Presentations and Panels, CanSecWest 2021

Security probe of Qualcomm MSM data services

Mobile Station Modem (MSM) is an ongoing series of a 2G/3G/4G-capable SoCs designed by Qualcomm starting in the early 1990s. MSM has always been and will be a popular target for security research because hackers want to find a way to attack a mobile device remotely just by sending it a SMS or crafted radio packet. But 3GPP protocols are not the only entry point into the modem. Android also has an ability to communicate with the modem processor through the Qualcomm MSM Interface (QMI). In our research, we looked at the QMI as a way to attack MSM data services.

MSM is managed by Qualcomm real-time OS (QuRT) that cannot be debugged or dumped even on rooted Android devices. We reverse-engineered QuRT and built a feedback fuzzer for QDSP6 processor architecture to probe MSM data services for bugs.

We are going to show real-world examples of using the QMI API to query MSM data services, our experience with unpacking and fuzzing MSM code, and a vulnerability we discovered that can be used to control the modem and dynamically patch it from the application processor.

 

Slava Makkaveev

Slava Makkaveev is a Security Researcher at Check Point. Holds a PhD in Computer Science. Slava has found himself in the security field more than ten years ago and since that gained vast experience in reverse engineering and vulnerability research. His research projects were presented at HITB, Recon, DEF CON 25/26/28.

 

The Misinformation Age: Defending Against Deepfakes

The Information Age has led to the birth of the Misinformation Age. Commercial and open-source projects exist that can allow anyone to create a “deepfake” video. This has caused industry leaders such as DARPA, Microsoft, Facebook, Intel, and Adobe to pursue initiatives to help people to discern whether online content should be trusted. These initiatives have even gone down to the hardware level with companies such as Qualcomm who recently added the ability to perform hardware-secured photo capture to their latest Snapdragon mobile processors. This presentation will share an overview of the current state of deepfake technology and then explore the different proposals for combatting misinformation including a detailed discussion on the Content Authenticity Initiative.

 

Peleus Uhley

Peleus Uhley has been a part of the security industry for over 20 years. As the lead security strategist at Adobe, he assists the company with proactive and reactive security. He is a frequent blogger, presenter, and an active member of the security community. Prior to joining Adobe, Peleus was a senior developer at Anonymizer, and a security consultant for @stake and Symantec .

 

Down the Rabbit Hole: A Close Look at Ethernet

You've probably used Wireshark or a similar packet sniffer to look at TCP/IP traffic and Ethernet frames at the byte level. But just how deep does the rabbit hole go? Dig down into the Ethernet physical layer with a high-bandwidth oscilloscope and see what actual Ethernet frames look like on the wire. We'll cover the 10Base-T, 100Base-TX, 1000base-X, and 10Gbase-R standards in depth with example waveforms and protocol analysis, as well as brief discussion of 1000baseT and 40Gbase-SR4 and the "killer packet" vulnerability in the 100baseTX specification.

 

Andrew Zonenberg

Andrew Zonenberg is an associate principal security consultant at IOActive’s embedded security lab. His interests include semiconductor reverse engineering, embedded systems security, operating systems, high speed signal integrity, and computer architecture. He has a Ph.D in computer science from Rensselaer Polytechnic Institute.

 

Kubernetes Gotchas - Hacking and Defending Kubernetes

In this talk, we'll demonstrate Kubernetes and AWS attacks, attacking a scenario themed on the movie "Real Genius." . We'll discuss multiple defenses available to every Kubernetes and AWS user. In part of the attack, we'll use the open source Peirates tool. Come learn how to attack Kubernetes and break your attacks!

You will learn about how to attack and avoid several "gotcha" configurations, where the cluster maintainer's intent doesn't match the attacker's view of the defenses. You'll also learn how some of these defenses really work, including the Kubernetes to AWS linkages.

 

Jay Beale

Jay Beale works on Kubernetes and cloud native security, both as a professional threat actor and as a co-lead of the Kubernetes project's Security Audit working group. He's the architect and a developer on the Peirates attack tool for Kubernetes. In the past,Jay created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security's first Linux/UNIX scoring tool. He has led training classes on Linux security and Kuberntes at the Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training, since 2000. As an author, series editor and speaker, Jay has contributed to nine books and two columns and given over one hundred public talks. He is CTO of the information security consulting company InGuardians.

