[Full-disclosure] InfoSec Southwest 2014 CFP now open!
Hi computer enthusiasts! I'm delighted to announce this year's call for papers for ISSW 2014 is open now through 11:59:59 CST, February 1, 2014. ISSW 2014 will be held in downtown Austin, Texas, USA, from Friday, April 4 through Sunday, April 6th. Yes, this is well after SXSW, so all the out-of-towner hipsters should be long gone. You'll still be free to experience our usual complement of locally-raised hipsters. Details on the CFP are here: http://2014.infosecsouthwest.com/cfp.html Once you've confirmed you've hit the requirements listed there, please send your material to: c...@infosecsouthwest.com Good luck! -- Tod Beardsley, ISSW 2014 CFP Chair t...@metasploit.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Ruxcon 2013 Final Call For Papers
Ruxcon 2013 Final Call For Papers Melbourne, Australia, October 26th-27th CQ Function Centre http://www.ruxcon.org.au/call-for-papers/ The Ruxcon team is pleased to announce the final call for papers for Ruxcon. This year the conference will take place over the weekend of the 26th and 27th of October at the CQ Function Centre, Melbourne, Australia. The deadline for submissions is the 31st of August. .[x]. About Ruxcon .[x]. Ruxcon is ia premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security. For more information, please visit the http://www.ruxcon.org.au .[x]. Important Dates .[x]. August 31 - Call For Presentations Close October 26-27 - Ruxcon Conference .[x]. Topic Scope .[x]. o Topics of interest include, but are not limited to: o Mobile Device Security o Virtualization, Hypervisor, and Cloud Security o Malware Analysis o Reverse Engineering o Exploitation Techniques o Rootkit Development o Code Analysis o Forensics and Anti-Forensics o Embedded Device Security o Web Application Security o Network Traffic Analysis o Wireless Network Security o Cryptography and Cryptanalysis o Social Engineering o Law Enforcement Activities o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) .[x]. Submission Guidelines .[x]. In order for us to process your submission we require the following information: 1. Presentation title 2. Detailed summary of your presentation material 3. Name/Nickname 4. Mobile phone number 5. Brief personal biography 6. Description of any demonstrations involved in the presentation 7. Information on where the presentation material has or will be presented before Ruxcon * As a general guideline, Ruxcon presentations are between 45 and 60 minutes, including question time. If you have any enquiries about submissions, or would like to make a submission, please send an email to presentati...@ruxcon.org.au The deadline for submissions is the 31st of August. .[x]. Contact .[x]. o Email: presentati...@ruxcon.org.au o Twitter: @ruxcon ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Ground Zero Summit - Call For Papers
Hi All, Ground Zero Infosec Summit is an initiative of independent apex not-for-profit body and is an outcome of an alliance between industry and Government of India to tackle emerging cyber security threats against critical information infrastructure. The summit is supported by the Govt. of India. Call for Papers and workshops is open for Ground Zero Summit. We expect quality papers with highly technical research in the field of information security. At Ground zero summit it is our endeavour to promote new and interesting ideas that will change the outlook of information security. Hence we have decided to reward new research with an honorarium of USD 500 in addition to the speaker benefits. Please read the CFP below for details on the speaker benefits and the format of submission. *Tracks and relevant submissions* G0S will be a triple track conference and we are looking for paper submissions under any one of the tracks. *1. Systems Track* (OS/Systems/Application/Hardware) - OS exploitation - Application hacking - Rootkits and Malware - Forensics and Anti-forensics - SCADA security and exploitation - Telecom equipment security and exploitation - Embedded device/hardware security and exploitation - Malware on the mobile platform – Android, Windows OS, Symbian - Mobile Application Security *2. Communications Track* (Communication and Networks) - Protocol exploitation and security - Botnet communication, CC and takedowns - Web hacking - Radio communication hacking - GSM/3G/LTE/5G networks – security and exploitation - Satellite communication hacking - Network security - Intrusion prevention (and evasion) techniques - APT prevention (and evasion) techniques - Replacing network Security with “Intelligent, self automated Networks” - Growth of Mobile Data Networks with repercussions for the same *3. Strategy Track* (Gov/GRC/Cyber warfare/CII) - GRC - Privacy - Social media in context of security and Privacy - Surveillance - Auditing - New age Cyber warfare/Cyber intelligence/Cyber terrorism/Cyber crimes - Upcoming information security trends - Critical infrastructure Protection - Cyber security in context of the Govt. - Global Cyber Diplomacy - IT Act 2008 in light of Prism Surveillance - Security VS privacy - Evolving role of CERT to protect country’s citizens against external and internal intrusions - Repercussions of PRISM surveillance leak on Social Media *Paper Presentation* 1. Talk duration: 1 Hr including QA 2. Paper has to be innovative. *Workshops* 1. Workshop duration: Half day, One day or Two Days 2. Workshop has to be up-to-date, hands-on and have very limited or no theory. *Speaker Privileges* The speaker privileges are provided to only one speaker in case there are two or more speakers. 1. Return economy airfare. We will book the ticket for the speaker. In case the speaker wants to book his/her own tickets, he/she needs to inform us about the same and a maximum of USD 1400 or the ticket cost which ever is less will be reimbursed to the speaker. 2. Three nights accommodation. 3. One speaker pass and one complementary conference pass. 4. Invitation to Conference party. 5. Honorarium: An honorarium of USD 500 will be given to only those talks that are new, highly technical and have never been presented or published before (before G0S 2013) anywhere online or offline. Please note that the Ground Zero staff will determine whether the paper is to be considered for an honorarium or not and their decision will be final based on the technical depth of the talk and whether it has been presented/published before. The selected speakers will be notified about the same in our acceptance email. The honorarium is only for paper presentations. *Important dates* 1. CFP opens – 25th June 2013 2. First round of speaker list – 1st August 2013 3. CFP closes – 30th September 2013 4. Final speaker list – 10th October 2013 *Submit* Send an email to cfp[ at ]g0s.org with the subject: G0S 2013 CFP *Submission format* 1. Paper Title 2. Name 3. Organization and Designation 4. Brief Profile of yourself 5 Phone No. 6. Track: 7. Abstract of the Paper/Workshop 8. Have you presented/published/submitted this paper anywhere else? Where? 9. Why do you think it is a quality presentation/workshop? 10. Detailed Paper/Workshop (please attach with the email) 11. Your photo (please attach with the email) - G0S CFP ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Ruxcon 2013 Call For Papers
