Security researcher/programmer ⁂ Managing director @ HexArcana ⁂ @DragonSectorCTF founder ⁂ he/him
Security researcher and open-source enthusiast, volunteer at Digitalfabrik
Cryptography and static analysis @ Trail of Bits
since 1985
https://phrack.org
Open source privacy and security focused mobile OS with Android app compatibility.
https://grapheneos.org/
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time
Fedi: @retr0id@retr0.id
Macroblog: https://www.da.vidbuchanan.co.uk/blog/
🦀 Rust Developer, currently working on idb-rs
Prof. @KU_Leuven | Research in Network & Software Security | Known for WPA2 KRACK attack, Dragonblood, and FragAttacks | Open to consultancy | Ex-Postdoc NYU
Security @ MORSE, v0.1.0 security tools on GitHub 🏳️🌈
@novafacing@haunted.computer
Offensive security conference in the heart of Paris. 10-11th October 2025
https://www.hexacon.fr/
Postdoctoral researcher in the SEFCOM lab @ASU; prev @CISPA Helmholtz Center and @RUB;
interested in Systems Security / Program Analysis / Fuzzing
Researching iOS' Cellular Protocol Stack @ SEEMOO
Studying CS @tuda.bsky.social
🌍 https://lukasarnold.de
mobile security / symbolic execution . he / him
Official account of the Microarchitecture Security Conference (µASC).
Cutting-edge research on #security in #microarchitecture contexts.
Next Conference: February 3, 2026, in Leuven, Belgium. https://uasc.cc
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
PHISIC is a Hardware Security workshop
Its next edition will take place on 20-21 May 2025.
Learn more at https://phisic.fr
Firmware/OS/Cellular Security Research @ruhr-uni-bochum.de