 

Deceive to Detect - Misleading Attacker's Lateral Movement through Network Deception

During this talk, we will discuss the various stages of lateral movement from credential theft techniques, privilege escalation and finding network targets to code execution methods, we will retrospect on some infamous lateral movement methods. We will also discuss how to detect and mislead an attacker’s lateral movement using network deception and approaches that can be taken to build the deceptive network.

 

Chintan Shah

Chintan Shah is currently working as a Lead Security Researcher with McAfee Intrusion Prevention System team and holds broad experience in the network security industry. He primarily focuses on Exploit and vulnerability research, building Threat Intelligence frameworks, Reverse engineering techniques, advanced threats and malware analysis. Chintan had researched and uncovered multiple targeted and espionage attacks in the past and worked with multiple enforcement agencies and blogging about them. He holds multiple patents in the exploit detection and prevention techniques . His interests lies in software fuzzing for vulnerability discovery, reversing engineering and analyzing exploits, malwares and translating the research into product improvement.

 

KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities

The monolithic nature of modern OS kernels leads to a constant stream of bugs being discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them may be serious enough to lead to security takeovers (i.e., privilege escalations). Therefore, researchers have recently started to develop automated exploit generation techniques (for UAF bugs) to assist the bug triage process. In this project, we investigate another top memory vulnerability in Linux kernel — out-of-bounds (OOB) memory write from heap.

 

Zhiyun Qian

Zhiyun Qian is the Everett and Imogene Ross associate professor in the CSE department at the University of California Riverside. His main research interests are in the area of system and network security, including vulnerability discovery, side channel analysis, applied program analysis, system building, and measurement of real-world security problems. He is a recipient of the ACM CCS distinguished paper award in 2020, Applied Networking Research Prize from IRTF in 2019, NSF CAREER Award in 2017, Facebook Internet Defense Prize Finalist in 2016, and the most creative idea award from Geekpwn 2016.

 

Silent Corner : Going Deeper into LPWAN Security

LPWAN (low-power wide-area network) is a mainstream IoT communication technology and has been widely used in smart cities and other fields. LoRaWAN and NB-IoT are the most mainstream technologies in the LPWAN, and there are hundreds of millions of IoT devices using these two technologies. LoRaWAN is used by Internet manufacturers, and NB-IoT is promoted by 3GPP as the scene evolution of 5G mMTC. With the development of LPWAN, this field is worthy of in-depth security research.

In recent years, the security research on LPWAN has mostly focused on the LoRaWAN specification and communication keys, However, in the real world, there is little research on the security risks of the supply chain of LoRaWAN. In addition, because NB-IoT is more complex and closed than LoRaWAN, security research is also more difficult, and there are very few studies on the supply chain, threat models and security risks of NB-IoT chips. In this talk, we will disclose the security research findings in the field of LPWAN supply chain for the first time.

 

Yuxiang Li

Yuxiang Li is a senior security researcher at the Tencent Blade Team, specialized in the study of mobile security, IoT security, and browser security. He has reported multiple vulnerabilities in Android and Chrome and has received acknowledgments from many companies such as Google. He was a speaker of BlackHat USA / DEF CON / HITB AMS.

Huiyu Wu

Wu HuiYu is a senior security researcher of Tencent Blade Team. Now his job is mainly focusing on AIoT security research. He is also a bug hunter, winner of GeekPwn 2015 & 2020, and speaker of BlackHat USA, DEFCON, HITB and POC.

 

How to Secure Blockchain Smart Contracts

Smart contracts are a revolutionary aspect of blockchain technology that help us enforce an agreement between parties involved in transactions, transferring value and information without the presence of a third-party. Smart contracts scale well and provide faster solutions as they remove third parties traditionally involved in transactions. The main challenge is that smart contracts are not inherently secure and many security issues have taken place, some resulting in massive financial losses. In one incident (the "DAO" hack), the attacker managed to retrieve approx. 3.6 million Ether. This presentation will go through all known smart contract application vulnerabilities and discuss mitigations as well as best security practices for developing secure smart contracts.

 

Iman Sharafaldin

Iman is an Application Security Lead at Forward Security who is passionate about all things code. He has more than 8 years of cybersecurity and software related experience and is also a PhD candidate in Computer Science with more than 1000 citations on his cybersecurity related publications in top journals and conferences. In his spare time, he researches and invests in crypto and blockchain technologies.

