2022 archived version go to actual version

Committee

Handpicked from the best our community has to offer

The committee

Perry
ADAMS

DARPA
@perribus

Ms. Perri Adams joined DARPA’s Information Innovation Office (I2O) as a program manager in June 2022. Her research interests include vulnerability discovery and remediation, secure software development, reverse engineering, program analysis, and automation in cyberspace operations.
Adams holds a Bachelor of Science degree in computer science from Rensselaer Polytechnic Institute and is a proud alumna of the computer security club, RPISEC. She has been an avid participant in cybersecurity Capture the Flag (CTF) competitions and is currently one of the organizers of DEF CON CTF. She has spoken and written on both technical and cyber policy issues.

Patroklos
ARGYROUDIS

Census
@_argp

Patroklos Argyroudis (argp) is a computer security researcher at CENSUS. His main expertise is vulnerability research, exploit development, reverse engineering and source code auditing.
Patroklos has presented his research at several international security conferences (Black Hat USA, Black Hat EU, Infiltrate, CanSecWest, Chaos Communication Congress, etc.) on topics such as kernel and heap exploitation, kernel protection technologies, and network security protocols.
He holds a PhD from Trinity College Dublin, where he has also worked as a postdoctoral researcher on applied cryptography.

Jean-Baptiste
BEDRUNE

Ledger
@33c0

Jean-Baptiste Bédrune has 15 years of experience in the security industry. His main areas of expertise are reverse engineering, applied cryptography, vulnerability research, and software and content protection.
He is currently the VP Product Security at Ledger, where he leads the security research team, called the "Donjon". Before joining Ledger, he led the research in mobile, cryptography and software protection at Quarkslab.

Amat
CAMA

Vigilant Labs
@amatcama

Amat is principal researcher for Vigilant Labs, a company specialising in cutting edge security research https://www.vigilantlabs.com/. After his first participation at Pwn2Own Vancouver and Tokyo in 2017, he became a member of the fluoroacetate duo that won Master of Pwn at Pwn2Own Tokyo 2018, 2019 and Pwn2Own Vancouver 2018, 2019 and 2020. His main areas of interest are hypervisors, basebands and kernels.

Marco
GRASSI


@marcograss

Marco Grassi is currently an Expert in Information Security. He is part of the team that won the "Mobile Master of Pwn" title in Tokyo for Mobile Pwn2Own 2016, working on iOS. He was also one of the main contributors at Desktop Pwn2Own 2016 for the Safari target with sandbox escape to root. He is a member of the team that won the title of "Master Of Pwn" at Pwn2Own 2016. He found a VMWare escape at Desktop Pwn2Own 2017, and baseband RCE and wifi iOS at Mobile Pwn2Own 2017 where they were awarded "Master Of Pwn" for the third time.
He has spoken at several international security conferences such as Black Hat USA, DEF CON, Infiltrate, CanSecWest, ZeroNights, Codegate, HITB and ShakaCon. He is also released with @qwertyoruiopz a iOS Jailbreak for iOS 10.2.

Ophir
HARPAZ

Akamai
@OphirHarpaz

Ophir Harpaz is a security research team lead in Akamai Technologies. She enjoys reverse engineering, fighting cybercriminals and playing CTFs.
Ophir has spoken in various security conferences including Black Hat USA, Botconf, SEC-T, HackFest and more. She has taught a reverse-engineering workshop and published an online version of it at https://begin.re to share her enthusiasm for reversing.
Ophir has entered Forbes' list of 30-under-30 and won the Rising Star category of SC Magazine's Reboot awards for her achievements and contribution to the Cyber security industry.

Bruno
KEITH

Dataflow Security
@bkth_

Bruno is a co-founder and managing partner at Dataflow Security. He's worked mostly on browser RCEs throughout his career in offensive security and successfully took part in Pwn2Own on multiple occasions.

Alex
MATROSOV

BINARLY
@matrosov

Alex Matrosov is CEO and Founder of Binarly Inc. where he builds an AI-powered platform to protect devices against emerging firmware threats. Alex has more than two decades of experience with reverse engineering, advanced malware analysis, firmware security, and exploitation techniques.
He served as Chief Offensive Security Researcher at Nvidia and Intel Security Center of Excellence (SeCoE). Alex is the author of numerous research papers and the bestselling award-winning book Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats.
He is a frequently invited speaker at security conferences, such as REcon, Black Hat, Offensivecon, WOOT, DEF CON, and many others.
Additionally, he was awarded multiple times by Hex-Rays for his open-source contributions to the research community.

Dmitry
NEDOSPASOV

Keylabs & TOOTHLESS
@nedos

Dmitry Nedospasov is a hardware design and security engineer, security researcher, trainer, speaker and reverse-engineerer based in Dubai, UAE. Dmitry received his PhD in Hardware Security from TU Berlin in 2014.
Dmitry is renowned for his hardware reverse-engineering techniques and FPGA-based attacks against hardware and embedded systems. He is experienced in analyzing anything ranging from electronics and embedded protocols to ICs at a gate and transistor level. He also has extensive experience in capturing, replaying, injecting and emulating embedded protocols to bypass the security of embedded systems. Together with Josh Datko, Dmitry has been developing spearf1sh, an embedded linux distribution for hacking other hardware and embedded devices.
In 2019, after the success of the wallet.fail presentation at 35c3, Dmitry co-founded Keylabs Inc. a company focusing on services and solutions for blockchain security. In 2020, Dmitry started Advanced Security Training, a state of the art video streaming platform for delivering trainings remotely. Since 2019, Dmitry has been consulting individuals and companies attempting to recover cryptocurrency funds locked in their wallets. Dmitry has also been involved in consulting numerous companies in architecting and securing the storage of the cryptocurrency assets.

Vitaly
NIKOLENKO

DUASYNT
@vnik5287

Vitaly is a security researcher at DUASYNT specializing in reverse engineering and exploit development. He has a solid academic background in programming languages, code analysis and algorithms. His current area of research is mobile security/operating systems (kernel space exploitation techniques and countermeasures).

Valentina
PALMIOTTI

Grapl Inc.
@chompie1337

Researcher focused on low level vulnerabilities, exploit development and offensive security.

Fabien
PERIGAUD

Synacktiv
@0xF4b

Probably the best thing the Limousin region has ever offered to the world along with the "pâté de pommes de terre", Fabien Périgaud is a reverse engineering technical lead for Synacktiv. Don't be fooled by its good-naturedness, Fabien's effectiveness is only rivaled by its skills in demolishing HP's iLOs or solving the SSTIC challenge at a blazingly fast pace whilst sipping a 10-year old scot'. Bio written by its personal brand manager and #1 fan.

Axel
SOUCHET


@0vercl0k

Axel has been deeply passionate about software security and computers for the past 15+ years and have been working in the industry for the past 8+ years. He has extensive experience in reverse-engineering, binary exploitation, tooling development and anything low-level programming.

Gabrielle
VIALA

Quarkslab
@pwissenlit

Gabrielle is working as a security engineer specialized in reverse engineering. Her main domains of interest are the Windows internals and UEFI components. She is part of BlackHoodie from the very first edition and belongs to the organization crew. She also contributes as a speaker and trainer during not just BlackHoodie but also other security-related events. She spoke at international conferences including Black Hat, Ekoparty and Infiltrate and is part of multiple program committees.