Jean-Baptiste Bédrune has 15 years of experience in the security industry. His main areas of expertise are reverse engineering, applied cryptography, vulnerability research, and software and content protection.
Vigilant Labs
@amatcama
Amat is principal researcher for Vigilant Labs, a company specialising in cutting edge security research https://www.vigilantlabs.com/. After his first participation at Pwn2Own Vancouver and Tokyo in 2017, he became a member of the fluoroacetate duo that won Master of Pwn at Pwn2Own Tokyo 2018, 2019 and Pwn2Own Vancouver 2018, 2019 and 2020. His main areas of interest are hypervisors, basebands and kernels.
Hasso Plattner Institute
@naehrdine
Jiska Classen is a research group leader at Hasso Plattner Institute, with a focus on wireless and mobile security researche. The intersection of these topics means that she and her team dig into iOS internals, reverse engineer wireless firmware, and analyze proprietary protocols. Her practical work on public Bluetooth security analysis tooling uncovered remote code execution and cryptographic flaws in billions of mobile devices. She also likes to work on obscure and upcoming wireless technologies, for example, she recently uncovered vulnerabilities in Ultra-wideband distance measurement and reverse-engineered Apple's AirTag communication protocol.
She has previously spoken at Black Hat USA, DEF CON, RECon, Hardwear.io, Chaos Communication Congress, Chaos Communication Camp, Gulasch Programmer Nacht, MRMCDs, Easterhegg, Troopers, Pass the Salt, NotPinkCon, gave various lectures and training, and published at prestigious academic venues. Jiska Classen gave Android security trainings privately and for BlackHoodie at TROOPERS 2022, public iOS trainings at Nullcon, OBTS, BlackHat, and RE//verse. She has teaching experience from creating own lectures and labs as a postdoctoral researcher at TU Darmstadt, followed by brand new courses on mobile and IoT security, fuzzing, reverse engineering, and applied cybersecurity at Hasso Plattner Institute.
Marco Grassi is currently an Expert in Information Security. He is part of the team that won the "Mobile Master of Pwn" title in Tokyo for Mobile Pwn2Own 2016, working on iOS. He was also one of the main contributors at Desktop Pwn2Own 2016 for the Safari target with sandbox escape to root. He is a member of the team that won the title of "Master Of Pwn" at Pwn2Own 2016. He found a VMWare escape at Desktop Pwn2Own 2017, and baseband RCE and wifi iOS at Mobile Pwn2Own 2017 where they were awarded "Master Of Pwn" for the third time.
He has spoken at several international security conferences such as Black Hat USA, DEF CON, Infiltrate, CanSecWest, ZeroNights, Codegate, HITB and ShakaCon. He is also released with @qwertyoruiopz a iOS Jailbreak for iOS 10.2.
Akamai
@OphirHarpaz
Ophir Harpaz is a security research team lead in Akamai Technologies. She enjoys reverse engineering, fighting cybercriminals and playing CTFs.
Ophir has spoken in various security conferences including Black Hat USA, Botconf, SEC-T, HackFest and more. She has taught a reverse-engineering workshop and published an online version of it at https://begin.re to share her enthusiasm for reversing.
Ophir has entered Forbes' list of 30-under-30 and won the Rising Star category of SC Magazine's Reboot awards for her achievements and contribution to the Cyber security industry.
Dataflow Security
@bkth_
Bruno is a co-founder and managing partner at Dataflow Security. He's worked mostly on browser RCEs throughout his career in offensive security and successfully took part in Pwn2Own on multiple occasions.
IBM X-Force
@chompie1337
Researcher focused on low level vulnerabilities, exploit development and offensive security.
Synacktiv
@0xF4b
Probably the best thing the Limousin region has ever offered to the world along with the "pâté de pommes de terre", Fabien Périgaud is a reverse engineering technical lead for Synacktiv. Don't be fooled by its good-naturedness, Fabien's effectiveness is only rivaled by its skills in demolishing HP's iLOs or solving the SSTIC challenge at a blazingly fast pace whilst sipping a 10-year old scot'. Bio written by its personal brand manager and #1 fan.
Perri Adams is a computer security expert who most recently served as Special Assistant to the Director at the Defense Advanced Research Projects Agency (DARPA), where she advised on the next generation of cybersecurity and artificial intelligence technology across the United States Government. Prior to that role, Adams was a program manager within DARPA’s Information Innovation Office (I2O), where, among other programs, she created the AI Cyber Challenge (AIxCC). She is a frequent speaker, author, and contributor on both technical and policy issues.
For years, Adams has been an avid participant in cybersecurity Capture the Flag (CTF) competitions and was one of the organizers of the DEF CON CTF, the world’s premier hacking competition. She is a proud alumna of the computer security club, RPISEC.
Axel has been deeply passionate about software security and computers for the past 15+ years and have been working in the industry for the past 8+ years. He has extensive experience in reverse-engineering, binary exploitation, tooling development and anything low-level programming.
Quarkslab
@pwissenlit
Gabrielle is working as a security engineer specialized in reverse engineering. Her main domains of interest are the Windows internals and UEFI components. She is part of BlackHoodie from the very first edition and belongs to the organization crew. She also contributes as a speaker and trainer during not just BlackHoodie but also other security-related events. She spoke at international conferences including Black Hat, Ekoparty and Infiltrate and is part of multiple program committees.