 

Large-scale Security Analysis of IoT Firmware

Today, the number of IoT devices in both the private and corporate sectors are steadily increasing. IoT devices like IP cameras, routers, printers, and IP phones have become ubiquitous in our modern homes and enterprises. To evaluate the security of these devices, a security analysis has to be performed for every single device. Since manual analysis of a device and reverse engineering of a firmware image is very time-consuming, this is not practicable for large-scale analysis.

To be able to conduct a large-scale study on the security of embedded network devices, an approach was applied that allows a high number of firmware images to be statically analyzed. For data acquisition, a crawler was used to identify and retrieve publicly available firmware images from the Internet. In this way, more than 10,000 individual firmware images have been collected. The firmware was then automatically unpacked and analyzed regarding security-relevant aspects.

For the first time, this research provides insights into the distribution of outdated and vulnerable software components used in IoT firmware. Furthermore, a comprehensive picture of the use of compiler-based exploit mitigation mechanisms in applications and libraries is given. Factory default accounts were identified, and their passwords recovered as far as possible. Also, a large amount of cryptographic material was extracted and analyzed. Besides, a backdoor has been discovered in the firmware of several products that allows remote access to the devices via SSH after triggering the functionality. The backdoor has been verified and confirmed by the vendor and two official CVE numbers have been assigned.

The results of this large-scale analysis provide an interesting overview of the security of IoT devices from 20 different manufacturers. IoT firmware was analyzed regardless of device type or architecture and a broad picture of their security level was obtained.

 

Daniel Nussko

Daniel Nussko is an independent security researcher and information security professional with years of progressive experience in cyber security. His main expertise lies with the penetration testing of enterprise networks and web applications. He holds a Master's degree in IT Security from the University of Offenburg in Germany. When not involved in customer projects, he enjoys doing research in the field of IoT security.

 

Certification of AI

Artificial Intelligence is one of the fastest growing technologies of the 21st century. AI accompanies us in our daily lives when interacting with technical applications. TÜV AUSTRIA Group and the Institute for Machine Learning at the Johannes Kepler University Linz therefore propose a certification process and an audit catalog for Machine Learning applications.

 

Bernhard Nessler

Bernhard Nessler is university assistant at the Institute for Machine Learning in Sepp Hochreiter's team at the Johannes Kepler University Linz; his research topics include Deep Learning, Computational Neuroscience. He is head of the industrial collaborations for technical applications of deep learning and autonomous robotics; he is a founding member of the European AI Excellence Initiative ELLIS and a member of the ELLIS Coordination Committee (ECC).

 

Tom Vogt

Tom Vogt is Senior Information Security Architect at TÜV AUSTRIA in Vienna; he advises on and audits information security including ISO27001 and IEC62443 as well as various related topics such as business continuity, secure software development or risk management and analysis; he also participates in various research projects to contribute expert knowledge on security aspects, including autonomous driving and artificial intelligence.

 

The Risk of AI Abuse: Be Careful with Your Voice

Artificial Intelligence (AI) technology has been widely deployed and made human lives much more convenient. It has become the cornerstone of many technologies, such as computer vision, machine translation and self-driving etc. But the AI also exposes some potential security problems. Especially when it is used inappropriately, the technology is very likely to become a weapon of the underground industry. In a word, AI is a double-edged sword. In this talk, we focus on AI security problems and the abuse of AI-based speech techniques. We will show how to use a few pieces of somebody’s voice to imitate his or her voice and make a fake call.

 

Mengyun Tang

Mengyun Tang is currently working as a senior security researcher at Tencent Zhuque Lab and holds broad experience in AI security and computer vision. Her research results have been published on NDSS, TIFS etc. She is also a speaker of DEFCON, CanSecWest 2019 and CanSecWest 2020.

Dylan Di

Dylan Di is a senior security researcher of Tencent Zhuque Lab. Now his job is mainly focusing on AI model & infrastructure security research. He is also a former threat intelligence researcher & red teamer, proficient at binary reversing and hacking weapon construction.

 

Influence Operations 101

Over the past 5 years, the term ‘fake news’ has become more and more common. Previously referred to as propaganda, or campaigns to influence the thoughts and perceptions of the masses, we now call the same thing ”active measures.”

Regardless of semantics, Influence Operations are very real and have existed for centuries; In the exact same way as nailing paper to a door or inventing the printing press, the Communications Revolution of the last half century has again forever changed the method used.

What has not changed however, is the strategic objectives of the latest incarnation of the Influencer. Beware of geeks bearing gifts
 because of course the ’new’ factor is the geek. With the advent of social media, Influence Operations have acquired a new method of distribution, which is more dynamic, far reaching, and allows better targeting and highly accurate feedback. Although this method is indeed very powerful, it is not what IO is all about.

