Meet Our Researchers

 

 
Balint500.jpg

Balint Seeber

A software engineer by training, Balint is a perpetual hacker, the Director of Vulnerability Research at Bastille Networks, and guy behind spench.net. His passion is Software Defined Radio and discovering all that can be decoded from the ether, as well as extracting interesting information from lesser-known data sources and visualising them in novel ways. When not receiving electromagnetic radiation, he likes to develop interactive web apps for presenting spatial data. Originally from Australia, he moved to the United States in 2012 to pursue his love of SDR as the Applications Specialist and SDR Evangelist at Ettus Research.

Twitter: @spenchdotnet

Logan Lamb500_0.jpg

Logan Lamb

Logan joined the CSIR group of ORNL in 2011. As a member of the Cyber Warfare Research Team his work concentrated on the formal verification and reverse engineering of unknown binaries. In 2013 he joined the newly formed Center for Trustworthy Embedded Systems and focused his efforts on red-teaming critical infrastructure, embedded systems, exploit development, and applications of software defined radio.

In 2014 his research "Home Insecurity: No Alarms, False alarms, and SIGINT" was accepted by Black Hat USA and featured on Good Morning America.

newlin500.jpg

Marc Newlin

Engineer and IoT security researcher at Bastille who previously work at the Fundamentals of Networking Laboratory at the University of Washington (where he had the interesting distinction of never having gone to college)

Marc competed in the DARPA Shredder Challenge in 2011 where he wrote software to reassemble shredded documents, finishing the competition in third place. A huge accomplishment as he was competing by himself against major colleges and other institutions. In 2013-2014, Marc was a finalist in the DARPA Spectrum Challenge, which served as his introduction to the world of SDR and wireless communication.

Twitter: @marcnewlin

 

 

 

Matt Knight.jpg

Matthew Knight

Matt is a software engineer and security researcher with Bastille Networks, where he seeks to discover vulnerabilities in the ubiquitous wireless interfaces that connect embedded devices to the Internet of Things. In 2016, he was the first to document the closed-source LoRa PHY based on blind signal analysis. Matt previously worked as a hardware and wireless security consultant, leveraging Software Defined Radio to craft custom attacks against embedded devices, and has developed wireless networking products for private sector and government customers. Matt holds a BE with a concentration in Electrical Engineering from Dartmouth College.

Twitter: @embeddedsec

"