research, reverse engineering, exploit development, binary and source code auditing, tooling for these • Before that I was working (postdoc) on applied cryptography at Trinity College Dublin ◦ Designing, implementing, attacking network security protocols • Heap exploitation abstraction obsession; joint work with huku (who would be here if Greece didn’t have compulsory military service ;)