Ruxcon 2013 Call For Presentations Melbourne, Australia, October 26th-27th CQ Function Centre http://www.ruxcon.org.au/call-for-papers/ The Ruxcon team is pleased to announce the Call For Presentations for Ruxcon 2013. This year the conference will take place over the weekend of the 26th and 27th of October at the CQ Function Centre, Melbourne, Australia. .[x]. About Ruxcon .[x]. Ruxcon is ia premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community. For more information, please visit the http://www.ruxcon.org.au .[x]. Important Dates .[x]. May 7th - Call For Presentations Open September 7th - Call For Presentations Close October 22-23 - Ruxcon/Breakpoint Training October 24-25 - Breakpoint Conference October 26-27 - Ruxcon Conference .[x]. Topic Scope .[x]. o Topics of interest include, but are not limited to: o Mobile Device Security o Virtualization, Hypervisor, and Cloud Security o Malware Analysis o Reverse Engineering o Exploitation Techniques o Rootkit Development o Code Analysis o Forensics and Anti-Forensics o Embedded Device Security o Web Application Security o Network Traffic Analysis o Wireless Network Security o Cryptography and Cryptanalysis o Social Engineering o Law Enforcement Activities o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) .[x]. Submission Guidelines .[x]. In order for us to process your submission we require the following information: 1. Presentation title 2. Detailed summary of your presentation material 3. Name/Nickname 4. Mobile phone number 5. Brief personal biography 6. Description of any demonstrations involved in the presentation 7. Information on where the presentation material has or will be presented before Ruxcon * As a general guideline, Ruxcon presentations are between 45 and 60 minutes, including question time. If you have any enquiries about submissions, or would like to make a submission, please send an email to presentati...@ruxcon.org.au .[x]. Contact .[x]. o Email: presentati...@ruxcon.org.au o Twitter: @ruxcon ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Breakpoint 2013 Call For Papers
Breakpoint 2013 Call For Papers Melbourne, Australia, October 24th-25th Intercontinental Rialto http://www.ruxconbreakpoint.com .[x]. Introduction .[x]. The Ruxcon team is pleased to announce Call For Papers for Breakpoint 2013. Breakpoint showcases the work of expert security researchers from around the world on a wide range of topics. This conference is organised by the Ruxcon team and offers a specialised security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint caters towards security researchers and industry professionals alike, with a focus on cutting edge security research. Breakpoint presents a great opportunity for our selected speakers to receive a complimentary trip to Australia and experience both the Breakpoint and Ruxcon conferences, not to mention the great weather, awesome parties, and friendly people. Melbourne is a city of many subcultures, personalities and styles. Melbourne has a vibrant arts and music scene, eccentric cafes, intimate bars and restaurants, and is known as Australia's cultural capital. .[x]. Important Dates .[x]. May 1 - Call For Presentations Open August 23 - Call For Presentations Close October 22-23 - Breakpoint Training October 24-25 - Breakpoint Conference October 26-27 - Ruxcon Conference .[x]. Topic Scope .[x]. Topics of interest include, but are not limited to: o Mobile Device Security o Exploitation Techniques o Reverse Engineering o Vulnerability Discovery o Rootkit Development o Malware Analysis o Code Analysis o Virtualisation, Hypervisor Security o Cloud Security o Embedded Device Security o Hardware Security o Telecommunications Security o Wireless Network Security o Web Application Security o Law Enforcement Activities o Forensics o Threat Intelligence o You get the idea .[x]. Submission Guidelines .[x]. In order for us to process your submission we will require the following information: 1. Presentation title 2. Detailed summary of your presentation material 3. Name/Nickname 4. Mobile phone number 5. Brief personal biography 6. Description of any demonstrations involved in presentation 7. Information on where the presentation material has or will be presented before Breakpoint * Preference will be given to presentations that contain original research that will be first presented at Breakpoint. * As a general guideline, Breakpoint presentations are between 45 and 60 minutes, including question time. If you have any questions about submissions, or would like to make a submission, please send an email to b...@ruxconbreakpoint.com .[x]. Speaker Benefits .[x]. Speakers at Breakpoint will be entitled to the following benefits: - A return economy airfare to Melbourne (total cost limit applies) - Three nights accommodation at the Intercontinental Rialto - Complimentary registration for Breakpoint and Ruxcon conferences - Invitation to all Breakpoint and Ruxcon parties - Unlock 'Presented on world's smallest continent' achievement * All speaker benefits apply to a single speaker per submission. .[x]. Contact .[x]. If you have any questions or inqueries, contact us at: * Email: b...@ruxconbreakpoint.com * Twitter: @ruxconbpx ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] GrrCON 2013: Grand Rapids, MI - Sept 12 -13
=== GrrCON '13 - Michigan Midwest Information Security Hacker CON CALL FOR PAPERS www.http://grrcon.org/cfp/ === -= GrrCON '13 -= September 12 13, 2013 -= Grand Rapids, MI -= Priority consideration will be given to submissions received before May 1st, 2013 ==[Overview]== GrrCON is an information security and hacking conference held annually in the Midwest. This conference was put together to provide the information security community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere. No egos, no rock stars, just a good time and good content. ==[Why GrrCON]== We offer three tracks, training, workshops, solutions arena, contests, an after party, and more to ensure you get the most out of the event. -= oh yea.. and FREE BEER and FOOD both days for EVERYBODY =As always we try to PAY our speakers as much as possible for speaking at GrrCON. Not all speakers or presentations are created equally, we hold to this ideal by varying the honorarium we provide. We also understand not all speakers can accept payment. Therefore, speakers can negotiate additional tickets in exchange for honorariums, subject to approval on an individual basis. Like everything we do, we’re flexible and want to ensure everybody (even our speakers) have a great time. If you have any thoughts or crazy negotiation ideas let us know. -= All accepted speakers will also receive a VIP Ticket for themselves to enjoy the rest of the conference = ==[Submit your CFP SOOON]== -= Call for papers will close on June 1st or when we have filled all available slots. -= Priority consideration will be given to submissions received before May 1st. -= Speaker announcements will be made in rounds, with the final round no later than July 5th, 2013 -= 25 or 50 minute presentations -= CFP Form is available at http://grrcon.org/cfp/ GrrCON attendees represent a BROAD section of Information Security community. We encourage both technical non-technical submissions on all aspects of security. If it’s interesting and related to InfoSec or Hacking it’s for GrrCON. More conference information, registration details, ect: http://www.GrrCON.org Follow Status on: www.twitter.com/GrrCON ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] hashdays 2012 - Call for Papers (#days CFP)
Call for Papers for hashdays'12 (#days) === Introduction hashdays is an international security technology and research conference offering both trainings/workshops and traditional presentation tracks. The event features many international IT security experts sharing their deep technical knowledge in an open environment and takes place October 31st to November 3rd, 2012 in Lucerne. The conference is unique in Switzerland and is organized by DEFCON Switzerland, a non-profit association registered as a Defcon Group (DC4131, http://www.defcon.org/html/defcon-groups/dc-groups-index.html) with the aim to give experts and professionals a platform to transfer insights into the information security domain and to sensitize users to information security topics. The official conference web site is located at: https://www.hashdays.ch. We are happy to announce that the CFP is now open and we are accepting interesting and innovative proposals for 50-minute talks. Please follow the following guide for submitting. Scope - In particular, we are looking for topics in the following domains: * Operating system and application security * Wired and wireless network security * Mobile communication security * Forensics and anti-forensics * Digital privacy and anonymous communication * Reverse engineering of software and hardware * Malware collection and analysis * Botnet analysis * Electronic voting * Industrial espionage / industrial control system security * Security metrics and visualization * Intrusion detection and prevention * Cloud computing security * Cryptography and security protocols * Biometric system security * Quantitative and model based IT risk management Submissions from academic and scientific institutions are welcome. Deadlines - Second submission round will end July 30 2012, 9pm CET. Notes of Acceptance will be delivered shortly after but no later than August 12 2012. Submission Guidelines - The submission package is assessed by the program committee and the author is notified on the outcome by electronic means. Your submission package must be delivered to c...@defcon-switzerland.org in non-proprietary electronic formats (ASCII preferred, PDF, OpenOffice if you can.t help it) and contain the following: Talk details: * Either: o a proposal of your intended talk with at maximum 400 words XOR o a full paper with a minimum of 6 and a maximum of 12 pages XOR o a slide deck with a maximum of 45 slides * 150 word abstract of the talk which will be displayed on our conference website * Rationale why your material is significant and should be presented * Information on whether this talk has been or will be presented elsewhere * Samples of other materials which might help to assess your submission (optional) * Links to your web presence, if relevant (optional) * What are the key messages in your talk and what will the audience learn from your talk Presenter details: * Your name and contact information * Location of residence * Country where the passport was issued * Name of employer and/or affiliations (optional) * 150 word biography of the speaker for use on our conference website * A photo of yourself which is shown along with your biography (optional) * List of previous significant talks (topic and name of conference) * List of publications * Name of employer and/or affiliations (if applicable) Speaker Benefits We offer the following benefits to accepted speakers: * Free admission for the two conference days (including lunches and coffee breaks) * Invitation to the complimentary speaker's dinner * Paid accommodation for two nights at the hotel where the conference takes place * Reimbursement of travel expenses in economy class up to a certain amount (depending on your location) Please note, that we are only able to reimburse travel expenses for one (1) person per presentation. Terms - The author of the content keeps his or her full rights on the submitted material. By submitting the CFP package the author agrees to the following terms: * You confirm that the material submitted is your own except for where explicit references to third-party works are made. * You confirm that you have obtained permission to use and distribute third-party content, like images. * You give permission to DEFCON Switzerland to publishing/distributing your material either in physical or electronic format without royalty. * You give permission to DEFCON Switzerland to create audio and video recordings of your presentation and publish/distribute these without royalty. * You agree that travel and accommodation expenses are reimbursed only upon successful delivery of your talk and upon presenting the receipts. * You agree to reading out a disclaimer to the audience at the beginning of your presentation if deemed necessary by DEFCON Switzerland. * You agree not to hold DEFCON Switzerland liable for any direct or indirect
[Full-disclosure] Breakpoint 2012 Call For Papers
. __ ._\\. Breakpoint 2012 (___. : Intercontinental Rialto : : Melbourne, Australia : : October 17th-18th : :__. ___: )\\ . www.ruxconbreakpoint.com www.twitter.com/ruxconbpx Introduction Breakpoint is a new security conference to be held on the 17th and 18th of October, in Melbourne Australia. The event will show case the work of expert security researchers from around the world on a wide range of topics. Breakpoint is organised by the Ruxcon conference team and will offer a specialised and more professional security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint will cater towards security researchers and industry professionals alike, with a focus on cutting edge security research. With just one day separating both conferences, Breakpoint presents a great opportunity for our selected speakers to receive a complimentary trip to Australia and experience both the Breakpoint and Ruxcon conferences, not to mention the great weather, awesome parties, and friendly people. Melbourne is Australia's cultural capital, with Victorian-era architecture, extensive shopping, museums, galleries, theatres, and large parks and gardens. It is a city of many subcultures, personalities and styles, and it is these layers that make it so interesting. Melbourne has a vibrant arts and music scene, eccentric cafes, cobbled lane-ways, quirky shops, intimate bars and restaurants, and is known as one of the world's great streetart capitals. Important Dates --- * May 10Call For Presentations Open * July30Call For Presentations Close * October 15-16 BreakPoint Training * October 17-18 BreakPoint Conference * October 20-21 Ruxcon Conference Topic Scope --- Topics of interest include, but are not limited to: o Mobile Device Security o Exploitation Techniques o Reverse Engineering o Vulnerability Discovery o Rootkit Development o Malware Analysis o Code Analysis o Virtualization, Hypervisor Security o Cloud Security o Embedded Device Security o Hardware Security o Telecommunications Security o Wireless Network Security o Web Application Security o Law Enforcement Activities o Forensics o Threat Intelligence o You get the idea Submission Guidelines - In order for us to process your submission we will require the following information: 1. Presentation title 2. Detailed summary of your presentation material 3. Name/Nickname 4. Mobile phone number 5. Brief personal biography 6. Description of any demonstrations involved in the presentation 7. Information on where the presentation material has or will be presented before Breakpoint * Preference will be given to presentations that contain original research that will be first presented at Breakpoint. * As a general guideline, BreakPoint presentations are between 45 and 60 minutes, including question time. If you have any enquiries about submissions, or would like to make a submission, please send an email to b...@ruxconbreakpoint.com Speaker Benefits Speakers at BreakPoint will be entitled to the following benefits: - A round trip economy airfare to Melbourne (total cost limit applies) - Three nights accommodation at the Intercontinental Rialto - Complementary registration for Breakpoint and Ruxcon conferences - Invitation to all BreakPoint and Ruxcon parties - Unlock 'Presented on world's smallest continent' achievement * All speaker benefits apply to a single speaker per submission. Contact --- If you have any questions or queries, contact us at: * Email:b...@ruxconbreakpoint.com * Twitter @ruxconbpx ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Ruxcon 2012 Call For Papers
Ruxcon 2012 Call For Papers The Ruxcon team is pleased to announce the call for papers for the 2012 annual Ruxcon conference. This year the conference will take place over the weekend of 20th and 21st of October at the CQ Function Centre, Melbourne, Australia. The deadline for submissions is the 15th of July. * What is Ruxcon? Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community. For more information, please visit http://www.ruxcon.org.au * Presentation Information Presentations are set to run for 40 to 50 minutes, and will be of a formal nature, with slides and a speech. * Topics Topics of interest include, but are not limited to: o Mobile Device Security o Virtualization, Hypervisor, and Cloud Security o Malware Analysis o Reverse Engineering o Exploitation Techniques o Rootkit Development o Code Analysis o Forensics and Anti-Forensics o Embedded Device Security o Web Application Security o Network Traffic Analysis o Wireless Network Security o Cryptography and Cryptanalysis o Social Engineering o Law Enforcement Activities o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) * Submissions Submissions should thoroughly outline your desired presentation subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentati...@ruxcon.org.au The deadline for submissions is the 15th of July. If approved we will additionally require: i. A brief personal biography (between 2-5 paragraphs in length). ii. A description on your presentation (between 2-5 paragraphs in length). * Contacts Email: presentati...@ruxcon.org.au Twitter: ruxcon ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] GrrCON 2012: Grand Rapids, MI - Sept 27-28
