Cristofaro Mune (@pulsoid) has been in the security field for 15+ years. He has 10 years of experience with evaluating SW and HW security of secure products, as well as more than 5 years of experience in testing and assessing the security of TEEs.
He is a security researcher at Raelize providing support for developing, analyzing and testing the security of embedded devices.
His research on Fault Injection, TEEs, White-Box cryptography, IoT exploitation and Mobile Security has been presented at renowned international conferences and in academic papers.
What students say about his training:
“For me as a non-SW reverse engineer the learning curve is a bit steep but better by challenged than to be bored during a training.”
“The training is AMAZING, could use a bit more coffee breaks”
“Really enjoyed the material and CTF, instructions were clear, challenges were nicely staggered, just tricky enough without being frustrating and conveyed the concept clearly”
“Thanks for organising training in Ringzer0. It is above my expectations, and I enjoyed very much these 5 days. Training content are well considered.”
intercontinental singapore
follow us
Almost 40 teams signed up for the #HITB2022SIN Capture the Flag happening 25 / 26 Aug! There's still another 3 slots left for ONSITE teams :)
Read MoreRT @arnaugamez: Find me this August in Singapore too! @HITBSecConf #HITB2022SIN [22-25] Teaching my training on modern binary deobfuscatio…
Read MoreRT @phosphorusinc: This year's @hackinthebox #HITB2022Sin includes featured speaker @Chris_Rouland right after coffee on Day 1. Get the ful…
Read More#HITB2022SIN COMMSEC LAB: A Practical Approach to Advanced Code Obfuscation with MBA Expressions - Arnau Gamez Montolio - cc @arnaugamez
Read More#HITB2022SIN COMMSEC LAB: Template Injection On Hardened Targets - Lucas 'bitK' Philippe - cc @yeswehack @bitk_
Read More#HITB2022SIN #COMMSEC Biometrics System Hacking in the Age of the Smart Vehicle - Kevin Chen & Li Siwei -
Read More