Federal Office for Information Security (BSI)
Carl-Daniel Hailfinger works at the Federal Office for Information Security (BSI) Germany and is currently a doctoral student at Ruhr-University Bochum and Bonn-Rhein-Sieg University. His PhD focuses on side channel attacks against hard disk encryption. At BSI, he tries to convince vendors that secure hardware and firmware in desktops, laptops and servers is not just a good idea, it's absolutely vital. As a past and current FOSS contributor he has worked on the Linux kernel, coreboot, flashrom and other projects.
Marcus Brinkmann is a long time contributor to the Free Software movement, has a diploma degree in mathematics from the Ruhr-Universität Bochum, and works full time on GnuPG at g10 Code GmbH. Ask him about his favorite S-Box.
Fachhochschule Dortmund – University of Applied Sciences and Arts
Andreas Püsche studied Software Engineering in the Netherlands and works as scientific fellow in the field of Operating System Security and Trusted Computing at the Institute for Internet-Security at the Westphalian University of Applied Sciences in Gelsenkirchen. Since mid 2017 he works as scientific fellow and Software Engineer with security in mind in the field of salable, distributed systems and model driven development at the Smart Environments Engineering Laboratory (SEELAB), at the Institute for Digital Transformation of Application and Living Domains (IDiAL).
For the past 13 years I've worked on embedded systems up through multi-socket servers on both firmware and operating system kernels. As of 2012 I've worked on the coreboot project almost exclusively for Chrome OS.
Prof. Dr. Thorsten Holz
Ruhr University Bochum
Thorsten Holz is a professor in the Faculty of Electrical Engineering and Information Technology at Ruhr-University Bochum, Germany. His research interests include systems-oriented aspects of secure systems, with a specific focus on applied computer security. Currently, his work concentrates on software security, reverse engineering of different kinds of devices, and studying latest attack vectors.