineering Academy, where he was engaged in deployment and support of information security systems. Since 2012, he is an employee of information security department in TBinform.
  Practical application of math methods and image recognition in attack detection. With novel case studies :)

Denis Makrushin

Currently Denis is the expert of Kaspersky Lab. He specialized in threats analysis.

Denis gained diverse experience while working in the information security area. He was engaged in penetration testing and security audit of corporate web-apps, stress testing information and banking systems for DDoS-attacks resistance, and he took part in the organization and produce of the international forum on practical security issue. He had time to look at the industry from the defending side perspective and provided information protection of energy facilities (integration and administration information security systems).

Denis graduated from National Research Nuclear University “MEPhI”, Information Security Faculty. He continues research in the DDoS protection in postgraduate of MEPhI.

Web under pressure: DDoS as a service

Dmitry Boomov

A student and a pen-tester.

Hosting dashboard web application logic vulnerabilities

Andrey Danaw

I live in the Far East, and I have been interested in information security since school. Been playing at CTFs since 2011 as a member of the ReallyNoNamesFor team. Working as an expert in ONsec now.

Session management errors in cloud solutions and in classic hosting systems

Anton Cherepanov

Works as a malware analyst in ESET. His daily duties include analyzing different complex malware threats. Field of interest: information security, malicious code analysis and reverse engineering.

Hesperbot: analysis of a new banking trojan

Alexander Timorin

A lead specialist in Positive Technologies.

His main field of work is the security analysis and penetration testing of information systems, and the security of ICS and industrial protocols. He is a member of the SCADAStrangeLove ( http://scadastrangelove.org ) team and a speaker at PHDays III.

He was a student at the faculty of mechanics and mathematics of Ural State University when he started programming Oracle/Oracle Forms for a living. After graduating, he dedicated many years to programming, system administration, and the practical aspects of information security. In the recent years, he has been focused on pen-testing and deep comprehensive analysis of SCADA/ICS protocols, both open and proprietary.
Alexander Tlyapov

An infosecurity specialist in Positive Technologies. A reverse engineer who is interested in large and complex systems including industrial control. A member of the SCADAStrangeLove ( http://scadastrangelove.org ) team.
  SCADA deep inside: protocols, security mechanisms, software architecture

Alexander Lyamin

Alexander Lyamin is the CEO of HLL.Qrator, Moscow. Participated in launching several Russian Internet service providers (Comstar, Teleport TP, Cityline), worked on the first multi-service ATM network in Russia in Moscow State University. Was the project manager in Astrum Online: worked with web application platform architecture, advised external developer teams. Currently, he is the CEO of the Qrator company and Highload Lab. Took part in several research projects: Mirnet, Net Surveyor, IPv6 tests, RFBR IP QoS research grants, ReiserFS development (DARPA grant).

Anatomy and metrology of DoS/DDoS

Sergey Belove

An infosec auditor at ERPScan, I write articles for Habrahabr and ][akep, play CTF, participate in BugBounty for Google and Yandex. Recently, opened my own security portal: bugscollector.com

NGINX Warhead

Anton Dedov

Software developer for more than ten years. Work in Parallels, Inc. (former SWSoft) since 2005. Started playing security engineering role less than two years ago by pure accident. Author of open source project.

Company & position: Parallels, Inc. Security Architect

Testing of password policy

Organizers:
Official support:
With participation of:
Gold sponsor:
Silvers sponsor:
Official beverage:
General Media Partner:
Gold Media Partner:
Media Partners:
Information Partners: