The Grugq

The Grugq is a pioneering information security researcher with over a decade of professional experience. He has worked extensively with digital forensic analysis, binary reverse engineering, rootkits, Voice over IP, telecommunications and financial security. The Grugq's professional career has included Fortune 100 companies, leading information security firms and innovative start-ups.

Currently living in Thailand, the Grugq works as a senior security researcher for COSEINC. While not on engagements, the Grugq continues his research on security, forensics and beer.

Claims to fame:
  • pioneered anti-forensics;
  • developed “userland exec”;
  • released voip attack software;
  • decade of experience in info sec;
  • long term liaison with digital underground;
  • described as “extremely handsome” [by his mom];
  • 1992 sussex County 3-legged race, 2nd place.
OPSEC: Because Jail is for wuftpd

Felix 'FX' Lindner

Felix 'FX' Lindner runs Recurity Labs. FX has over 10 years of experience in the computer industry, eight of them in consulting for large enterprise and telecommunication customers. He possesses a vast knowledge of computer sciences, telecommunications and software development. His background includes managing and participating in a variety of projects with a special emphasis on security planning, implementation, operation and testing using advanced methods in diverse technical environments. FX is well known in the computer security community and has presented his and Phenoelit's security research on Black Hat Briefings, CanSecWest, PacSec, DEFCON, Chaos Communication Congress, MEITSEC and numerous other events. His research topics included Cisco IOS, HP printers, SAP and RIM BlackBerry. Felix holds a title as State-Certified Technical Assistant for Informatics and Information Technology as well as Certified Information Systems Security Professional.

Try Harder 2 Be Yourself

Andrey Belenko

Andrey Belenko is the Chief security researcher and software developer at Elcomsoft. Co-invented Thunder Tables (which are improved rainbow tables) and was first to bring GPU acceleration to password recovery. M. Sc. IT and CISSP. Sr. Security Engineer at viaForensics.
Dmitry Sklyarov

Dmitry Sklyarov is a lead analyst in Positive Technologies and formerly an analyst with the information security company ElcomSoft Co. Ltd. Associate Professor of information security of MSTU N.E. Bauman. The author of studies in the security of e-books and reliability of methods to ensure the authenticity of digital photos. One of the developers of technology ElcomSoft iOS Forensic Toolkit.
  Dark and Bright Sides of iCloud (In)security

Atte Kettunen

Atte Kettunen is a security researcher at the Oulu University Secure Programming Group (OUSPG). In 2011 and 2012 he has successfully fuzzed Firefox and Chromium and found dozens of vulnerabilities in them. Atte has quickly become one of the top reporters in both browsers' bug bounty programs.

Miaubiz is a software developer and independent security researcher who has found over 50 security vulnerabilities in WebKit in the past two years. In his spare time he collects four leaf clovers.
  Fuzzing at scale and in style

Alberto Garcia Illera (Spain, Security bussines)

Alberto Garcia Illera (Spain, Security bussines) — He is a 24 year old passionate about the hacking and especially for social engineering. He studied mathematics and computer systems in Spain. He works since several years like professional pentester. He has spoken in several seminars teaching hacking technics to help big companies like Microsoft, Spanish government or ciberterrorism Spanish police department. He is actually making a study about cryptographic hash functions applied to the IT security. He spoke at DEFCON20 in trak 1.

To be announced

Vladimir Vorontsov

Vladimir Vorontsov is the founder and lead analyst of ONsec. Vladimir has been engaged in research in the field of web applications security since 2004. He is the CEO and lead expert of the ONsec company as well as the author of numerous researches in the field of web application security. He was awarded by Yandex for winning the "vulnerability search month" contest, by Google for Chrome vulnerabilities, by Trustwave for ModSecurity SQLi Challenge, by 1C Bitrix for competition on proactive defense bypass. He is currently actively engaged in the development of a web application firewall system.
Alexander Golovko

Alexander Golovko — lead expert of ONsec
  SSRF attacks and sockets: smorgasbord of vulnerabilities

Andrei Costin

Born and grown-up in Moldova, Andrei is a Computer Science graduate of the Polytechnic University of Bucharest where he did his thesis work in Biometrics and Image Processing. While starting out his IT-career in the Computer Games industry, he has worked in the Telecom field and also was a senior developer at a specialized firm programming various GSM/UMTS/GPS sub-systems. He is the author of the MiFare Classic Universal toolKit (MFCUK), the first publicly available (FOSS) card-only key cracking tool for the MiFare Classic RFID card family and is known as the “mister-printer guy” for his “Hacking MFPs” and “Hacking PostScript” series of hacks & talks at various international conferences. He is passionate about security in a holistic and broad-view fashion. Currently he is a PhD candidate with EURECOM in field of “Security of embedded devices”.

On security aspects of ADS-B and other flying technology

joernchen of Phenoelit

joernchen likes to read. His main points of interest are in enjoying the reading of other people’s source code, as well as the inspection of interesting binary data in order to extend given systems functionality to unexpected limits.

They told me I could be anything, so I became BAh7BkkiDHVzZXJfaWQGOgZFVGkG

Michele "antisnatchor" Orru, Senior Spider (for Trustwave SpiderLabs)

Michele Orru a.k.a. antisnatchor is an IT and ITalian security guy. Lead core developer of the BeEF project, he mainly focuses his research on application security and related exploitation techniques. He is a frequent speaker at hacking conferences, including CONFidence, DeepSec, Hacktivity, SecurityByte, AthCon, HackPra, OWASP, 44Con, Ruxcon and more we just can't disclose. Besides having a passion for hacking and being a Senior Spider (for Trustwave SpiderLabs), he enjoys leaving his Mac alone, whilst fishing on salted water and praying for Kubrick's resurrection.

All you ever wanted to know about BeEF

Ivan Sorokin

In 2008, graduated from Lomonosov Pomor State University with a degree in Applied Mathematics and Computer Science. Since 2009 has been employed as a malware analyst at Doctor Web. Since 2011 has been specializing in threats for Mac OS X.

Mac OS X malware overview

Mohamed Saher, (Security Researcher, NSS Lab)

Mohamed Saher is a Senior Security Researcher specializing in reverse engineering, windows internals and mathematics. His work and research spans numerous areas, including native software protection, copy protection technologies, compilers and rootkits. Examples of his public research includes: Hacking Online Games (Breaking KONAMI’s Secure Communication Protocol and Emulating Game Servers), Industrial Control Systems (ICS) Targeted Rootkits: Stuxnet, DuQu open-source detector, and reverse engineered C sources with IDA databases. In his spare time he enjoys contributing to various reverse engineering forums and solving crackmes and math problems in Project Euler where he is top-ranked nationally and internationally. Mohamed currently works for NSS Labs.

Stealing from Thieves: Breaking IonCube VM to Reverse Exploit Kits

Kirill Samosadny, (Lomonosov Moscow State University, Faculty of Computational Mathematics and Cybernetics, Information Security Lab)

A fifth year student of Lomonosov Moscow State University, Faculty of Computational Mathematics and Cybernetics, he dedicates his research to methods of detection-proof malicious Flash content detection; is a member of the Bushwhackers CTF team; sports a moustache.

Mass CSRF attacks via Flash ads

Arseny Reutov

Specialist of Positive Technologies web application security research group, author of a range of infosecurity researches and whitepapers, author of a popular blog called raz0r.name. Specializes in application security, penetration testing, web application and source code analysis. Got a reward at the $natch contest at Positive Hack Days 2012. Member of the Positive Research center team.
Timur Yunusov

Specialist of Positive Technologies web application security research group, author of a range of infosecurity researches and whitepapers. Specializes in application security, penetration testing, web application and source code analysis. One of the developers of PHDays CTF. Member of the Positive Research center team.
Dmitry Nagibin

Specialist of Positive Technologies security analysis department, penetration testing group. Member of the Positive Research center team.
  Random Numbers. Take Two

Aleksandr Matrosov

Aleksandr Matrosov has more than ten years of experience with malware analysis, reverse engineering and advanced exploitation techniques. Currently working at ESET as Senior Malware Researcher and Security Intelligence Team Lead since joining the company in October 2009 as a virus researcher, and working remotely from Russia. He has worked as a security researcher since 2003 for major Russian companies. He is also a Lecturer at the Cryptology and Discrete Mathematics department of the National Research Nuclear University in Moscow, and co-author of the research papers “Stuxnet Under the Microscope” and “The Evolution of TDL: Conquering x64”, and is frequently invited to speak at major security conferences (including Ekoparty, REcon and Virus Bulletin). Nowadays he specializes in the comprehensive analysis of complex threats, modern vectors of exploitation, RE automation and research of cyber crime activity.
Eugene Rodionov

Eugene Rodionov graduated with honors from the Information Security faculty of the Moscow Engineer-Physics Institute (State University) in 2009 and successfully defended Ph.D. thesis in 2012. He has been working in the past five years for several companies, performing software development, IT security audit and malware analysis. He currently works at ESET, one of the leading companies in the antivirus industry, where he performs in-depth analysis of complex threats. His interests include kernel-mode programming, anti-rootkit technologies, reverse engineering and cryptology. He is co-author of the research papers “Stuxnet Under the Microscope” and “TDL3: The Rootkit of All Evil?”. Eugene Rodionov also holds the position of Lecturer at the National Nuclear Research University MEPHI in Russia.
  Win32/Flamer: Reverse Engineering and Framework Reconstruction

Oleksiuk Dmytro (aka Cr4sh)

Worked as a technician for Esage Lab. One of the cofounders of Neuron, the first Moscow hackspace. Currently engaged in the research of vulnerabilities and malware (as a hobby).

Applied anti-forensics: rootkits, kernel vulnerabilities and then some

Alexey Sintsov

Alexey Sintsov is a modest and unrenowned infosec character; you probably remember his articles in the “][akep” magazine or his exploits (like if you’ve read “Gray Hat Hacking: The Ethical Hacker’s Handbook”). You can also have met him at various conferences like BlackHat, CONFidence, and Hack in the Box, where Alexey has had the honor to speak. But if you have not, take it easy: you can always catch up with him at the ZeroNights conference, which he co-organizes.

Speaking about his organizing talents, we have to mention that it was Alexey and his friends (well, why don’t we mention friends in the biography, too: Dmitriy 'D1g1' Evdokimov and Alexey 'GreenDog' Tyurin) who organized the first Defcon community group in Russia (DCG 7812). His career started back in school when Alexey realized all the negligence of Perl developers; this infatuation affected the choice of university. Yes, Alexey graduated the Saint Petersburg Polytechnic and he thinks that those who passed the “idiot check” of Mr. Semyanov (http://www.password-crackers.com/) on their first try (like our hero, who is quite proud about it) can start an infosec career with no sweat.

To continue praising Alexey’s talents and inflating his reputation, I (an unknown contemporary and Alexey’s personal biographer) follow the story of his fate or, more precisely, of his professional experience: he was the man to work for the mighty ERPScan company, where he got his 15 minutes of fame by finding numerous 0-day vulnerabilities in the software of giant vendors like SAP, VMware, IBM, Adobe, Google as well as in Russian remote banking systems, thus inflicting great horror and shame over the Russian infosec field. In 2011, Alexey was also rewarded by Yandex for crushing the mail service in the name of supporting the domestic producer (and lust for money). Although the second place in a contest can be considered a loss, Alexey was happy to spend his reward on 0.000001% of his mortgage. As for the majority of his followers on Twitter (https://twitter.com/asintsov), he got them after he published a manual about writing JIT-Spray shellcode for fun and profit under ActionScript (Flash) and JavaScript (Safari). Currently, Alexey dedicates his labor to the kindest company in the world: Nokia, where he tends to the true values of goodness and justice. Some fruits of his labor can be found here: http://www.exploit-db.com/author/?a=549

Advanced Exploit Development (x32). Browser Edition

Nikita Abdullin

Nikita Abdullin graduated with honors from the Department of Information Security, Faculty of Engineering Cybernetics, Saint-Petersburg State Technical University.During the last few years he has been engaged in implementing payment card management system at OpenWay. He has research experience in e-commerce security, virtualization security, network technologies and reverse engineering of mobile and embedded platforms. Nikita is also an active participant of Russian DefCON Group.

Modern payments security: EMV, NFC, etc.?