=== GrrCON '12 - Michigan Midwest Information Security Hacker CON CALL FOR PAPERS www.http://grrcon.org/speakers/ === -= GrrCON 2012 -= September 27 28, 2012 -= Grand Rapids, MI -= Priority consideration will be given to submissions received before May 1st, 2012 ==[Overview]== GrrCON is an information security and hacking conference held annually in the Midwest. This conference was put together to provide the information security community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere. We completely sold out in 2011 and have increased capacity in 2012. First round or speakers have already been announced. ==[GrrCON is DIFFERENT]== We are not JUST a Hacker Conference talking about pen testing and exploits NOR are we JUST an Information Security Conference discussing risk and strategy. GrrCON is unique in we have significant portions DEDICATED to both. We bring together the CISO, the hacker, the security practitioner, and the researcher in an intimate one-of-a-kind experience you CANNOT get elsewhere. We’ve taken ideas from all the major security conferences and put the best ones into GrrCON to provide the most value to our attendees. Whether you are a Fortune 500 executive, security researcher, security industry professional, student, or a hacker of “flexible” morals you will find something for you at GrrCON. ==[Why GrrCON]== We offer two tracks, training, workshops, solutions arena, Bsides, contests, an after party, and more to ensure you get the most out of the event. -= oh yea.. and FREE BEER and FOOD both days for EVERYBODY = -= As always we try to PAY our speakers as much as possible for speaking at GrrCON = Not all speakers or presentations are created equally, we hold to this ideal by varying the honorarium we provide. -= For example, in 2011 the honorariums we paid out ranged from $200 to over $4,000 per speaker = We also understand not all speakers can accept payment. Therefore, speakers can negotiate additional tickets in exchange for honorariums, subject to approval on an individual basis. Like everything we do, we’re flexible and want to ensure everybody (even our speakers) have a great time. If you have any thoughts or crazy negotiation ideas let us know. -= All accepted speakers will also receive a VIP Ticket for themselves to enjoy the rest of the conference = ==[Submit your CFP SOOON]== -= Call for papers will close on June 1st or when we have filled all available slots. -= Priority consideration will be given to submissions received before May 1st. -= Speaker announcements will be made in rounds, with the final round no later than July 5th, 2012 -= 25 or 50 minute presentations -= CFP Form is available at http://grrcon.org/speakers/cfp/ GrrCON attendees represent a BROAD section of Information Security community. We encourage both technical non-technical submissions on all aspects of security. We’re looking for talks about information security, hacking, regulatory compliance, risk mitigation, application security, web security, privacy issues, database hacking, criminal law, civil law, hardware hacking, BCP, exploit development, your grandmothers cookie recipe, cyber _fill in the blank_ (or any other hacker fantasy), malware, ect… If it’s interesting and related to InfoSec or Hacking it’s for GrrCON. Absolutely NO SALES presentations will be accepted. More conference information, registration details, ect: http://www.GrrCON.org Follow Status on: www.twitter.com/GrrCON ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Only 7 Days Left: SANS AppSec 2012 CFP
Hi everyone, This is the final CFP reminder for SANS AppSec 2012 being held in Las Vegas, Nevada on April 30 - May 1, 2012. The call for papers ends in seven days on February 1, 2012 so submit today! The theme for this conference is Application Security at Scale. Billions of records in the cloud. Millions of smart mobile devices. Millions of developers writing new code. Hundreds of apps in your enterprise. Untold numbers of existing bugs. Unknown numbers of sophisticated attackers exploiting your software. What cutting edge techniques are attackers using? How do large enterprises handle these problems at scale? And how do small companies manage it all with fewer resources? We invite you to submit presentations in the following areas: - Cloud Security - Mobile Security - Security in the SDLC - Secure Coding - Security Architecture - Securing Legacy Applications - Securing Open Source Frameworks - Program Development - Security Metrics - Security Testing - Penetration Testing - Cutting Edge Attacks - Cutting Edge Defense - Case Studies - Any topic related to Application Security Submission Deadline February 1, 2012 Submit papers via EasyChair (account required). Talks will be 45-50 minutes in length. https://www.easychair.org/conferences/?conf=sansappsec2012 For additional information please visit the conference web site or contact us via email. https://www.sans.org/appsec-2012/ callforpapers-app...@sans.org Please forward to anyone who might be interested in speaking. Thanks! The SANS AppSec 2012 Team ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] SANS AppSec 2012 CFP reminder
Hi everyone, It's been over a month since we first announced the CFP for the SANS AppSec Summit being held in Las Vegas, Nevada on April 30 - May 1, 2012. We've received a number of great submissions so far but there's only two months left until the deadline on February 1, 2012. If you'd like to speak please get your submission in as soon as possible. Hope to see you in Vegas! The theme for this conference is Application Security at Scale. Billions of records in the cloud. Millions of smart mobile devices. Millions of developers writing new code. Hundreds of apps in your enterprise. Untold numbers of existing bugs. Unknown numbers of sophisticated attackers exploiting your software. What cutting edge techniques are attackers using? How do large enterprises handle these problems at scale? And how do small companies manage it all with fewer resources? We invite you to submit presentations in the following areas: - Cloud Security - Mobile Security - Security in the SDLC - Secure Coding - Security Architecture - Securing Legacy Applications - Securing Open Source Frameworks - Program Development - Security Metrics - Security Testing - Penetration Testing - Cutting Edge Attacks - Cutting Edge Defense - Case Studies - Any topic related to Application Security Submission Deadline February 1, 2012 Submit papers via EasyChair (account required). Talks will be 50 minutes in length. https://www.easychair.org/conferences/?conf=sansappsec2012 For additional information please visit the conference web site or contact us via email. https://www.sans.org/appsec-2012/ callforpapers-app...@sans.org Please forward to anyone who might be interested in speaking. Thanks! The SANS AppSec 2012 Team ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] SANS AppSec 2012 CFP is Open
Hi everyone, We're happy to announce that the sixth annual SANS AppSec Summit will be held in Las Vegas, Nevada on April 30 - May 1, 2012. The theme for this conference is Application Security at Scale. Billions of records in the cloud. Millions of smart mobile devices. Millions of developers writing new code. Hundreds of apps in your enterprise. Untold numbers of existing bugs. Unknown numbers of sophisticated attackers exploiting your software. What cutting edge techniques are attackers using? How do large enterprises handle these problems at scale? And how do small companies manage it all with fewer resources? We invite you to submit presentations in the following areas: - Cloud Security - Mobile Security - Security in the SDLC - Secure Coding - Security Architecture - Securing Legacy Applications - Securing Open Source Frameworks - Program Development - Security Metrics - Security Testing - Penetration Testing - Cutting Edge Attacks - Cutting Edge Defense - Case Studies - Any topic related to Application Security Submission Deadline February 1, 2012 Submit papers via EasyChair (account required). Talks will be 50 minutes in length. https://www.easychair.org/conferences/?conf=sansappsec2012 For additional information please visit the conference web site or contact us via email. https://www.sans.org/appsec-2012/ callforpapers-app...@sans.org Please forward to anyone who might be interested in speaking. Thanks! The SANS AppSec 2012 Team ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Ruxcon 2011 Final Call For Papers
Ruxcon 2011 Final Call For Papers The Ruxcon team is pleased to announce the final call for papers for the seventh annual Ruxcon conference. This year the conference will take place over the weekend of 19th and 20th of November at the CQ Function Centre, Melbourne, Australia. The deadline for submissions is the 15th of October. * What is Ruxcon? Ruxcon is the premier technical computer security conference in the Australia-Pacific region. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community. For more information, please visit http://www.ruxcon.org.au * Presentation Information Presentations are set to run for 50 minutes, and will be of a formal nature, with slides and a speech. * Presentation Submissions Ruxcon would like to invite people who are interested in security to submit a presentation. Topics of interest include, but are not limited to: o Mobile Device Security o Virtualization, Hypervisor, and Cloud Security o Malware Analysis o Reverse Engineering o Exploitation Techniques o Rootkit Development o Code Analysis o Forensics and Anti-Forensics o Embedded Device Security o Web Application Security o Network Traffic Analysis o Wireless Network Security o Cryptography and Cryptanalysis o Social Engineering o Law Enforcement Activities o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) Submissions should thoroughly outline your desired presentation subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentations () ruxcon org au The deadline for submissions is the 15th of October. If approved we will additionally require: i. A brief personal biography (between 2-5 paragraphs in length). ii. A description on your presentation (between 2-5 paragraphs in length). * Contact Details Presentation Submissions: presentations () ruxcon org au ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Extended: hashdays 2011 - Call for Papers (#days CFP)
Hi, Due to many request #days the Swiss conference for security, extends its call for papers (CFP) deadline until July 17th 2011. For details regarding the submission guidelines see: https://www.hashdays.ch/call-for-papers.html Here is why you'd really enjoy presenting at the #days conference: - We already have a rather impressive line-up of announced speakers: https://www.hashdays.ch/agenda/ - There will be a speakers dinner. But remember... you should be able to present your talk somehow the following day :-) And why you need to visit the conference: - Early development versions of the conference badge look really promising: https://www.hashdays.ch/badge.html - Early bird tickets are still available for a short period of time: https://www.hashdays.ch/registration/ - And there will be free Club Mate - as long as our stock lasts! If you would like to support the conference as a sponsor we can offer attractive sponsoring opportunities. For details please contact: sponsor...@defcon-switzerland.org Cheers, The #days organization committee ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Ruxcon 2011 Call For Papers
Ruxcon 2011 Call For Papers The Ruxcon team is pleased to announce the call for papers for the seventh annual Ruxcon conference. This year the conference will take place over the weekend of 19th and 20th of November at the CQ Function Centre, Melbourne, Australia. The deadline for submissions is the 30th of July. * What is Ruxcon? Ruxcon is the premier technical computer security conference in the Australia-Pacific region. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community. For more information, please visit http://www.ruxcon.org.au * Presentation Information Presentations are set to run for 50 minutes, and will be of a formal nature, with slides and a speech. * Presentation Submissions Ruxcon would like to invite people who are interested in security to submit a presentation. Topics of interest include, but are not limited to: o Mobile Device Security o Virtualization, Hypervisor, and Cloud Security o Malware Analysis o Reverse Engineering o Exploitation Techniques o Rootkit Development o Code Analysis o Forensics and Anti-Forensics o Embedded Device Security o Web Application Security o Network Traffic Analysis o Wireless Network Security o Cryptography and Cryptanalysis o Social Engineering o Law Enforcement Activities o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) Submissions should thoroughly outline your desired presentation subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentations () ruxcon org au The deadline for submissions is the 30th of July. If approved we will additionally require: i. A brief personal biography (between 2-5 paragraphs in length). ii. A description on your presentation (between 2-5 paragraphs in length). * Contact Details Presentation Submissions: presentations () ruxcon org au ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] hashdays 2011 - Call for Papers (#days CFP)
Call for Paper for hashdays 2011 (#days) Introduction Hashdays is an international security technology and research conference which is preceded by several 2-day workshops delivering IT security training. The event features many international IT security experts sharing their deep technical knowledge in an open environment and takes place October 26th to 29th, 2011 in Lucerne. The conference is unique in Switzerland and is organized by DEFCON Switzerland, a non-profit association with the aim to give experts and professionals a platform to transfer insights into the information security domain and to sensitize users to information security topics. The official conference web site is located at: https://www.hashdays.ch. The Call For Paper (CFP) is now open and we are accepting interesting innovative proposals for 50-minute talks. Please follow the following guide for submitting. Scope - In particular, we are looking for topics in the following domains: * Operating system and application security * Wired and wireless network security * Mobile communication security * Forensics and anti-forensics * Digital privacy and anonymous communication * Reverse engineering of software and hardware * Malware collection and analysis * Botnet analysis * Electronic voting * Security metrics and visualization * Intrusion detection and prevention * Cloud computing security * Cryptography and security protocols * Biometric system security * Quantitative and model based IT risk management Submissions from academic and scientific institutions are welcome. Deadlines - * Submission of package until: Sunday, July 3rd, 2011 * Latest notification date: Sunday, August 28th, 2011 Submission Guidelines - The submission package is assessed by the program committee and the author is notified on the outcome by electronic means. Your submission package must be delivered in non-proprietary electronic formats (e.g. PDF, OpenOffice) and contain the following: Talk details: * Either: o a proposal of your intended talk with at maximum 400 words XOR o a full paper with a minimum of 6 and a maximum of 12 pages XOR o a slide deck with a maximum of 45 slides * 150 word abstract of the talk which will be displayed on our conference website * Rationale why your material is significant and should be presented * Information on whether this talk has been or will be presented elsewhere * Samples of other materials which might help to assess your submission (optional) * Links to your web presence, if relevant (optional) Presenter details: * Your name and contact information * Location of residence * Country where the passport was issued * Name of employer and/or affiliations (optional) * 150 word biography of the speaker for use on our conference website * A photo of yourself which is shown along with your biography (optional) * List of previous significant talks (topic and name of conference) * List of publications To submit your CFP, put all the requested information into an archive and send it by e-mail to c...