Mohamed Saher is a Senior Security Researcher specializing in reverse engineering, windows internals and mathematics. His work and research spans numerous areas, including native software protection, copy protection technologies, compilers and rootkits. Examples of his public research includes:Hacking Online Games (Breaking KONAMI’s Secure Communication Protocol and Emulating Game Servers), Industrial Control Systems (ICS) Targeted Rootkits:Stuxnet, DuQu open-source detector, and reverse engineered C sources with IDA databases. In his spare time he enjoys contributing to various reverse engineering forums and solving crackmes and math problems in Project Euler where he is top-ranked nationally and internationally. Mohamed currently works for NSS Labs.