Fyodor Yarochkin

Security analyst, P1 Security; PhD candidate, Academia Sinica, Taiwan

Formerly, security analyst and co-founder of GuardInfo, a Taiwan based security consulting company. He is a frequent speaker at international security conferences, including BlackHat HK/Singapore, Hack in the Box, DeepSec and primarily specializes on network security incidents analysis, forensics and vulnerability research. Fyodor has a MS degree in computer science from Kyrgyz Russian Slavic University and currently is a PhD Candidate at National Taiwan University.
Vladimir Kropotov

In 2003, graduated from Ryazan State Radio engineering Academy with honors, faculty “Information security organization and technology”. From 2004 to 2008 – postgraduate study in MSTU of N.E. Bauman, where he was engaged in research work in the field of information security. He is a regular speaker at infosec conferences. At present, he is an employee of RN-inform, engaged in infosec threat monitoring and response.
Vitaly Chetvertakov

Graduated Ryazan State Radio engineering Academy, faculty “Computer Security”. In 2010–2011, worked at the information security chair of Ryazan State Radio engineering Academy, where he was engaged in deployment and support of information security systems. Since 2012, he is an employee of information security department in TBinform.
  Techniques of automatic malware detection system bypass: interesting examples of 2012

Kirill Salamatin (aka Del)

PhD student in the Institute for System Analysis and Management. Currently engaged in developing software and hardware for a reactor in the Joint Institute for Nuclear Research.

Involved in infosec since 2002. Focused on poking around contactless and smart cards and reverse engineering protocols since 2010. On top of that, a seasoned extreme sports enthusiast.
Andrey Tsumanov

Graduated Faculty of journalism with honours. Loves all kinds of RFID devices and gadgets delivered from the Celestial Empire. Became friends with contactless in 2008 after a situation where he had to drive through an illegally barred territory. Now, unusual contactless manipulation are his favorite hobby.

Sticks with Easy Life: never hurries, never comes late, loves to live, and only chooses the best.
  RFID: Jokers up our sleeves

Mateusz 'j00ru' Jurczyk

Mateusz is a big fan of memory corruption. His main areas of interest are client software security, vulnerability exploitation and mitigation techniques, and delving into the darkest corners of low-level kernel internals with a very strong emphasis on Microsoft Windows. He is currently working as an Information Security Engineer at Google.

Windows Kernel Reference Count Vulnerabilities — Case Study

Nicolas Gregoire

Nicolas Gregoire has been professionally hacking things for more than twelve years. After defending a start-up against some motivated russian hackers (true story!), he spent 4 years doing pentesting and then became an internal security auditor for one of largest French PKI.

At the beginning of 2011, he left this job to create Agarri, a small company where he finds bugs for customers or for fun. His main research area is XML technologies at large, with a unreasonable attraction for XSLT.

That's why I love XML hacking!

Mikhail Fyrstov

Specialist of Positive Technologies web application security analysis group. Member of the Positive Research center team.

A blow against MongoDB

Alexander Peslyak

Alexander Peslyak, better known as Solar Designer, has been professionally involved in computer and network security since 1997, and he has been professionally developing software long before that. Alexander is an Open Source software author & team leader at Openwall Project, computer security expert, Founder & CTO at Openwall, Inc., member of informal and semi-formal computer security communities. Alexander has presented on computer security and Open Source software topics at international conferences (HAL2001, NordU, FOSDEM, CanSecWest), served as the technical reviewer for a novel computer security book (Michal Zalewski's Silence on the Wire) and wrote the foreword for it. He is recognized in the security community primarily for the security tools (software) released to the public under liberal Open Source licenses, and for many contributions to other popular Open Source software (primarily Linux and related applications).

New developments in password hashing: ROM-port-hard functions (building upon the ideas of scrypt and security through obesity)

Oleg Kupreev

Hardware infection is not a myth anymore. For instance, Rakshasa, which was shown at Defcon, is capable of infecting BIOS and PCI ROM (LAN, CDROM). The author of this paper decided to continue research towards infecting the software of the devices and checked the practical possibility to infect a modern 3G modem.

The 3G modems of the Big Three mobile network operators were used: MTS, BeeLine, Megafon. Software for cross-platform infection (Windows, Linux, MacOS X) of virtual CD-ROM images has been developed.

3G modem infection

Babak Javadi

Babak Javadi is a hardware hacker with a wayward sprit. His first foray into the world of physical security was in the third grade, where he received detention for describing to another student in words alone how to disassemble the doorknob on the classroom door. After years of immersion in electronics and computer hardware hacking, he found his passion in the puzzling and mysterious world of high security locks and safes. After serving as a driving force within the locksport community for almost a decade and helping found the US division of The Open Organisation of Lockpickers, he has recently re-embraced the beauty of the baud and resumed hardware hacking with a vengeance. He currently serves as the President of the US group of The Open Organisation of Lockpickers (TOOOL) and is the founder of The CORE Group, a security research and consulting firm.

Armed Failure — Hacking Wireless Alarm Systems

Andrey Petukhov

Founder and leading expert of Internal Security; CTO of SolidLab. Researches web application security in the infosecurity laboratory of MSU Faculty of Computational Mathematics and Cybernetics since 2004. Published several papers on the topic. One of co-founders and an active participant of the CTF team called Bushwhackers.

Blog: https://andrepetukhov.wordpress.com/
Georgy Noseyevich

A PhD candidate in the infosecurity laboratory of MSU Faculty of Computational Mathematics and Cybernetics; a permanent member of the CTF team called Bushwhackers; participates in OWASP Access Control Rules Tester; rewarded in various infosec contests (Deutsche Post Security Cup, PHD 2012 WAF Bypass, Onsec WAF Challenge https://reward.onsec.ru/winners.html etc.)
  No locked doors, no windows barred: hacking OpenAM infrastructure

Igor Gots

Graduated a long time ago and not on his first try. Works as an infosec executive in a small-town company. Practical security is his hobby.
Sergey Soldatov

Graduated the Moscow State Technical University n.a. N.E. Bauman with a degree in information security. Until 2002, coded in C and Perl; from 2002 to 2012, worked for TB-inform (TNK-BP); currently, works as an information security executive in RN-inform. Practical security is his job as well as his hobby.
  How to catch your hacker, or Makeshift security

Jean-Ian Boutin

Jean-Ian Boutin is a malware researcher in the Security Intelligence program at ESET. In his position, he is responsible for investigating trends in malware and finding effective techniques to counter these threats. Jean-Ian finished his Master degree in computer engineering at Concordia University in Montreal in 2009. His main interests include investigations on information stealer malware and threats targeting specific regions. When not on a keyboard, he enjoys playing.

Reversing banking trojan: an in-depth look into Gataka

Alexey Tyurin

I am a pentester, and I do this great job for ERPScan. I have hacked a lot of various systems, especially remote banking systems. Probably touched all major Russian developments.

In many of the systems that I analyzed, I have found 0-day vulnerabilities. This happened, for instance, to SAP, VMware, and Citrix. But in Cisco, I have only re-opened some old bugs (alas). On top of that, I have participated in closing a major XML vector in SAP.

In all, I love hacking large systems and Windows style networks. I like various logical vulnerabilities and bugs that are features.

I like coding, and that is why I am also one of the leading developers of ERPScan Pentesting tool.

Speaking of major achievements, I am personally acquainted with Alexey Sintsov himself!

I try to make the world a better place, and that is why I am happy to share my knowledge and experience in the ][akep magazine. I have been the editor of the EasyHack column for almost three years now. I am also one of the organizers of Defcon Russia.

My interests include interesting things.

Exploitation of XML-based attacks

Shay Chen

Shay Chen is the CTO of Hacktics, an advanced security center of Ernst & Young. He is also a prominent blogger and researcher, the co-author of Diviner and WAVSEP, and is responsible for many security publications, including new application level attacks, open source projects, testing methodologies, various security tools comparison initiatives and three of the biggest researches performed in the field of automated security scanners (including the latest 2012 comparison of 61 web application scanners).

Shay is an experienced speaker, and regularly instructs a wide variety of security related courses. He has over ten years in information technology and security, including a strong background in software development.

Before moving into the information security field, he was involved in various software development projects in enterprise & mobile environments.

The Diviner — Digital Clairvoyance Breakthrough — Gaining Access to the Source Code & Server Side Memory Structure of ANY Application

Eugeny Sobolev

Expert infosec researcher in Advanced Monitoring. I specialize in pen-testing.

Typical information security flaws in corporations and large enterprises

Alexander Potapenko

Graduated from MSU Faculty of Computational Mathematics and Cybernetics with honours. Works for Google on dynamic software analysis tools for Linux and MacOS.
Dmitry Vyukov

Graduated from MSTU n.a. N.E. Bauman. Since 2002, works on web applications, billing, telecommunications, VoIP, social networks. Currently, works for Google on dynamic code verification systems: AddressSanitizer (detector of memory errors) and ThreadSanitizer (detector of data races) as well as on parallelism and multikernel support in Go language (parallel garbage collection, goroutine planner, channels, sync primitives etc.) He won Intel Threading Challenge in 2010 and was among the first to obtain the Intel BlackBell title. He is especially interested in multithreading and multikernel, and has developed a dozen of innovational synchronization algorithms and a tool to verify them.
  Forewarned is forearmed: AddressSanitizer and ThreadSanitizer

Nikita Tarakanov

An independent information security researcher. Worked as an IS researcher in Positive Technologies, Vupen Security, CISS. Likes writing exploits, especially for Windows NT Kernel.

Won PHDays Hack2Own contest in 2011 and 2012. Tried to hack Google Chrome during Pwnium 2 but failed. Published a few papers about kernel mode drivers and their exploitation. Currently, he is actively engaged in reverse engineering research and vulnerability search automation.

The Art of Binary Diffing or how to find 0-dayz for free

Alexander Polyakov (CTO ERPScan)

Famous for his moustache and SAP security evangelism. Conferenceholic.

How I will break your enterprise

Alexey Troshichev

Head of sleg.in lab. Researcher of application and system security. Formerly, engineer in Central Research and Development Institute of Chemistry and Mechanics, infosec auditor in ERPScan.

MiTM attack on iOS: Methodology and consequences

Sergey Karasikov

Head of progressive development department in IXI.

I specialize in mobile vulnerabilities. For the last three years spent in IXI, I have been responsible for research and analysis of vulnerabilities of Android-based mobiles platforms. I study the algorithms of hacking and data derivation, I keep track of all changes in OS structure to evaluate its hardness against various attack scenarios. I constantly search for possibilities to use mobile gadgets in an uncommon way, and I conduct suicidal experiments. I am the developer of a range of secure mobile solutions and simply a collector of mobile secrets. My work is directed at ensuring the protection of confidentiality for Android users.

Android behind the scenes: possible attacks and radical defense measures

Alisa Shevchenko

Head of research in Esage Lab; co-founder and sponsor of Neuron Hackspace.

A story about nonexistent 0-days, stable exploits for binary applications and user interactions

Dmitry 'Chipik' Chastukhin

Another security researcher. Sports a surname that nobody can spell correctly. Like everyone else, has a thing for infosec. Like everyone else, studied somewhere. Like everyone else, worked somewhere. Like everyone else, found vulnerabilities in certain well-known applications and resources.

Among the multiple achievements of Dmitry, his astounding capability of sneezing with open eyes must be noted, as well as a game of billiards that he has once won from Alexey Sintsov.

Thinks of his work for ERPScan as a watershed moment. Been to conferences. Presented papers. Got acknowledgements from vendors. Was listening to Never Le Nkemise 2 by Die Antwoord while writing the bio. Single)
  Gleb Cherbov

Graduated from the Department of Information Security, Faculty of Engineering Cybernetics, Saint-Petersburg State Technical University. Whitehat, researcher, pentester, and analyst in ERPScan. “Another dude” © Anton 'toxo4ka' Karpov.

Participates and parties in the same gang with Alexey Sintsov, Alexey Tyurin, Alexander 'sh2kerr' Polyakov, Dmitry 'chipik' Chastukhin, Gleb Cherbov, Alexander Minozhenko, and other tech savvies of ERPScan.
Where is my car dude?

Dmitry 'D1g1' Evdokimov

Dmitry Evdokimov works for ERPScan research center in Russia. He focuses on SAP security, particularly on Kernel and Mobile security (iOS, Android, WP). He has official acknowledgements from SAP and Oracle for the vulnerabilities he found. His interests cover reverse engineering, software verification/program analysis (SMT, DBI, IL), vulnerability research and development of exploits, software for static and dynamic code analysis written in Python. ”Security soft” and "X-Tools" section editor in Russian hacker magazine “XAKEP”. One of the Defcon Russia (DCG #7812) organizers.

Python Arsenal for RE

Alexander Azimov

Lead exploitation engineer at Highload.
Artyom Gavrichenkov

Head of development department at Highload.
Alexander Lyamin

CEO at Highload.

Official support:
With participation of:
Gold sponsor:
Silver sponsors:
Prizes Sponsors:
General Media Partner:
Media Partners:
Competition organizers: