Monday, November 5, 2018 - 4:00pm to 4:50pm
LINC 200

Speaker Information

Rodrigo Rubira Branco
Chief Security Researcher
Intel Corporation

Abstract

This talk is a discussion about the career of a vulnerability researcher in the industry, reasoning on why vulnerabilities exist (and can be exploited) and actual examples of how they can be found and exploited.

Speaker Bio

Rodrigo Rubira Branco (BSDaemon) works as Chief Security Researcher at Intel Corporation where he leads the STORM (STrategic Offensive Research & Mitigations) team. Previous to that, he led the Core Client and BIOS Teams. He is the Founder of the Dissect || PE Malware Analysis Project. Rodrigo held positions as Director of Vulnerability & Malware Research at Qualys and as Chief Security Research at Check Point where he founded the Vulnerability Discovery Team (VDT) and released dozens of vulnerabilities in many important software. In 2011 he was honored as one of the top contributors of Adobe. Previous to that, he worked as Senior Vulnerability Researcher in COSEINC, as Principal Security Researcher at Scanit and as Staff Software Engineer in the IBM Advanced Linux Response Team (ALRT) also working in the IBM Toolchain (Debugging) Team for the PowerPC Architecture. He is a member of the RISE Security Group and is one of the organizers of Hackers to Hackers Conference (H2HC), the oldest security research conference in Latin America. He is an active contributor to open-source projects (like ebizzy, linux kernel, others). Accepted speaker in lots of security and open-source related events as Black Hat, Hack in The Box, XCon, OLS, Defcon, Hackito, Zero Nights, PhDays, Troopers, Andsec, Ekoparty and many others. Rodrigo is also part of the committee for many security conferences, such as Black Hat USA/Europe/Asia (invited reviewer), PhDays, Hackito, NoSuchCon, Opcde, CCNC, LACSEC and others.