IO is way more than bots on social or mainstream media. Those operations are designed to influence human beings, not bots. While chasing Russian bots on Twitter and Facebook is relatively easy, it does little to deter the end goal of a IO campaign, especially since the objectives are difficult to infer. This makes counteracting an IO campaign and denying its objectives particularly difficult.

In this talk, the author presents the basics in communications theory, to make these concepts accessible to non-practitioners in the field.

The presenter will cover the two-step flow of information, gatekeeping, agenda-setting, priming, framing, spiral of silence, echo chambers, and cultivation, as well as the effects of some of the mental processes that these actions have.

This talk will stay away from political topics and current events as attitudes towards those topics may interfere with perception. Furthermore, there will be no guilt - i.e., attribution - assigned.

The talk is the geek version by a geek who endeavored in social sciences and communication. The hope is that it will make this field more understandable to geeks.

 

Krassimir Tzvetanov

Krassimir Tzvetanov is a graduate student at Purdue University focusing his research on Threat Intelligence, Operational Security Research, and Social Media Influence Operations, in the cyber domain.

In the recent past Krassimir was a security architect at Fastly, a content delivery network (CDN) designed to accelerate content delivery as well as serve as a WAF and a shield against DDoS attacks. His current focus is on incident response and investigations, threat intelligence and security systems architecture.

In the past he worked for hardware vendors like Cisco and A10 focusing on threat research and information exchange, DDoS mitigation features, product security and security software development best practices. Before joining Cisco, Krassimir was Dedicated Paranoid (security) at Yahoo!, Inc. where he focused on designing and securing the edge infrastructure of the production network. Part of his duties included dealing with DDoS and abuse. Before Yahoo! Krassimir worked at Google, Inc. as an SRE for two mission critical systems, the ads database supporting all incoming revenue from ads and the global authentication system which served all of the company applications.

Krassimir is very active in the security research and investigation community, has a number of contributions to FIRST SIGs, as well as participates in the Honeynet Project.

In addition, Krassimir ran the BayThreat security conference and has contributed to a number of other events like DefCon, where he ran the Radio Communications group, and ShmooCon and DC650.

Krassimir holds Bachelors in Electrical Engineering (Communications) and Masters in Digital Forensics and Investigations.

 

Unmasking the Chameleons of the Criminal Underground: An Analysis From Bot To Illicit Market Level.

Large corporations have access to, and use, incredibly sophisticated anti-fraud systems that monitor dozens of signals each time one of their customers or employees log into their web portal. These signals include what browser is used, what plugins are installed, and even the language of the users’ software. Past investigations have shown that malicious actors use malware to build profiles of their victims, and create virtual environments that replicate precisely the victims’ computers’ fingerprints. These profiles can be loaded up in specially crafted browser plugins and used in account takeover attacks. These profiles are sold on private markets and can fetch in the hundreds of dollars when they also include the cookies and credentials of the victims for financial institutions. The aim of this presentation is to build on past research and to map over a period of a month all of the Canadian activities of a machine fingerprint market. Our analysis extends past research first by developing a new understanding of how, and which, Canadians are targeted by this type of attack. Secondly, it presents models that predict not only the price of profiles for sale – i.e., what makes a profile more valuable – but also which profiles will end up being sold among the thousands that are for sale. Through these analyses, we end up with estimations for the Canadian market for profiles for sale, and propose hypotheses as to the size of the impact of these illicit activities on the Canadian economy. The market for fingerprinting victims is growing exponentially, and is promising to be, along with ransomware, one of the biggest threats of the coming year. With more detailed knowledge about this problem, companies and individual victims will be better suited to protect themselves against these attacks, and limit the monetization of the criminal underground.

 

David DĂ©cary-HĂ©tu

David HĂ©tu is Co-Founder and Chief Research Officer of Flare Systems. David holds a doctorate in criminology from the University of Montreal. His main research interests are in illicit online markets and the impact of technology on crime, both from the perspective of offenders and from the perspective of the legislator. David's research has been published in leading academic journals (e.g., British Medical Journal) and presented at leading conferences (Botconf, HOPE). He is regularly invited to share his analysis of cybercrime in the media. David developed the DATACRYPTO software tool to monitor offender activity on the darknet and co-developed the BitCluster software tool to track cryptocurrency transactions.

 

Disinformation Risk Management : Bringing Cognitive Security to a Modern SOC

This talk is about cognitive security risk management and how security operations centre (SOC) services can be augmented to provide disinformation response. We'll examine the core functions of cognitive security, it's application, in theory and practice, at organization, country, and global scales, with examples including SJ Terp's recent work with the United Nations Development Programme.

A core challenge organizations face when including cognitive security practices into their operations is the effective allocation of detection, response, and mitigation resources. Using insights from AMITT (Adversarial Misinformation and Influence Tactics and Techniques), an open-source framework for describing the strategic, operational, and tactical elements of influence operations, we'll explore how responders can allocate resources to minimize attack surface, vulnerabilities, and potential losses.

 

S.J. Terp

Misinformation, adtech, crisismapping, artificial intelligence, machine learning and information security. Also Terry Pratchett, industrial photography, cool bridges and other awesome architecture.

Roger Johnston

Roger Johnston is a security specialist at Ubisoft and a member of CogSecCollab. In 2020, Cognitive Security Collaborative set up the CTI League's disinformation team, and continues to work with groups around the world to bootstrap communities of disinformation responders.

His work involves security consulting, adversary emulation, and malware development. At CogSecCollab he researches influence operation TTPs and develops mitigation strategies for the AMITT framework, performs red team exercises, and develops trainings.

 

A Journey on Discovering Vulnerabilitys and Exploiting SGX Enclave Frameworks

Intel SGX provides hardware support to protect sensitive data. Cloud vendors,
such as Microsoft Azure and Google Cloud, have developed SGX software frameworks,
such as Asylo and OpenEnclave, and offered Intel SGX-enabled virtual machines
for confidential computing.

We conduct an in-depth analysis of Microsoft OpenEnclave SDK (powered by Azure
CC) and Google Asylo SDK (powered by GCP), discovering 20+ vulnerabilities (14
CVEs assigned) in them. We show that these vulnerabilities allow an attacker to
read and write arbitrary enclave protected memory by exploiting the
vulnerability, which affects all SGX enclaves using the vendor-provided SDK.
Our attack is more realistic for exploitation than side-channel attacks and can
reliably retrieve and manipulate protected enclave data.

In this talk, we will go through the SGX enclave security model and analyze
attack surfaces. In this model, developers have to partition trusted components
of an application as TCB into the SGX enclave. After partitioning, any
out-enclave data flowing into these trusted components become untrusted and
require additional checks and sanitization. To reduce the attack surface,
developers declare enclave boundary interfaces with annotated parameters in an
EDL file and generate boilerplate code for marshaling the parameters. However,
this EDL approach is insufficient since it lacks checks for nested pointers,
context-aware data, shared memory, etc.

Also, we cover typical mistakes enclave developers made and share real-world
vulnerability cases we have discovered with our bug-finding tool, SGXRay. We
discuss attack scenarios and the consequences once successfully exploited by
attackers outside the enclave. This talk also includes demonstrations of our
enclave exploitation with arbitrary read and write capability to enclave memory
by leveraging the bugs found by us.

 

Zhaofeng Chen

Zhaofeng Chen is a security researcher from Baidu Security. He is experienced in both offensive and defensive security on confidential computing, system security, and mobile security. He has designed multiple data/mobile security products and is the PPMC of the Apache Teaclave (Incubating) project. Over the years, he has also discovered various TEE and iOS framework vulnerabilities with 20+ CVEs credited by Google, Microsoft, and Apple.

 

Quick-Win Triage Forensics for Macs

This is an excerpt of an upcoming dojo on quick-win forensics. This practical tutorial will walk beginners through a first attempt at forensics on a Mac. Attendees will take home the knowledge and skill on what and how to quickly triage a bunch of Macs to zero in on the ones that need further examination.

 

Albert Hui

Albert Hui has 20+ years experience doing digital forensics and fraud investigation data analytics. He has given testimonies to courts of law across multiple countries as a criminal defence expert witness, as well as having trained law enforcement officers. Equally adept at private investigations as well as legal proceedings, Albert has been quoted in HKICPA (Hong Kong Institute of Certified Public Accountants)'s magazine on his use of unsupervised machine learning for fraud examination.

Albert has spoken at Black Hat, ACFE Fraud Conference, and HTCIA Forensic Conference among others.

Panels

 

Car-Hacking

Electronics are increasingly filled with more and more electronics and not all of them are always the most robust with respect to software security, come join the panel as Dragos Ruiu and Chris Valasek discuss the state of Car-Hacking in this panel.

