Chris Wade

Chris is a seasoned security researcher and testing consultant. He’s usually got at least one project on the go- for example, reverse engineering hardware, firmware and RF, or fingerprinting USB vulnerabilities with his own fuzzing framework. Another really good example is using Software Defined Radio, with his modded RTL-SDR dongle to sniff radio signals, mainly looking at NFC protocols.

He also has experience of analysing x86 executables to break protections such as license key requirements, and also for crafting exploits for general buffer overflow vulnerabilities, though this is definitely not as strong as his work analysing the ARM architecture. He’s also pretty good on the guitar.

Chris will present at: