Summit Speaker John Bland
Practical Meltdown & Spectre
Thursday, June 07, 2018 01:30PM - 02:15PM
We believe that Meltdown and Spectre are the tip of the iceberg with respect to exploitable bugs in hardware. We are presenting an accessible description of what the bugs are and what the implications are to the DoD and commercial entities. We will show our own research into these vulnerabilities and hopefully demo a new proof of concept that is relateable to the audience. We will close with recommendations for how to protect your organizations from this class of bugs.
South Hall - Ballroom 2
Mr. John Bland
John Bland is currently employed as a computer engineer and applied cybersecurity researcher at the Aviation and Missile Research, Development, and Engineering Center, AMRDEC. He received a B.S.E. degree in computer engineering and a masters in software engineering from the University of Alabama in Huntsville. He is currently working towards a Ph.D. in computer engineering with a focus on modeling & simulation and cybersecurity at the University of Alabama in Huntsville. Prior to working in the ﬁeld of cybersecurity, he worked in multiple hardware-in-the-loop facilities and supported multiple live test events. His experience includes developing high ﬁdelity simulations, embedded system speciﬁcation, test planning, and system analysis. His research interest includes applied cybersecurity, machine learning, and application of simulations.
Mr. Jake Schneider
Cyber Security SME
Geeks and Nerds
Jake has a BS in computer science and started his career in computer security in 2003 with a grant to look into methods for speeding up intrusion detection systems. He has performed information assurance compliance, blue teaming, red teaming, vulnerability research, cyber tool development, and cyber research environment development throughout his career.
Mr. Daniel Colvett
Daniel Colvet is currently employed as a systems engineer and cybersecurity specialist at the Logistics Support Activity (LOGSA). He received a B.S.E in Industrial and Systems Engineering and masters in systems engineering from University of Alabama in Huntsville. He is currently working toward a Ph.D in systems engineering with a focus on cybersecurity and resulting impacts to complex systems of systems. Prior to working in the DoD, he worked in the nuclear power generation industry performing V&V activities for data diodes implemented in multiple nuclear power facilities.