Daniel earned computer science degrees at the Crysys Lab of the Budapest University of Technology and Economics (2008) and the Georgia Institute of Technology (2010). He’s worked in the mobile security field since. During his five years at Qualcomm he hunted baseband 0-days, authored exploit mitigations and oversaw the establishment of an offensive security team.
In 2015 he joined Comsecuris as a security researcher, focusing on embedded and mobile devices. Last year, together with his partner in crime Nico Golde, Daniel won Mobile Pwn2Own by exploiting the baseband of a Samsung flagship device, a first in the history of the competition. In his free-time, Daniel is a proud member of the SpamAndHex CTF team.