Ryan Speers

US · -remove-

Computer Security Researcher with a focus on embedded hardware, networks, and RF mediums. Experience in vulnerability analysis on software and hardware systems.

My professional background is in applied cyber security across a broad range of missions and environments, primarily in development but also with significant experience in operations.

Socialization

Api-Mote (IEEE 802.15.4/ZigBee Radio Interface)

2012 release of the ApiMote rev1 hardware.

Read more..

GoodFET Development on Tmote Sky/TelosB (CC2420 Radio)

Initial work to add CC2420 chipset to GoodFET.

Read more..

Scapy Support for USB Protocol on Facedancer Boards, MAX2420, etc.

Scapy support for USB descriptors/endpoints, compatible with Facedancer/GoodFET usage.

Read more..

Publications

A collection of selected public articles, presentations, and talks.

You can also find more posts on my company’s website at https://riverloopsecurity.com/blog/.

Paper - USENIX WOOT '11: Packets-in-Packets

Raw frame injection into 802.15.4 from control of only upper-layer protocols.

June 2011

Paper - Attacks on the Dartmouth College Network

An early undergraduate paper based on reviewing network intrustion data from the college's computing services.

December 2009

Experience

Director

Two Six Technologies

Joined when Two Six acquired my company River Loop Security. Key leader of growth in Electronic Systems, including elevation to dedicated business unit.

  • Customer operational capabilties
  • Strategy
  • Business development
  • Technical leadership

2022 - Present

Co-Founder & Security Researcher

River Loop Security LLC

Provide deep technical experience to assess customer devices, applications, and infrastructure. Write detailed vulnerability reports and help customers understand the risks and potential mitigations. Collaborate with development teams on mitigations.

Our team regularly speaks at leading industry conferences and publishes academic journal and conference papers. We develop and maintain several leading open-source security assessment tools.

2012 - 2022

Chief Architect for Strategic Integrations & Research

Ionic Security Inc.

Designed technical integrations with the 3 leading US SaaS/IaaS providers, among other projects.

2016 - 2018

Director of Applied Research

Ionic Security Inc.

Founded their Applied Research team, which was primarily focused on low level systems security & cryptographic math.

2014 - 2016

Education

Various

Coursework
Electrical Engineering

Dartmouth College

BA
Computer Science

focus in security research, High Honors

2011

What IoT device manufacturers should learn from the "IoT worm"

The research paper “IoT Goes Nuclear: Creating a ZigBee Chain Reaction” by Ronen, O’Flynn, Shamir, and Weingarten garnered moderate media attention (here, here, here, etc) in early November, 2016. As I have worked extensively in ZigBee offensive and defensive security, but never specifically on the ZigBee Light Link (ZLL) profile, I was interested to dig-in and see what the main techniques and issues were, and what lessons other device manufacturers should take away from this disclosure.
    November 25, 2016

    Other Experience

    Internships I graduated from Dartmouth College in the class of 2011. I majored in Computer Science with a focus in security research. I have interned at Memento, Inc, contributing to aspects of their enterprise fraud detection application. I also interned at Kurzweil Technologies, working on the Kurzweil-National Federation for the Blind knfbReader project, developing special OCR applications for mobile devices. Prior to that, I co-founded and co-developed DebateNet with Mark Bao.
      January 9, 2009

      Wait! There's more..

      See all Blogs for more examples!