@defcon-switzerland.org. Speaker Benefits We offer the following benefits to accepted speakers: * Free admission for the two conference days (including lunches and coffee breaks) * Invitation to the complimentary speaker's dinner * Paid accommodation for two nights at the hotel where the conference takes place * Reimbursement of travel expenses in economy class up to a certain amount However, we can reimburse travel and accommodation for one person per talk only. Terms - The author of the content keeps his or her full rights on the submitted material. By submitting the CFP package the author agrees to the following terms: * You confirm that the material submitted is your own except for where explicit references to third-party works are made. * You confirm that you have obtained permission to use and distribute third-party content, like images. * You give permission to DEFCON Switzerland to publishing/distributing your material either in physical or electronic format without royalty. * You give permission to DEFCON Switzerland to create audio and video recordings of your presentation and publish/distribute these without royalty. * You agree that travel and accommodation expenses are reimbursed only upon successful delivery of your talk and upon presenting the receipts. * You agree to reading out a disclaimer to the audience at the beginning of your presentation if deemed necessary by DEFCON Switzerland. * You agree not to hold DEFCON Switzerland liable for any direct or indirect damages or costs in case the event is cancelled. Sponsoring -- If you like our conference, you can support us by sponsoring. We offer attractive sponsoring opportunities. For details please contact: sponsor...@defcon-switzerland.org. Thank you and best regards, #days organizing committee
[Full-disclosure] Ruxcon 2010 Final Call For Papers
RUXCON 2010 FINAL CALL FOR PAPERS Ruxcon would like to announce the final call for papers for the sixth annual Ruxcon conference. This year the conference will take place over the weekend of 20th and 21st of November. Ruxcon will be held at CQ, Melbourne, Australia. The deadline for submissions is the 10th of October. What is Ruxcon? Ruxcon is the premiere technical computer security conference within Australia. Ruxcon aspires to bring together the individual talents of the best and the brightest security folk within the Aus-Pacific region, through live presentations, activities, and demonstrations. Ruxcon's unique approach to running a security conference ensures that the conference is accessible to all levels of the security industry. Ruxcon aims to be the most interesting, thought provoking, and relevant information security conference in Australia. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community. For more information, please visit http://www.ruxcon.org.au Presentation Information Presentations will be 50 minutes in length, and should be fully supplemented with slides and any other relevant material. Presentation Submissions Ruxcon would like to invite people who are interested to submit a presentation. Topics of interest include, but are not limited to:    * Mobile Device Security    * Virtualisation, Hypervisor and Cloud Security    * Malware Analysis    * Reverse Engineering    * Exploitation Techniques    * Rootkit Development    * Code Analysis    * Forensics and Anti-Forensics    * Embedded Device Security    * Web Application Security    * Network Traffic Analysis    * Wireless Network Security    * Cryptography and Cryptanalysis    * Social Engineering    * Law Enforcement Activities    * Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) Submissions should thoroughly outline your desired presentation subject. Accompanying your submission should be the slides you intend to use or a detailed paper explaining your subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentati...@ruxcon.org.au. The deadline for submissions is the 10th of October. If approved we will additionally require:   1. A brief personal biography (between 2-5 paragraphs in length).   2. A description on your presentation (between 2-5 paragraphs in length). Contact Details Presentation Submissions: presentati...@ruxcon.org.au General Enquiries: rux...@ruxcon.org.au ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] hashdays 2010 - Call for Papers (#days CFP)
Hi #days the Swiss conference for security, extends its call for papers (CFP) deadline until July 25th 2010. For details regarding the submission guidelines see: https://www.hashdays.ch/call-for-papers.html Furthermore, we herewith proudly announce our #days workshops: 1) Protecting from GSM attacks with Harald Welte, Karsten Nohl and David Burgess: This two-day workshop revisits the basics of GSM, SS7, and OTA before discussing their control and trust mechanics. It will become apparent that technology providers and attackers can invade GSM users' location and communication privacy in multiple ways. The workshop is targeted at GSM users concerned with the confidentiality of their information and location. The class provides technical and organizational protection strategies for minimizing the attack surface and mitigating the risks of the telecommunication infrastructure. 2) Exploit Laboratory with Saumil Shah: The workshop brings you an action packed class teaching the art of exploitation from scratch. We start with an insight into system architecture, process execution, operating systems and error conditions. We then accelerate to using debuggers, reproducing reliable error conditions and exploit writing. Most of the class time is spent working on exercises that cover both the Linux and Windows, illustrating stack overflows, heap overflows and memory overwrites. The class is delivered in a down-to-earth, learn-by-example methodology. The early bird for both workshops lasts until July 25th, 2010. For details and registration see: https://www.hashdays.ch/workshop.html Best regards, The #days organization committee On 24.04.10 15:51, hashdays CFP wrote: Call for Paper for hashdays 2010 (#days) Introduction Hashdays is an international security technology and research conference which is preceded by several 2-day workshops delivering IT security training. The event features many international IT security experts sharing their deep technical knowledge in an open environment and takes place November 3rd to 6th, 2010 in Lucerne. The conference is the first of its kind in Switzerland and is organized by DEFCON Switzerland, a non-profit association with the aim to give experts and professionals a platform to transfer insights into the information security domain and to sensitize users to information security topics. The official conference web site is located at: https://www.hashdays.ch. The Call For Paper (CFP) is now open and we are accepting interesting innovative proposals for 50-minute talks. Scope - In particular, we are looking for topics in the following domains: * Operating system and application security * Wired and wireless network security * Mobile communication security * Forensics and anti-forensics * Digital privacy and anonymous communication * Reverse engineering of software and hardware * Malware collection and analysis * Botnet analysis * Electronic voting * Security metrics and visualization * Intrusion detection and prevention * Cloud computing security * Cryptography and security protocols * Biometric system security * Quantitative and model based IT risk management Submissions from academic and scientific institutions are welcome. Deadlines - * Submission of package until: Sunday, July 4, 2010 * Latest acceptance notification date: Sunday, August 29, 2010 Submission Guidelines - The submission package is assessed by the program committee and the author is notified on the outcome by electronic means. Your submission package must be delivered in non-proprietary electronic formats (e.g. PDF, OpenOffice) and contain the following: Talk details: * Either: - a proposal of your intended talk with at maximum 400 words XOR - a full paper with a minimum of 6 and a maximum of 12 pages XOR - a slide deck with a maximum of 45 slides * 150 word abstract of the talk which will be displayed on our conference website * Rationale why your material is significant and should be presented * Information on whether this talk has been or will be presented elsewhere * Samples of other materials which might help to assess your submission (optional) * Links to your web presence, if relevant (optional) Presenter details: * Your name and contact information * Location of residence * Country where the passport was issued * Name of employer and/or affiliations (optional) * 150 word biography of the speaker for use on our conference website * A photo of yourself which is shown along with your biography (optional) * List of previous significant talks (topic and name of conference) * List of publications To submit your CFP, put all the requested information into an archive and send it by e-mail to c...@defcon-switzerland.org. Speaker Benefits We offer the following benefits to accepted speakers
[Full-disclosure] hashdays 2010 - Call for Papers (#days CFP)
Call for Paper for hashdays 2010 (#days) Introduction Hashdays is an international security technology and research conference which is preceded by several 2-day workshops delivering IT security training. The event features many international IT security experts sharing their deep technical knowledge in an open environment and takes place November 3rd to 6th, 2010 in Lucerne. The conference is the first of its kind in Switzerland and is organized by DEFCON Switzerland, a non-profit association with the aim to give experts and professionals a platform to transfer insights into the information security domain and to sensitize users to information security topics. The official conference web site is located at: https://www.hashdays.ch. The Call For Paper (CFP) is now open and we are accepting interesting innovative proposals for 50-minute talks. Scope - In particular, we are looking for topics in the following domains: * Operating system and application security * Wired and wireless network security * Mobile communication security * Forensics and anti-forensics * Digital privacy and anonymous communication * Reverse engineering of software and hardware * Malware collection and analysis * Botnet analysis * Electronic voting * Security metrics and visualization * Intrusion detection and prevention * Cloud computing security * Cryptography and security protocols * Biometric system security * Quantitative and model based IT risk management Submissions from academic and scientific institutions are welcome. Deadlines - * Submission of package until: Sunday, July 4, 2010 * Latest acceptance notification date: Sunday, August 29, 2010 Submission Guidelines - The submission package is assessed by the program committee and the author is notified on the outcome by electronic means. Your submission package must be delivered in non-proprietary electronic formats (e.g. PDF, OpenOffice) and contain the following: Talk details: * Either: - a proposal of your intended talk with at maximum 400 words XOR - a full paper with a minimum of 6 and a maximum of 12 pages XOR - a slide deck with a maximum of 45 slides * 150 word abstract of the talk which will be displayed on our conference website * Rationale why your material is significant and should be presented * Information on whether this talk has been or will be presented elsewhere * Samples of other materials which might help to assess your submission (optional) * Links to your web presence, if relevant (optional) Presenter details: * Your name and contact information * Location of residence * Country where the passport was issued * Name of employer and/or affiliations (optional) * 150 word biography of the speaker for use on our conference website * A photo of yourself which is shown along with your biography (optional) * List of previous significant talks (topic and name of conference) * List of publications To submit your CFP, put all the requested information into an archive and send it by e-mail to c...@defcon-switzerland.org. Speaker Benefits We offer the following benefits to accepted speakers: * Free admission for the two conference days (including lunches and coffee breaks) * Invitation to the complimentary speaker's dinner * Paid accommodation for two nights at the hotel where the conference takes place * Reimbursement of travel expenses in economy class up to a certain amount However, we can reimburse travel and accommodation for one person per talk only. Terms - The author of the content keeps his or her full rights on the submitted material. By submitting the CFP package the author agrees to the following terms: * You confirm that the material submitted is your own except for where explicit references to third-party works are made. * You confirm that you have obtained permission to use and distribute third-party content, like images. * You give permission to DEFCON Switzerland to publishing/distributing your material either in physical or electronic format without royalty. * You give permission to DEFCON Switzerland to create audio and video recordings of your presentation and publish/distribute these without royalty. * You agree that travel and accommodation expenses are reimbursed only upon successful delivery of your talk and upon presenting the receipts. * You agree to reading out a disclaimer to the audience at the beginning of your presentation if deemed necessary by DEFCON Switzerland. * You agree not to hold DEFCON Switzerland liable for any direct or indirect damages or costs in case the event is canceled. Sponsoring -- If you like our conference, you can support us by sponsoring. We offer attractive sponsoring opportunities. For details please contact: sponsor...@defcon-switzerland.org. Thank you and best regards, #days organizing committee
[Full-disclosure] Ruxcon 2010 Call For Papers
RUXCON 2010 CALL FOR PAPERS Ruxcon would like to announce the call for papers for the sixth annual Ruxcon conference. This year the conference will take place over the weekend of 4th and 5th of December. Ruxcon will be held at the Royal Melbourne Institute of Technology (RMIT), Melbourne, Australia. The deadline for submissions is the 30th of July. * What is Ruxcon? Ruxcon is the premiere technical computer security conference within Australia. Ruxcon aspires to bring together the individual talents of the best and the brightest security folk within the Aus-Pacific region, through live presentations, activities, and demonstrations. Ruxcon's unique approach to running a security conference ensures that the conference is accessible to all levels of the security industry. Ruxcon aims to be the most interesting, thought-provoking, and relevant information security conference in Australia. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community. For more information, please visit http://www.ruxcon.org.au * Presentation Information Presentations are set to run for 50 minutes, and will be of a formal nature, with slides and a speech. * Presentation Submissions Ruxcon would like to invite people who are interested in security to submit a presentation. Topics of interest include, but are not limited to: o Mobile Device Security o Virtualization, Hypervisor, and Cloud Security o Malware Analysis o Reverse Engineering o Exploitation Techniques o Rootkit Development o Code Analysis o Forensics and Anti-Forensics o Embedded Device Security o Web Application Security o Network Traffic Analysis o Wireless Network Security o Cryptography and Cryptanalysis o Social Engineering o Law Enforcement Activities o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) Submissions should thoroughly outline your desired presentation subject. Accompanying your submission should be the slides you intend to use or a detailed paper explaining your subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentations () ruxcon org au The deadline for submissions is the 30th of July. If approved we will additionally require: i. A brief personal biography (between 2-5 paragraphs in length). ii. A description on your presentation (between 2-5 paragraphs in length). * Contact Details Presentation Submissions: presentations () ruxcon org au ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] RUXCON 2008 Final Call For Papers
