HITCON Review Board
Tsung Peikan (aka PK) has experience of intensive computer forensic, malware and exploits analysis and reverse engineering. PK, specializing in cybercrime and APT investigation, worked for National Police Agency for six years before. After that, PK move to Academia Sinica which is the highest research unit in Taiwan as a leader of information security department. Besides conducting various trainings and workshops for practitioners, he is also the speaker of Taiwan Network Information Center (TWNIC),BlackHat, Defcon, SyScan and HITCON as well as FutureGOV conference. PK is working for Verint Systems Taiwan as chief cyber researcher and doing research on advanced threats.
HITCON Community Coordinator / DEVCORE CEO
Alan is HITCON CTF team manager. He works in Mediatek IT department. His job is to harden enterprise systems and handle cyber security incidents. Also he promote IoT chip applications. He previously job was in a ChungHwa Telecom being a security system architect , planning incident handling procedure for security department and planning cloud services for cloud department .
Jeremy Chiu (aka Birdman) has more than fifteen years of experience with Malware analysis, Machine Learning, CTI research and focusing on kernel technologies for both the Win32 and Linux platforms. In Taiwan, he is recognized as a very senior anti-malware programmer and early pioneer in APT research. He and Benson founded Xecure Lab in 2011 providing digital forensics and APT detection solution, then in 2014, Xecure Lab was acquired by Israeli-American Company Verint Systems. For many years, he was a contracted law enforcement instructor at intelligence agencies in Taiwan, and frequently gave talks at security conferences like DEFCON, SyScan, HITCON, AVTokyo, HTICA and OWASP Asia.
Associate Professor, Department of Electrical Engineering, National Taiwan University
Chen-yu Dai (GD) is CTO at Team T5 Research, providing Digital Forensics & Incident Response services, developing Threat Intelligence Program and Platforms, consulting enterprise cyber defenses. He has received some prizes from CTFs, bug bounty programs, and been speaker at several conferences: HITCON, TROOPERS, CODE BLUE, IEEE GCCE, etc.
I write code and study criminal behaviour of online identities with poor ethical principles.
Gasgas (Ziv Chang, YuMin Chang) is the Sr. Director of CyberSafety Solution Dept in TrendMicro. He is widely recognized for his work in APT campaigns studying, penetration testing, code review, malware analysis, vulnerability research, security architecture and security strategy in Taiwan. Prior to joining TrendMicro, YuMin was the CTO for information Security Service Digital United, a biggest MSSP in Taiwan. YuMin is one of founder of HITCON (Hack in Taiwan conference) and appear in the keynote of most important conferences in Taiwan (including HITCON 2005,2008,2012,2016, ITHOME 2015,2016, HONEYCON 2014,2015,2016) and also Black Hat Briefings Asia - Singapore 2000. He holds a degree in Mathematics and a Masters in Computer Science from the National Tsing Hua University, Taiwan, where he is also PhD candidate. He holds also certifications of CERT/CC, CISSP, CEH, CHFI and ECSA/LPT.
Chief Scientist of InfoKeyVault Technology Co., Ltd. and Outstanding Teaching Faculty at National Taiwan University. Courses delivered at NTU: Cryptography, Elliptic Curve Cryptography, Cryptanalysis, Post-Quantum Cryptography, and Introduction to FinTech.
Ming-chieh's (Nanika) is Chief Researcher in Team T5 Research. He is a well-known vulnerability researcher, and has been disclosing new vulnerabilities for many years. His major areas of expertise include vulnerability research, exploit techniques, malware detection, and mobile security. He has 10+ years of experience on vulnerability research, especially on Windows platform and malicious document and exploit. He discovered numerous Windows system and document application vulnerabilities, such as Microsoft Office, Adobe PDF, and Flash. In recent years, he started his exploration and discovering problems in Mac OS X. He frequently presents his researches at security conferences, such as Black Hat, HITCON, and Syscan.
