CEO of Trail of Bits
High-assurance code reviews: How consulting works when the risks are high
Director of Research at PortSwigger
Hunting evasive vulnerabilities: finding flaws that others miss
Head of Web3.0 at Algorand Foundation
Head of Security and Infrastructure at Nuri
CISO at Scout24
Head of Vulnerability Research for Huawei, Germany
Staff Security engineer at GitLab
CISO at Puzzle ITC
VP Information Security at Solarisbank
Head of Security Research at Ledger
Senior Program Manager, MSRC
Senior Director of Research at Kudelski Security
Director of Engineering Security at Mandiant
TPM at Android Security Team, Google
CISO at Finoa.io
Bug Bounty? Great! Now What?
Digital identity in the age of Fintech
CISO at Brave Software
Senior Researcher, Technische Universität Berlin
Staff Security Engineer at Mozilla
Independent Security Researcher
GPG memory forensics
Deep Links can be Friends of Spyware - Analysis The Dangerous Role Of Deep Links
How to bypass AM-PPL (Antimalware Protected Process Light) and disable EDRs - a Red Teamer's story
Bheem OS - A next-generation reasonably secure OS using Rust MicroVMs
Jailbreaking the AppleTV3 - Tales from a full stack hack
Fuzzware: Automating and Scaling Fuzzing for Firmware
A broken commercial metaverse-based virtual office platform
Finding and Exploiting Critical Bugs in TLS Libraries used by “Smart” UPS Devices
Template Injection On Hardened Targets
Firmware Security Village
Security Data Science at Avast
Offensive Payment Security
GNU Anastasis: Privacy-Preserving Key Backup and Recovery
Careful Who You Trust: Compromising P2P Cameras at Scale