 

Dragos Ruiu

Dragos is the organizer of Canada's and Japan's oldest, most technical, information security conferences at CanSecWest and PacSec, for 21 and 17 years respectively. He started out as a computer dinosaur from back when computers used paper tape (P DP11) and along the way has worked on supercomputers used by various government agencies, as well as working on network monitoring systems for HP for 7 years, picking up an Emmy along the way for the MPEG digital video analyzers used for the first HDTV stations. He does security audits for mission critical systems, and has organized infosec conferences in Vancouver, London, Amsterdam, Buenos Aires, and Hong Kong, as well as starting the PWN2OWN competition. More recently since the pandemic he has been focusing on helping conferences pivot their technology and rationalize their systems for virtual on-line formats, including the NASFiC 2020 conference, and the recent 2020 Hugo Awards at ConNZealand.

Charlie Miller

Charlie Miller is a senior security engineer at Uber ATC, a hacker, and a gentleman. Back when he still had time to research, he was the first with a public remote exploit for both the iPhone and the G1 Android phone. He is a four-time winner of the CanSecWest Pwn2Own competition. He has authored three information security books and holds a PhD from the University of Notre Dame. He has hacked browsers, phones, cars, and batteries. Charlie spends his free time trying to get back together with Apple, but sadly they still list their relationship status as ‘it’s complicated’.

Chris Valasek

To be added.

 

Drone Security

To be added.

 

Pavel Haintz

Pavel Haintz is the CEO and founder of Think Sensor Research Inc, a private company based in Burnaby, BC, Canada which specializes in underwater sonar sensors, sensor systems and autonomous underwater vehicles. Pavel Haintz has over 20 years in the marine technology sector, he has worked for a large international marine technology company before founding Think Sensor Research in 2008. Think Sensor Research is mainly targeting the marine engineering markets with its 3D sonar and other products. One of the main markets that Think Sensor Research is currently expanding into is maritime surveillance using radar, sonar and infrared sensors to detect and track small air, surface and underwater targets that can consist of aerial drones and autonomous surface and underwater vehicles. Pavel Haintz holds a BASc and a MEng in System Engineering from the School of Engineering Science, Simon Fraser University. During his studies he founded the Aerial Robotics Group which built autonomous airships, airplanes and helicopters and competed in the International Aerial Robotics Competition in the late 1990s and early 2000s.

 

Teens Explain Internet Security to Infosec Professionals

The title says it all.

 

Pete Herzog

Pete Herzog is an experienced security expert with as much time in the trenches as in the tower with both offense and defense. He is the co-founder of mutliple companies: Urvin.ai to scale AI from the lab to production, Akiya Research a prototyping company, Invisibles to create music as a behavioral utility, Mewt using wearable computers to address cyber hygiene problems, and ISECOM a non-profit research organization maintaining projects such as OSSTMM and Hacker Highschool.

 

Wifi Hacking

Mike Spicer, Dragos Ruiu and EI Kentaro enter the internet thunderdome and talk about war warwalking, packet capturing all the things, access point reliability,and mesh WiFi.

 

Mike Spicer

To be added.

Dragos Ruiu

Dragos is the organizer of Canada's and Japan's oldest, most technical, information security conferences at CanSecWest and PacSec, for 21 and 17 years respectively. He started out as a computer dinosaur from back when computers used paper tape (P DP11) and along the way has worked on supercomputers used by various government agencies, as well as working on network monitoring systems for HP for 7 years, picking up an Emmy along the way for the MPEG digital video analyzers used for the first HDTV stations. He does security audits for mission critical systems, and has organized infosec conferences in Vancouver, London, Amsterdam, Buenos Aires, and Hong Kong, as well as starting the PWN2OWN competition. More recently since the pandemic he has been focusing on helping conferences pivot their technology and rationalize their systems for virtual on-line formats, including the NASFiC 2020 conference, and the recent 2020 Hugo Awards at ConNZealand.

El Kentaro

El Kentaro is the guy who builds wifi gadgets for fun. Unfortunately many of his creations look like a "bomb" and can be a hassle to travel with.. Kentaro has been involved with the hacker scene for over a decade, spoken at DEF CON and other various conferences across the globe. During his spare time away from his day job as a translator, Kentaro enjoys watching movies and taking long warwalks at night. Kentaro aspires to become Q for the hacker scene when he grows up.