A passionate security research with deep knowledge on the field and hands-on experience on IR and APT Research background. Over 10 years experience in penetration testing, incident response and vulnerability research. The current research area is SDN Security.
CHROOT and HITCON founder. Since 2004, organized the CHROOT Security Group and HITCON(Hacks In Taiwan Conference) with friends. Interest in Linux, network and security, usually join in open souce community and like to share knowledge and experience. Over 10 years experience in peneration testing, malware, rootkit and vulnerability research.
Sung-ting (TT) is the leader of Team T5, a cyber threat research and solution provider. They monitor, analyze, and track cyber threats throughout the Asia Pacific region. His major areas of interest include analyzing malware, tracking cyber threats, and reverse engineering on vulnerability and exploit. He especially is interested in new vulnerabilities in new technologies, and frequently presents the team's research at security conferences, such as Black Hat, HITCON, Code Blue, and Syscan. TT is also the board director of association of hackers in Taiwan as well as organizer of HITCON, the largest security community and conference in Taiwan.
Yen-Ming Chen has 15+ years of experience in risk, compliance and security. He currently works for Microsoft as a Principal Security Architect focusing on cloud migration security. Prior to that, he enabled Azure business by achieving certifications in over 10 countries. Before Microsoft, Yen-Ming worked in various roles like running application security program for a large bank, and leading APAC business and consulting services for Foundstone/McAfee. He speaks in many international conferences and contributed to five books including "To The Cloud" and "Hacking Exposed" series and had two open source projects for Snort log analytics. He got his master degree from Carnegie Mellon University's Information Networking Program and bachelor degree in Mathematics from National Central University in Taiwan.
Zuan is a member of Chroot group, and have been a staff for HITCON for almost 10 years. He specializes in reverse engineering software and hardware (embedded systems), malware analysis and cryptography. He authored one of the reversing challenge in HITCON 2011 and 2012's Wargame. Also, many years ago he was active in Cheat Engine Forum, and wrote two of the widely circulated (leaked) game hacks of that time ("Zuan Engine" and "MzBot").
Cheng-Da Tsai, also as known as Orange Tsai, is member of DEVCORE and CHROOT from Taiwan. Speaker of conference such as Black Hat USA, Black Hat ASIA, DEFCON, HITCON, HITB, CODEBLUE and WooYun. He participates numerous Capture-the-Flags (CTF), and won 2nd place in DEF CON 22/25 as team member of HITCON.
Currently focusing on vulnerability research & web application security. Orange enjoys to find vulnerabilities and participates Bug Bounty Program. He is enthusiasm for Remote Code Execution (RCE), also uncovered RCE in several vendors, such as Facebook, Uber, Apple, GitHub, Yahoo and Imgur.
Chong-Kuan Chen(Bletchley) is a Ph.D. candidate of the Distributed System and Network Security Lab at the National Chiao-Tung University in Taiwan. His research interests include malware, virtualization, vulnerability, program analysis and machine learning. He is also involved in several security projects: SECMAP, a scalable malware collect and storage platform to enable large scale machine learning. Forensor, a malicious document detector; MrKIP, a VM-based hooking system; And MBA, an open source malware sandbox dedicated to the modern Window 10 x64 environment. As the former captain and founder of NCTU campus hacker team BambooFox, he also intensively attends CTFs and NCTU PT team, and have several experience to discover CVEs . Currently, he is also a member of CHROOT.
HITCON 2016 Community Vice Coordinator / HITCON Reviewboard / HITCON ZeroDay Project Member / NTU Fast Crypto Lab / Yoctol Info. Brand Development
Bugs or wheels? Feedback and support here.
More on contact email@example.com
If you have any privacy or security concern when contacting the HITCON Committee,you can
communicate with us through the use of following PGP public key:
Key ID: E40856AA Fingerprint = BE1D 0B31 2271 079C CB45 001E 76B9 DFE6 E408 56AA The public key is available at:PublicKey Download