RUXCON 2008 FINAL CALL FOR PAPERS Ruxcon would like to announce the final call for papers for the fifth annual Ruxcon conference. This year the conference will take place over the weekend of 29th to the 30th of November. As with previous years, Ruxcon will be held at the University of Technology, Sydney, Australia. The deadline for submissions is the 15th of November. * What is Ruxcon? Ruxcon strives to be Australia's most technical and interesting computer security conference. We're back for the fifth year and intend on bringing you another high quality conference. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from unpublished research to required reading for the public security community. For more information, please visit http://www.ruxcon.org.au * Presentation Information Presentations are set to run for 50 minutes, and will be of a formal nature, with slides and a speech. * Presentation Submissions Ruxcon would like to invite people who are interested in security to submit a presentation. Topics of interest include, but are not limited to: o Code analysis o Exploitation techniques o Network scanning and analysis o Cryptography o Malware Analysis o Reverse engineering o Forensics and Anti-forensics o Social engineering o Web application security o Database security o Legal aspects of computer security and surrounding issues o Law enforcement activities o Telecommunications security (mobile, GSM, VOIP, etc.) Submissions should thoroughly outline your desired presentation subject. Accompanying your submission should be the slides you intend to use or a detailed paper explaining your subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentations @ ruxcon dot org dot au The deadline for submissions is the 15th of November. If approved we will additionally require: i. A brief personal biography (between 2-5 paragraphs in length), including: skill set, experience, and credentials. ii. A description on your presentation or workshop (between 2-5 paragraphs in length). * Contact Details Presentation Submissions: presentations @ ruxcon dot org dot au General Enquiries: staff @ ruxcon dot org dot au ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] RUXCON 2008 CALL FOR PAPERS
RUXCON 2008 CALL FOR PAPERS RuxCon would like to announce the call for papers for the fifth annual RuxCon conference. This year the conference will commence during the 29th/30th November. As with previous years, RuxCon will be held at the University of Technology, Sydney, Australia. The deadline for submissions is the 31st of October. * What is RuxCon? RuxCon strives to be Australia's most technical and interesting computer security conference. We're back for the fifth year and intend on bringing you another high quality conference. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from unpublished research to required reading for the public security community. For more information, please visit http://www.ruxcon.org.au * Presentation Information Presentations are set to run for 50 minutes, and will be of a formal nature, with slides and a speech. * Presentation Submissions RuxCon would like to invite people who are interested in security to submit a presentation. Topics of interest include, but are not limited to: o Code analysis o Exploitation techniques o Network scanning and analysis o Cryptography o Malware Analysis o Reverse engineering o Forensics and Anti-forensics o Social engineering o Web application security o Database security o Legal aspects of computer security and surrounding issues o Law enforcement activities o Telecommunications security (mobile, GSM, VOIP, etc) Submissions should thoroughly outline your desired presentation or workshop subject. Accompanying your submission should be the slides you intend to use or a detailed paper explaining your subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to presentations @ ruxcon dot org dot au The deadline for submissions is the 31st of October. If approved we will additionally require: i. A brief personal biography (between 2-5 paragraphs in length), including: skill set, experience, and credentials. ii. A description on your presentation or workshop (between 2-5 paragraphs in length). * Contact Details Presentation Submissions: presentations @ ruxcon dot org dot au General Enquiries: staff @ ruxcon dot org dot au ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Ruxcon 2006
Hi, RUXCON 2006 will be held this weekend over the 30th of September to the 1st of October at the University of Technology, Sydney. Doors will open at 8:30am and the first presentation commences at 9:30am. Our presentation list is complete. RUXCON 2006 Presentations [1]: 1. Java Class Deobfuscation - Chris Mitchell 2. Mechanics of the Objective-C Trifecta - Reversing, Runtime Antics, Exploit Development - Neil Archibald 3. Exploiting OpenBSD - Ben Hawkes 4. Anti-Forensic Rootkits - Darren Bilby 5. Access over Ethernet: Insecurites in AoE - Morgan Marquis-Boire 6. Attacks Against RFID - Josh Perrymon 7. Unusual Bugs - Ilja van Sprundel 8. A Quantitive Time Series Analysis of Malware and Vulnerability Trends - Craig Wright 9. IPv6: Under the Hood - Mark Dowd 10. Software Vulnerabilities - Daniel Hodson 11. PE Packers Used in Malicious Software - Paul Craig 12. Web Services: Teaching a New Dog Old Tricks - Daniel Grzelak, Colin Wong 13. Bypassing Corporate Email Filtering - Simon Howard 14. Hit By A Bus: Physical Access Attacks with Firewire - Adam Boileau 15. Metafuzz: Building Boring Fuzzers Faster, Using Metadata - Ben Nagy 16. Dynamic Port Scanning - AR, HK 17. The Common Vulnerability Scoring System (CVSS) - Christian Heinrich 18. Ajax Security - Andrew van der Stock As in previous years, there will be activities and competitions, which allow attendees to have fun, win prizes, and socialise, all while enjoying a cold beer on an Australian summers day. Some activities which will be held during the conference include: * Capture the flag competition * Exploit development competition * Chilli eatoff competition This will be the fourth year in a row in which we've brought a quality conference to the Australian computer security community. Hope to see you there, Regards, RUXCON Staff http://www.ruxcon.org.au [1] http://www.ruxcon.org.au/presentations.shtml ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] RUXCON 2006 Call for Papers
RUXCON 2006 CALL FOR PAPERS RuxCon would like to announce the call for papers for the fourth annual RuxCon conference. This year the conference will commence during the 30th of September and the 1st of October, over the long weekend. As with previous years, RuxCon will be held at the University of Technology, Sydney, Australia. The deadline for submissions is the 31st of August. * What is RuxCon? RuxCon strives to be Australia's most technical and interesting computer security conference. We're back for the fourth year running and intend on bringing you another high quality conference. The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from unpublished research to required reading for the public security community. For more information, please visit http://www.ruxcon.org.au * Presentation Information Presentations are set to run for 50 minutes, and will be of a formal nature, with slides and a speech. * Presentation Submissions RuxCon would like to invite people who are interested in security to submit a presentation. Topics of interest include, but are not limited to: o Code analysis o Exploitation techniques o Network scanning and analysis o Cryptography o Malware Analysis o Reverse engineering o Forensics and Anti-forensics o Social engineering o Web application security o Legal aspects of computer security and surrounding issues o Law enforcement activities o Telecommunications security (mobile, GSM, fraud issues, etc.) Submissions should thoroughly outline your desired presentation or workshop subject. Accompanying your submission should be the slides you intend to use or a detailed paper explaining your subject. If you have any enquiries about submissions, or would like to make a submission, please send an e-mail to [EMAIL PROTECTED] The deadline for submissions is the 31st of August. If approved we will additionally require: i. A brief personal biography (between 2-5 paragraphs in length), including: skill set, experience, and credentials. ii. A description on your presentation or workshop (between 2-5 paragraphs in length). * Contact Details Presentation Submissions: [EMAIL PROTECTED] General Enquiries: [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/