[Full-disclosure] InfoSec Southwest 2014 CFP now open!

2013-12-18 Thread ISSW CFP
Hi computer enthusiasts!

I'm delighted to announce this year's call for papers for ISSW 2014 is
open now through 11:59:59 CST, February 1, 2014.

ISSW 2014 will be held in downtown Austin, Texas, USA, from Friday,
April 4 through Sunday, April 6th. Yes, this is well after SXSW, so
all the out-of-towner hipsters should be long gone. You'll still be
free to experience our usual complement of locally-raised hipsters.

Details on the CFP are here:

http://2014.infosecsouthwest.com/cfp.html

Once you've confirmed you've hit the requirements listed there, please
send your material to:

c...@infosecsouthwest.com

Good luck!


--
Tod Beardsley, ISSW 2014 CFP Chair
t...@metasploit.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Ruxcon 2013 Final Call For Papers

2013-07-14 Thread cfp
Ruxcon 2013 Final Call For Papers
Melbourne, Australia, October 26th-27th
CQ Function Centre
http://www.ruxcon.org.au/call-for-papers/


The Ruxcon team is pleased to announce the final call for papers for Ruxcon.

This year the conference will take place over the weekend of the 26th and 27th 
of October at the CQ Function Centre, Melbourne, Australia.

The deadline for submissions is the 31st of August.


.[x]. About Ruxcon .[x]. 

 Ruxcon is ia premier technical computer security conference in the Australia. 
 The conference aims to bring together the individual talents of the best and 
 brightest security folk in the region, through live presentations, activities 
 and demonstrations.

 The conference is held over two days in a relaxed atmosphere, allowing 
 attendees to enjoy themselves whilst networking within the community and 
 expanding their knowledge of security.

 For more information, please visit the http://www.ruxcon.org.au


.[x]. Important Dates .[x].

 August 31 - Call For Presentations Close
 October 26-27 - Ruxcon Conference


.[x]. Topic Scope .[x].

 o Topics of interest include, but are not limited to:
 o Mobile Device Security
 o Virtualization, Hypervisor, and Cloud Security
 o Malware Analysis
 o Reverse Engineering
 o Exploitation Techniques
 o Rootkit Development
 o Code Analysis
 o Forensics and Anti-Forensics
 o Embedded Device Security
 o Web Application Security
 o Network Traffic Analysis
 o Wireless Network Security
 o Cryptography and Cryptanalysis
 o Social Engineering
 o Law Enforcement Activities
 o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)


.[x]. Submission Guidelines .[x].

In order for us to process your submission we require the following information:

 1. Presentation title
 2. Detailed summary of your presentation material
 3. Name/Nickname
 4. Mobile phone number
 5. Brief personal biography
 6. Description of any demonstrations involved in the presentation
 7. Information on where the presentation material has or will be presented 
before Ruxcon

* As a general guideline, Ruxcon presentations are between 45 and 60 minutes, 
  including question time. 
 
 If you have any enquiries about submissions, or would like to make a 
 submission, please send an email to presentati...@ruxcon.org.au

 The deadline for submissions is the 31st of August.


.[x]. Contact .[x].

 o Email: presentati...@ruxcon.org.au
 o Twitter: @ruxcon

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Ground Zero Summit - Call For Papers

2013-07-10 Thread submit cfp
Hi All,

Ground Zero Infosec Summit is an initiative of independent apex
not-for-profit body and is an outcome of an alliance between industry and
Government of India to tackle emerging cyber security threats against
critical information infrastructure. The summit is supported by the Govt.
of India.

Call for Papers and workshops is open for Ground Zero Summit. We expect
quality papers with highly technical research in the field of information
security. At Ground zero summit it is our endeavour to promote new and
interesting ideas that will change the outlook of information security.
Hence we have decided to reward new research with an honorarium of USD 500
in addition to the speaker benefits. Please read the CFP below for details
on the speaker benefits and the format of submission.

*Tracks and relevant submissions*
G0S will be a triple track conference and we are looking for paper
submissions under any one of the tracks.

*1. Systems Track* (OS/Systems/Application/Hardware)
- OS exploitation
- Application hacking
- Rootkits and Malware
- Forensics and Anti-forensics
- SCADA security and exploitation
- Telecom equipment security and exploitation
- Embedded device/hardware security and exploitation
- Malware on the mobile platform – Android, Windows OS, Symbian
- Mobile Application Security

*2. Communications Track* (Communication and Networks)
- Protocol exploitation and security
- Botnet communication, CC and takedowns
- Web hacking
- Radio communication hacking
- GSM/3G/LTE/5G networks – security and exploitation
- Satellite communication hacking
- Network security
- Intrusion prevention (and evasion) techniques
- APT prevention (and evasion) techniques
- Replacing network Security with “Intelligent, self automated Networks”
- Growth of Mobile Data Networks with repercussions for the same

*3. Strategy Track* (Gov/GRC/Cyber warfare/CII)
- GRC
- Privacy
- Social media in context of security and Privacy
- Surveillance
- Auditing
- New age Cyber warfare/Cyber intelligence/Cyber terrorism/Cyber crimes
- Upcoming information security trends
- Critical infrastructure Protection
- Cyber security in context of the Govt.
- Global Cyber Diplomacy
- IT Act 2008 in light of Prism Surveillance
- Security VS privacy
- Evolving role of CERT to protect country’s citizens against external and
internal intrusions
- Repercussions of PRISM surveillance leak on Social Media

*Paper Presentation*
1. Talk duration: 1 Hr including QA
2. Paper has to be innovative.

*Workshops*
1. Workshop duration: Half day, One day or Two Days
2. Workshop has to be up-to-date, hands-on and have very limited or no
theory.

*Speaker Privileges*
The speaker privileges are provided to only one speaker in case there are
two or more speakers.
1. Return economy airfare. We will book the ticket for the speaker. In case
the speaker wants to book his/her own tickets, he/she needs to inform us
about the same and a maximum of USD 1400 or the ticket cost which ever is
less will be reimbursed to the speaker.
2. Three nights accommodation.
3. One speaker pass and one complementary conference pass.
4. Invitation to Conference party.
5. Honorarium: An honorarium of USD 500 will be given to only those talks
that are new, highly technical and have never been presented or published
before (before G0S 2013) anywhere online or offline. Please note that the
Ground Zero staff will determine whether the paper is to be considered for
an honorarium or not and their decision will be final based on the
technical depth of the talk and whether it has been presented/published
before. The selected speakers will be notified about the same in our
acceptance email. The honorarium is only for paper presentations.

*Important dates*
1. CFP opens – 25th June 2013
2. First round of speaker list – 1st August 2013
3. CFP closes – 30th September 2013
4. Final speaker list – 10th October 2013

*Submit*
Send an email to cfp[ at ]g0s.org with the subject: G0S 2013 CFP

*Submission format*
1. Paper Title
2. Name
3. Organization and Designation
4. Brief Profile of yourself
5 Phone No.
6. Track:
7. Abstract of the Paper/Workshop
8. Have you presented/published/submitted this paper anywhere else? Where?
9. Why do you think it is a quality presentation/workshop?
10. Detailed Paper/Workshop (please attach with the email)
11. Your photo (please attach with the email)

- G0S CFP
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Ruxcon 2013 Call For Papers

2013-05-06 Thread cfp
Ruxcon 2013 Call For Presentations
Melbourne, Australia, October 26th-27th
CQ Function Centre
http://www.ruxcon.org.au/call-for-papers/


The Ruxcon team is pleased to announce the Call For Presentations for Ruxcon 
2013.

This year the conference will take place over the weekend of the 26th and 27th 
of October at the CQ Function Centre, Melbourne, Australia.


.[x]. About Ruxcon .[x]. 

 Ruxcon is ia premier technical computer security conference in the Australia. 
 The conference aims to bring together the individual talents of the best and 
 brightest security folk in the region, through live presentations, activities 
 and demonstrations.

 The conference is held over two days in a relaxed atmosphere, allowing 
 attendees to enjoy themselves whilst networking within the community and 
 expanding their knowledge of security.

 Live presentations and activities will cover a full range of defensive 
 and offensive security topics, varying from previously unpublished research 
 to required reading for the security community. 

 For more information, please visit the http://www.ruxcon.org.au


.[x]. Important Dates .[x].

 May 7th - Call For Presentations Open
 September 7th - Call For Presentations Close
 October 22-23 - Ruxcon/Breakpoint Training
 October 24-25 - Breakpoint Conference
 October 26-27 - Ruxcon Conference


.[x]. Topic Scope .[x].

 o Topics of interest include, but are not limited to:
 o Mobile Device Security
 o Virtualization, Hypervisor, and Cloud Security
 o Malware Analysis
 o Reverse Engineering
 o Exploitation Techniques
 o Rootkit Development
 o Code Analysis
 o Forensics and Anti-Forensics
 o Embedded Device Security
 o Web Application Security
 o Network Traffic Analysis
 o Wireless Network Security
 o Cryptography and Cryptanalysis
 o Social Engineering
 o Law Enforcement Activities
 o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)


.[x]. Submission Guidelines .[x].

In order for us to process your submission we require the following information:

 1. Presentation title
 2. Detailed summary of your presentation material
 3. Name/Nickname
 4. Mobile phone number
 5. Brief personal biography
 6. Description of any demonstrations involved in the presentation
 7. Information on where the presentation material has or will be presented 
before Ruxcon

* As a general guideline, Ruxcon presentations are between 45 and 60 minutes, 
  including question time. 
 
 If you have any enquiries about submissions, or would like to make a 
 submission, please send an email to presentati...@ruxcon.org.au


.[x]. Contact .[x].

 o Email: presentati...@ruxcon.org.au
 o Twitter: @ruxcon

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Breakpoint 2013 Call For Papers

2013-04-30 Thread cfp
Breakpoint 2013 Call For Papers
Melbourne, Australia, October 24th-25th
Intercontinental Rialto
http://www.ruxconbreakpoint.com


.[x]. Introduction .[x].

 The Ruxcon team is pleased to announce Call For Papers for Breakpoint 2013.

 Breakpoint showcases the work of expert security researchers from around the
 world on a wide range of topics. This conference is organised by the Ruxcon 
 team and offers a specialised security conference to complement and lead into 
 the larger and more casual Ruxcon weekend conference. Breakpoint caters 
 towards security researchers and industry professionals alike, with a focus on 
 cutting edge security research.

 Breakpoint presents a great opportunity for our selected speakers to receive a
 complimentary trip to Australia and experience both the Breakpoint and Ruxcon 
 conferences, not to mention the great weather, awesome parties, and friendly 
 people. Melbourne is a city of many subcultures, personalities and styles. 
 Melbourne has a vibrant arts and music scene, eccentric cafes, intimate bars 
 and restaurants, and is known as Australia's cultural capital.


.[x]. Important Dates .[x].

 May 1  - Call For Presentations Open
 August 23  - Call For Presentations Close
 October 22-23  - Breakpoint Training
 October 24-25  - Breakpoint Conference
 October 26-27  - Ruxcon Conference


.[x]. Topic Scope .[x].

Topics of interest include, but are not limited to:

 o Mobile Device Security
 o Exploitation Techniques
 o Reverse Engineering
 o Vulnerability Discovery
 o Rootkit Development
 o Malware Analysis
 o Code Analysis
 o Virtualisation, Hypervisor Security
 o Cloud Security
 o Embedded Device Security
 o Hardware Security
 o Telecommunications Security
 o Wireless Network Security
 o Web Application Security
 o Law Enforcement Activities
 o Forensics
 o Threat Intelligence
 o You get the idea


.[x]. Submission Guidelines .[x].

 In order for us to process your submission we will require the following 
 information:

 1. Presentation title
 2. Detailed summary of your presentation material
 3. Name/Nickname
 4. Mobile phone number
 5. Brief personal biography
 6. Description of any demonstrations involved in presentation
 7. Information on where the presentation material has or will be presented 
before Breakpoint

 * Preference will be given to presentations that contain original research 
   that will be first presented at Breakpoint. 
 * As a general guideline, Breakpoint presentations are between 
   45 and 60 minutes, including question time. 

 If you have any questions about submissions, or would like to make a 
 submission, please send an email to b...@ruxconbreakpoint.com


.[x]. Speaker Benefits .[x].

 Speakers at Breakpoint will be entitled to the following benefits: 
   

 - A return economy airfare to Melbourne (total cost limit applies)
 - Three nights accommodation at the Intercontinental Rialto
 - Complimentary registration for Breakpoint and Ruxcon conferences
 - Invitation to all Breakpoint and Ruxcon parties
 - Unlock 'Presented on world's smallest continent' achievement

 * All speaker benefits apply to a single speaker per submission. 


.[x]. Contact .[x]. 

 If you have any questions or inqueries, contact us at:

 * Email:   b...@ruxconbreakpoint.com
 * Twitter: @ruxconbpx

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] GrrCON 2013: Grand Rapids, MI - Sept 12 -13

2013-02-15 Thread cfp
===
GrrCON '13 - Michigan

  Midwest Information Security  Hacker CON 

   CALL FOR PAPERS

www.http://grrcon.org/cfp/
===

-= GrrCON '13 
-= September 12  13, 2013
-= Grand Rapids, MI

-= Priority consideration will be given to submissions received before May 1st, 2013


==[Overview]==
GrrCON is an information security and hacking conference held annually in the Midwest. This conference was put together to provide the information security community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere. No egos, no rock stars, just a good time and good content.


==[Why GrrCON]==
We offer three tracks, training, workshops, solutions arena, contests, an after party, and more to ensure you get the most out of the event.

-= oh yea.. and FREE BEER and FOOD both days for EVERYBODY =As always we try to PAY our speakers as much as possible for speaking at GrrCON.
Not all speakers or presentations are created equally, we hold to this ideal by varying the honorarium we provide. 

We also understand not all speakers can accept payment. Therefore, speakers can negotiate additional tickets in exchange for honorariums, subject to approval on an individual basis. Like everything we do, we’re flexible and want to ensure everybody (even our speakers) have a great time. If you have any thoughts or crazy negotiation ideas let us know.
-= All accepted speakers will also receive a VIP Ticket for themselves to enjoy the rest of the conference =

  
==[Submit your CFP SOOON]==

-= Call for papers will close on June 1st or when we have filled all available slots. 
-= Priority consideration will be given to submissions received before May 1st.
-= Speaker announcements will be made in rounds, with the final round no later than July 5th, 2013
-= 25 or 50 minute presentations
-= CFP Form is available at http://grrcon.org/cfp/


GrrCON attendees represent a BROAD section of Information Security community. 
We encourage both technical  non-technical submissions on all aspects of security. If it’s interesting and related to InfoSec or Hacking it’s for GrrCON. 
  
More conference information, registration details, ect:
 
http://www.GrrCON.org


Follow Status on:

www.twitter.com/GrrCON


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] hashdays 2012 - Call for Papers (#days CFP)

2012-06-24 Thread Hashdays CFP
Call for Papers for hashdays'12 (#days)
===

Introduction

hashdays is an international security technology and research conference
offering both trainings/workshops and traditional presentation tracks.
The event features many international IT security experts sharing their
deep technical knowledge in an open environment and takes place October
31st to November 3rd, 2012 in Lucerne. The conference is unique in
Switzerland and is organized by DEFCON Switzerland, a non-profit
association registered as a Defcon Group (DC4131,
http://www.defcon.org/html/defcon-groups/dc-groups-index.html) with the
aim to give experts and professionals a platform to transfer insights
into the information security domain and to sensitize users to
information security topics. The official conference web site is located
at: https://www.hashdays.ch.

We are happy to announce that the CFP is now open and we are accepting
interesting and innovative proposals for 50-minute talks. Please follow
the following guide for submitting.

Scope
-
In particular, we are looking for topics in the following domains:
* Operating system and application security
* Wired and wireless network security
* Mobile communication security
* Forensics and anti-forensics
* Digital privacy and anonymous communication
* Reverse engineering of software and hardware
* Malware collection and analysis
* Botnet analysis
* Electronic voting
* Industrial espionage / industrial control system security
* Security metrics and visualization
* Intrusion detection and prevention
* Cloud computing security
* Cryptography and security protocols
* Biometric system security
* Quantitative and model based IT risk management

Submissions from academic and scientific institutions are welcome.

Deadlines
-
Second submission round will end July 30 2012, 9pm CET. Notes of
Acceptance will be delivered shortly after but no later than August 12 2012.

Submission Guidelines
-
The submission package is assessed by the program committee and the
author is notified on the outcome by electronic means. Your submission
package must be delivered to c...@defcon-switzerland.org in
non-proprietary electronic formats (ASCII preferred, PDF, OpenOffice if
you can.t help it) and contain the following:

Talk details:
* Either:
  o  a proposal of your intended talk with at maximum 400 words XOR
  o  a full paper with a minimum of 6 and a maximum of 12 pages XOR
  o  a slide deck with a maximum of 45 slides
* 150 word abstract of the talk which will be displayed on our
conference website
* Rationale why your material is significant and should be presented
* Information on whether this talk has been or will be presented elsewhere
* Samples of other materials which might help to assess your submission
(optional)
* Links to your web presence, if relevant (optional)
* What are the key messages in your talk and what will the audience
learn from your talk

Presenter details:
* Your name and contact information
* Location of residence
* Country where the passport was issued
* Name of employer and/or affiliations (optional)
* 150 word biography of the speaker for use on our conference website
* A photo of yourself which is shown along with your biography (optional)
* List of previous significant talks (topic and name of conference)
* List of publications
* Name of employer and/or affiliations (if applicable)

Speaker Benefits

We offer the following benefits to accepted speakers:
* Free admission for the two conference days (including lunches and
coffee breaks)
* Invitation to the complimentary speaker's dinner
* Paid accommodation for two nights at the hotel where the conference
takes place
* Reimbursement of travel expenses in economy class up to a certain
amount (depending on your location)

Please note, that we are only able to reimburse travel expenses for one
(1) person per presentation.

Terms
-
The author of the content keeps his or her full rights on the submitted
material. By submitting the CFP package the author agrees to the
following terms:
* You confirm that the material submitted is your own except for where
explicit references to third-party works are made.
* You confirm that you have obtained permission to use and distribute
third-party content, like images.
* You give permission to DEFCON Switzerland to publishing/distributing
your material either in physical or electronic format without royalty.
* You give permission to DEFCON Switzerland to create audio and video
recordings of your presentation and publish/distribute these without
royalty.
* You agree that travel and accommodation expenses are reimbursed only
upon successful delivery of your talk and upon presenting the receipts.
* You agree to reading out a disclaimer to the audience at the beginning
of your presentation if deemed necessary by DEFCON Switzerland.
* You agree not to hold DEFCON Switzerland liable for any direct or
indirect

[Full-disclosure] Breakpoint 2012 Call For Papers

2012-05-10 Thread cfp
 . __
 ._\\. Breakpoint 2012   (___.
 :  Intercontinental Rialto  :
 :   Melbourne,  Australia   :
 : October 17th-18th :
 :__. ___:
)\\
.
  www.ruxconbreakpoint.com
  www.twitter.com/ruxconbpx



Introduction


 Breakpoint is a new security conference to be held on the 17th and 18th of
 October, in Melbourne Australia. The event will show case the work of expert
 security researchers from around the world on a wide range of topics.
 Breakpoint is organised by the Ruxcon conference team and will offer a
 specialised and more professional security conference to complement and lead
 into the larger and more casual Ruxcon weekend conference. Breakpoint will
 cater towards security researchers and industry professionals alike, with a
 focus on cutting edge security research.

 With just one day separating both conferences, Breakpoint presents a great
 opportunity for our selected speakers to receive a complimentary trip to
 Australia and experience both the Breakpoint and Ruxcon conferences, not to
 mention the great weather, awesome parties, and friendly people.

 Melbourne is Australia's cultural capital, with Victorian-era architecture,
 extensive shopping, museums, galleries, theatres, and large parks and gardens.
 It is a city of many subcultures, personalities and styles, and it is these
 layers that make it so interesting. Melbourne has a vibrant arts and music
 scene, eccentric cafes, cobbled lane-ways, quirky shops, intimate bars and
 restaurants, and is known as one of the world's great streetart capitals.


Important Dates
---

 * May 10Call For Presentations Open
 * July30Call For Presentations Close
 * October 15-16 BreakPoint Training
 * October 17-18 BreakPoint Conference
 * October 20-21 Ruxcon Conference


Topic Scope
---

Topics of interest include, but are not limited to:


 o Mobile Device Security
 o Exploitation Techniques
 o Reverse Engineering
 o Vulnerability Discovery
 o Rootkit Development
 o Malware Analysis
 o Code Analysis
 o Virtualization, Hypervisor Security
 o Cloud Security
 o Embedded Device Security
 o Hardware Security
 o Telecommunications Security
 o Wireless Network Security
 o Web Application Security
 o Law Enforcement Activities
 o Forensics
 o Threat Intelligence
 o You get the idea


Submission Guidelines
-

 In order for us to process your submission we will require the following
 information:


 1. Presentation title
 2. Detailed summary of your presentation material
 3. Name/Nickname
 4. Mobile phone number
 5. Brief personal biography
 6. Description of any demonstrations involved in the presentation
 7. Information on where the presentation material has or will be presented
before Breakpoint

 * Preference will be given to presentations that contain original research
   that will be first presented at Breakpoint.
 * As a general guideline, BreakPoint presentations are between
   45 and 60 minutes, including question time.


 If you have any enquiries about submissions, or would like to make a
 submission, please send an email to b...@ruxconbreakpoint.com


Speaker Benefits


 Speakers at BreakPoint will be entitled to the following benefits: 
   

 - A round trip economy airfare to Melbourne (total cost limit applies)
 - Three nights accommodation at the Intercontinental Rialto
 - Complementary registration for Breakpoint and Ruxcon conferences
 - Invitation to all BreakPoint and Ruxcon parties
 - Unlock 'Presented on world's smallest continent' achievement

 * All speaker benefits apply to a single speaker per submission.


Contact
---

 If you have any questions or queries, contact us at:

 * Email:b...@ruxconbreakpoint.com
 * Twitter   @ruxconbpx
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Ruxcon 2012 Call For Papers

2012-04-19 Thread cfp
Ruxcon 2012 Call For Papers

The Ruxcon team is pleased to announce the call for papers for the 2012 annual 
Ruxcon conference.

This year the conference will take place over the weekend of 20th and 21st of 
October at the CQ Function Centre, Melbourne, Australia.

The deadline for submissions is the 15th of July.


* What is Ruxcon?

Ruxcon is the premier technical computer security conference in the Australia. 
The conference aims to bring together the individual talents of the best and 
brightest security folk in the region, through live presentations, activities 
and demonstrations.

The conference is held over two days in a relaxed atmosphere, allowing 
attendees to enjoy themselves whilst networking within the community and 
expanding their knowledge of security.

Live presentations and activities will cover a full range of defensive and 
offensive security topics, varying from previously unpublished research to 
required reading for the security community.

For more information, please visit http://www.ruxcon.org.au


* Presentation Information

Presentations are set to run for 40 to 50 minutes, and will be of a formal 
nature, with slides and a speech.


*  Topics

Topics of interest include, but are not limited to:

o Mobile Device Security
o Virtualization, Hypervisor, and Cloud Security
o Malware Analysis
o Reverse Engineering
o Exploitation Techniques
o Rootkit Development
o Code Analysis
o Forensics and Anti-Forensics
o Embedded Device Security
o Web Application Security
o Network Traffic Analysis
o Wireless Network Security
o Cryptography and Cryptanalysis
o Social Engineering
o Law Enforcement Activities
o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)


* Submissions

Submissions should thoroughly outline your desired presentation subject.

If you have any enquiries about submissions, or would like to make a 
submission, please send an e-mail to presentati...@ruxcon.org.au

The deadline for submissions is the 15th of July.

If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in length).
ii. A description on your presentation (between 2-5 paragraphs in length).


* Contacts

Email: presentati...@ruxcon.org.au
Twitter: ruxcon

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] GrrCON 2012: Grand Rapids, MI - Sept 27-28

2012-03-13 Thread cfp

===
GrrCON '12 - Michigan

  Midwest Information Security  Hacker CON 

   CALL FOR PAPERS

www.http://grrcon.org/speakers/
===

-= GrrCON 2012 
-= September 27  28, 2012
-= Grand Rapids, MI

-= Priority consideration will be given to submissions received before
May 1st, 2012


==[Overview]==
GrrCON is an information security and hacking conference held annually
in the Midwest. This conference was put together to provide the
information security community with a venue to come together and share
ideas, information, solutions, forge relationships, and most importantly
engage with like minded people in a fun atmosphere. We completely sold
out in 2011 and have increased capacity in 2012.

First round or speakers have already been announced.

==[GrrCON is DIFFERENT]==
We are not JUST a Hacker Conference talking about pen testing and
exploits NOR are we JUST an Information Security Conference discussing
risk and strategy. GrrCON is unique in we have significant portions
DEDICATED to both. We bring together the CISO, the hacker, the security
practitioner, and the researcher in an intimate one-of-a-kind experience
you CANNOT get elsewhere.

We’ve taken ideas from all the major security conferences and put the
best ones into GrrCON to provide the most value to our attendees.
Whether you are a Fortune 500 executive, security researcher, security
industry professional, student, or a hacker of “flexible” morals you
will find something for you at GrrCON. 


==[Why GrrCON]==
We offer two tracks, training, workshops, solutions arena, Bsides,
contests, an after party, and more to ensure you get the most out of the
event.

-= oh yea.. and FREE BEER and FOOD both days for EVERYBODY =
-= As always we try to PAY our speakers as much as possible for speaking
at GrrCON =

Not all speakers or presentations are created equally, we hold to this
ideal by varying the honorarium we provide. 
-= For example, in 2011 the honorariums we paid out ranged from $200 to
over $4,000 per speaker =

We also understand not all speakers can accept payment. Therefore,
speakers can negotiate additional tickets in exchange for honorariums,
subject to approval on an individual basis. Like everything we do,
we’re flexible and want to ensure everybody (even our speakers) have a
great time. If you have any thoughts or crazy negotiation ideas let us
know.
-= All accepted speakers will also receive a VIP Ticket for themselves
to enjoy the rest of the conference =


  
==[Submit your CFP SOOON]==

-= Call for papers will close on June 1st or when we have filled all
available slots. 
-= Priority consideration will be given to submissions received before
May 1st.
-= Speaker announcements will be made in rounds, with the final round no
later than July 5th, 2012
-= 25 or 50 minute presentations
-= CFP Form is available at http://grrcon.org/speakers/cfp/


GrrCON attendees represent a BROAD section of Information Security
community. 
We encourage both technical  non-technical submissions on all aspects
of security.  We’re looking for talks about information security,
hacking, regulatory compliance, risk mitigation, application security,
web security, privacy issues, database hacking, criminal law, civil law,
hardware hacking, BCP, exploit development, your grandmothers cookie
recipe, cyber _fill in the blank_ (or any other hacker fantasy),
malware, ect…
If it’s interesting and related to InfoSec or Hacking it’s for
GrrCON. Absolutely NO SALES
presentations will be accepted. 



  
More conference information, registration details, ect:
 
http://www.GrrCON.org


Follow Status on:

www.twitter.com/GrrCON




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Only 7 Days Left: SANS AppSec 2012 CFP

2012-01-24 Thread SANS AppSec CFP
Hi everyone,

This is the final CFP reminder for SANS AppSec 2012 being held in Las 
Vegas, Nevada on April 30 - May 1, 2012.

The call for papers ends in seven days on February 1, 2012 so submit today!



The theme for this conference is Application Security at Scale.

Billions of records in the cloud. Millions of smart mobile devices. 
Millions of developers writing new code. Hundreds of apps in your 
enterprise. Untold numbers of existing bugs. Unknown numbers of 
sophisticated attackers exploiting your software. What cutting edge 
techniques are attackers using? How do large enterprises handle these 
problems at scale? And how do small companies manage it all with fewer 
resources?

We invite you to submit presentations in the following areas:

- Cloud Security
- Mobile Security
- Security in the SDLC
- Secure Coding
- Security Architecture
- Securing Legacy Applications
- Securing Open Source Frameworks
- Program Development
- Security Metrics
- Security Testing
- Penetration Testing
- Cutting Edge Attacks
- Cutting Edge Defense
- Case Studies
- Any topic related to Application Security

Submission Deadline
February 1, 2012

Submit papers via EasyChair (account required). Talks will be 45-50 
minutes in length.
https://www.easychair.org/conferences/?conf=sansappsec2012

For additional information please visit the conference web site or 
contact us via email.
https://www.sans.org/appsec-2012/
callforpapers-app...@sans.org

Please forward to anyone who might be interested in speaking.

Thanks!

The SANS AppSec 2012 Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SANS AppSec 2012 CFP reminder

2011-12-01 Thread SANS AppSec CFP
Hi everyone,

It's been over a month since we first announced the CFP for the SANS 
AppSec Summit being held in Las Vegas, Nevada on April 30 - May 1, 2012.

We've received a number of great submissions so far but there's only two 
months left until the deadline on February 1, 2012. If you'd like to 
speak please get your submission in as soon as possible.

Hope to see you in Vegas!



The theme for this conference is Application Security at Scale.

Billions of records in the cloud. Millions of smart mobile devices. 
Millions of developers writing new code. Hundreds of apps in your 
enterprise. Untold numbers of existing bugs. Unknown numbers of 
sophisticated attackers exploiting your software. What cutting edge 
techniques are attackers using? How do large enterprises handle these 
problems at scale? And how do small companies manage it all with fewer 
resources?

We invite you to submit presentations in the following areas:

- Cloud Security
- Mobile Security
- Security in the SDLC
- Secure Coding
- Security Architecture
- Securing Legacy Applications
- Securing Open Source Frameworks
- Program Development
- Security Metrics
- Security Testing
- Penetration Testing
- Cutting Edge Attacks
- Cutting Edge Defense
- Case Studies
- Any topic related to Application Security

Submission Deadline
February 1, 2012

Submit papers via EasyChair (account required). Talks will be 50 minutes 
in length.
https://www.easychair.org/conferences/?conf=sansappsec2012

For additional information please visit the conference web site or 
contact us via email.
https://www.sans.org/appsec-2012/
callforpapers-app...@sans.org

Please forward to anyone who might be interested in speaking.

Thanks!

The SANS AppSec 2012 Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SANS AppSec 2012 CFP is Open

2011-10-27 Thread SANS AppSec CFP
Hi everyone,

We're happy to announce that the sixth annual SANS AppSec Summit will be 
held in Las Vegas, Nevada on April 30 - May 1, 2012.

The theme for this conference is Application Security at Scale.

Billions of records in the cloud. Millions of smart mobile devices. 
Millions of developers writing new code. Hundreds of apps in your 
enterprise. Untold numbers of existing bugs. Unknown numbers of 
sophisticated attackers exploiting your software. What cutting edge 
techniques are attackers using? How do large enterprises handle these 
problems at scale? And how do small companies manage it all with fewer 
resources?

We invite you to submit presentations in the following areas:

- Cloud Security
- Mobile Security
- Security in the SDLC
- Secure Coding
- Security Architecture
- Securing Legacy Applications
- Securing Open Source Frameworks
- Program Development
- Security Metrics
- Security Testing
- Penetration Testing
- Cutting Edge Attacks
- Cutting Edge Defense
- Case Studies
- Any topic related to Application Security

Submission Deadline
February 1, 2012

Submit papers via EasyChair (account required). Talks will be 50 minutes 
in length.
https://www.easychair.org/conferences/?conf=sansappsec2012

For additional information please visit the conference web site or 
contact us via email.
https://www.sans.org/appsec-2012/
callforpapers-app...@sans.org

Please forward to anyone who might be interested in speaking.

Thanks!

The SANS AppSec 2012 Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Ruxcon 2011 Final Call For Papers

2011-08-15 Thread cfp
Ruxcon 2011 Final Call For Papers

The Ruxcon team is pleased to announce the final call for papers for the 
seventh annual Ruxcon conference.

This year the conference will take place over the weekend of 19th and 20th of 
November at the CQ Function Centre, Melbourne, Australia.

The deadline for submissions is the 15th of October.

* What is Ruxcon?

Ruxcon is the premier technical computer security conference in the 
Australia-Pacific region. The conference aims to bring together the individual 
talents of the best and brightest security folk in the region, through live 
presentations, activities and demonstrations.

The conference is held over two days in a relaxed atmosphere, allowing 
attendees to enjoy themselves whilst networking within the community and 
expanding their knowledge of security.

Live presentations and activities will cover a full range of defensive and 
offensive security topics, varying from previously unpublished research to 
required reading for the security community.

For more information, please visit http://www.ruxcon.org.au

* Presentation Information

Presentations are set to run for 50 minutes, and will be of a formal nature, 
with slides and a speech.

* Presentation Submissions

Ruxcon would like to invite people who are interested in security to submit a 
presentation.

Topics of interest include, but are not limited to:

o Mobile Device Security
o Virtualization, Hypervisor, and Cloud Security
o Malware Analysis
o Reverse Engineering
o Exploitation Techniques
o Rootkit Development
o Code Analysis
o Forensics and Anti-Forensics
o Embedded Device Security
o Web Application Security
o Network Traffic Analysis
o Wireless Network Security
o Cryptography and Cryptanalysis
o Social Engineering
o Law Enforcement Activities
o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)

Submissions should thoroughly outline your desired presentation subject.

If you have any enquiries about submissions, or would like to make a 
submission, please send an e-mail to presentations () ruxcon org au

The deadline for submissions is the 15th of October.

If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in length).
ii. A description on your presentation (between 2-5 paragraphs in length).

* Contact Details

Presentation Submissions:  presentations () ruxcon org au

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Extended: hashdays 2011 - Call for Papers (#days CFP)

2011-07-08 Thread Hashdays CFP
Hi,

Due to many request #days the Swiss conference for security, extends its
call for papers (CFP) deadline until July 17th 2011. For details
regarding the submission guidelines see:
https://www.hashdays.ch/call-for-papers.html

Here is why you'd really enjoy presenting at the #days conference:
- We already have a rather impressive line-up of announced speakers:
https://www.hashdays.ch/agenda/
- There will be a speakers dinner. But remember... you should be able to
present your talk somehow the following day :-)

And why you need to visit the conference:
- Early development versions of the conference badge look really
promising: https://www.hashdays.ch/badge.html
- Early bird tickets are still available for a short period of time:
https://www.hashdays.ch/registration/
- And there will be free Club Mate - as long as our stock lasts!

If you would like to support the conference as a sponsor we can offer
attractive sponsoring opportunities. For details please contact:
sponsor...@defcon-switzerland.org

Cheers,
The #days organization committee


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Ruxcon 2011 Call For Papers

2011-05-17 Thread cfp
Ruxcon 2011 Call For Papers

The Ruxcon team is pleased to announce the call for papers for the seventh 
annual Ruxcon conference.

This year the conference will take place over the weekend of 19th and 20th of 
November at the CQ Function Centre, Melbourne, Australia.

The deadline for submissions is the 30th of July.

* What is Ruxcon?

Ruxcon is the premier technical computer security conference in the 
Australia-Pacific region. The conference aims to bring together the individual 
talents of the best and brightest security folk in the region, through live 
presentations, activities and demonstrations.

The conference is held over two days in a relaxed atmosphere, allowing 
attendees to enjoy themselves whilst networking within the community and 
expanding their knowledge of security.

Live presentations and activities will cover a full range of defensive and 
offensive security topics, varying from previously unpublished research to 
required reading for the security community.

For more information, please visit http://www.ruxcon.org.au

* Presentation Information

Presentations are set to run for 50 minutes, and will be of a formal nature, 
with slides and a speech.

* Presentation Submissions

Ruxcon would like to invite people who are interested in security to submit a 
presentation.

Topics of interest include, but are not limited to:

o Mobile Device Security
o Virtualization, Hypervisor, and Cloud Security
o Malware Analysis
o Reverse Engineering
o Exploitation Techniques
o Rootkit Development
o Code Analysis
o Forensics and Anti-Forensics
o Embedded Device Security
o Web Application Security
o Network Traffic Analysis
o Wireless Network Security
o Cryptography and Cryptanalysis
o Social Engineering
o Law Enforcement Activities
o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)

Submissions should thoroughly outline your desired presentation subject.

If you have any enquiries about submissions, or would like to make a 
submission, please send an e-mail to presentations () ruxcon org au

The deadline for submissions is the 30th of July.

If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in length).
ii. A description on your presentation (between 2-5 paragraphs in length).

* Contact Details

Presentation Submissions:  presentations () ruxcon org au

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] hashdays 2011 - Call for Papers (#days CFP)

2011-04-28 Thread Hashdays CFP
Call for Paper for hashdays 2011 (#days)


Introduction

Hashdays is an international security technology and research conference
which is preceded by several 2-day workshops delivering IT security
training. The event features many international IT security experts
sharing their deep technical knowledge in an open environment and takes
place October 26th to 29th, 2011 in Lucerne. The conference is unique in
Switzerland and is organized by DEFCON Switzerland, a non-profit
association with the aim to give experts and professionals a platform to
transfer insights into the information security domain and to sensitize
users to information security topics. The official conference web site
is located at: https://www.hashdays.ch.

The Call For Paper (CFP) is now open and we are accepting interesting 
innovative proposals for 50-minute talks.

Please follow the following guide for submitting.

Scope
-
In particular, we are looking for topics in the following domains:
* Operating system and application security
* Wired and wireless network security
* Mobile communication security
* Forensics and anti-forensics
* Digital privacy and anonymous communication
* Reverse engineering of software and hardware
* Malware collection and analysis
* Botnet analysis
* Electronic voting
* Security metrics and visualization
* Intrusion detection and prevention
* Cloud computing security
* Cryptography and security protocols
* Biometric system security
* Quantitative and model based IT risk management

Submissions from academic and scientific institutions are welcome.

Deadlines
-
* Submission of package until: Sunday, July 3rd, 2011
* Latest notification date: Sunday, August 28th, 2011

Submission Guidelines
-
The submission package is assessed by the program committee and the
author is notified on the outcome by electronic means. Your submission
package must be delivered in non-proprietary electronic formats (e.g.
PDF, OpenOffice) and contain the following:

Talk details:
* Either:
o a proposal of your intended talk with at maximum 400 words XOR
o a full paper with a minimum of 6 and a maximum of 12 pages XOR
o a slide deck with a maximum of 45 slides
* 150 word abstract of the talk which will be displayed on our
conference website
* Rationale why your material is significant and should be presented
* Information on whether this talk has been or will be presented elsewhere
* Samples of other materials which might help to assess your submission
(optional)
* Links to your web presence, if relevant (optional)

Presenter details:
* Your name and contact information
* Location of residence
* Country where the passport was issued
* Name of employer and/or affiliations (optional)
* 150 word biography of the speaker for use on our conference website
* A photo of yourself which is shown along with your biography (optional)
* List of previous significant talks (topic and name of conference)
* List of publications

To submit your CFP, put all the requested information into an archive and
send it by e-mail to c...@defcon-switzerland.org.

Speaker Benefits

We offer the following benefits to accepted speakers:
* Free admission for the two conference days (including lunches and
coffee breaks)
* Invitation to the complimentary speaker's dinner
* Paid accommodation for two nights at the hotel where the conference
takes place
* Reimbursement of travel expenses in economy class up to a certain amount

However, we can reimburse travel and accommodation for one person per
talk only.

Terms
-
The author of the content keeps his or her full rights on the submitted
material. By submitting the CFP package the author agrees to the
following terms:
* You confirm that the material submitted is your own except for where
explicit references to third-party works are made.
* You confirm that you have obtained permission to use and distribute
third-party content, like images.
* You give permission to DEFCON Switzerland to publishing/distributing
your material either in physical or electronic format without royalty.
* You give permission to DEFCON Switzerland to create audio and video
recordings of your presentation and publish/distribute these without
royalty.
* You agree that travel and accommodation expenses are reimbursed only
upon successful delivery of your talk and upon presenting the receipts.
* You agree to reading out a disclaimer to the audience at the beginning
of your presentation if deemed necessary by DEFCON Switzerland.
* You agree not to hold DEFCON Switzerland liable for any direct or
indirect damages or costs in case the event is cancelled.

Sponsoring
--
If you like our conference, you can support us by sponsoring. We offer
attractive sponsoring opportunities. For details please contact:
sponsor...@defcon-switzerland.org.

Thank you and best regards,
#days organizing committee

[Full-disclosure] Ruxcon 2010 Final Call For Papers

2010-08-20 Thread cfp


RUXCON 2010 FINAL CALL FOR PAPERS

Ruxcon would like to announce the final call for papers for the sixth annual 
Ruxcon conference.

This year the conference will take place over the weekend of 20th and 21st of 
November.

Ruxcon will be held at CQ, Melbourne, Australia.

The deadline for submissions is the 10th of October.

What is Ruxcon?

Ruxcon is the premiere technical computer security conference within Australia. 
Ruxcon aspires to bring together the individual talents of the best and the 
brightest security folk within the Aus-Pacific region, through live 
presentations, activities, and demonstrations.

Ruxcon's unique approach to running a security conference ensures that the 
conference is accessible to all levels of the security industry. Ruxcon aims to 
be the most interesting, thought provoking, and relevant information security 
conference in Australia.

The conference is held over two days in a relaxed atmosphere, allowing 
attendees to enjoy themselves whilst networking within the community and 
expanding their knowledge of security.

Live presentations and activities will cover a full range of defensive and 
offensive security topics, varying from previously unpublished research to 
required reading for the security community.

For more information, please visit http://www.ruxcon.org.au

Presentation Information

Presentations will be 50 minutes in length, and should be fully supplemented 
with slides and any other relevant material.

Presentation Submissions

Ruxcon would like to invite people who are interested to submit a presentation.

Topics of interest include, but are not limited to:

   * Mobile Device Security
   * Virtualisation, Hypervisor and Cloud Security
   * Malware Analysis
   * Reverse Engineering
   * Exploitation Techniques
   * Rootkit Development
   * Code Analysis
   * Forensics and Anti-Forensics
   * Embedded Device Security
   * Web Application Security
   * Network Traffic Analysis
   * Wireless Network Security
   * Cryptography and Cryptanalysis
   * Social Engineering
   * Law Enforcement Activities
   * Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)

Submissions should thoroughly outline your desired presentation subject. 
Accompanying your submission should be the slides you intend to use or a 
detailed paper explaining your subject.

If you have any enquiries about submissions, or would like to make a 
submission, please send an e-mail to
presentati...@ruxcon.org.au.

The deadline for submissions is the 10th of October.

If approved we will additionally require:

  1. A brief personal biography (between 2-5 paragraphs in length).
  2. A description on your presentation (between 2-5 paragraphs in length).

Contact Details

Presentation Submissions: presentati...@ruxcon.org.au
General Enquiries: rux...@ruxcon.org.au


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] hashdays 2010 - Call for Papers (#days CFP)

2010-07-13 Thread Hashdays CFP
Hi

#days the Swiss conference for security, extends its call for
papers (CFP) deadline until July 25th 2010. For details regarding the
submission guidelines see:
https://www.hashdays.ch/call-for-papers.html

Furthermore, we herewith proudly announce our #days workshops:
1) Protecting from GSM attacks with Harald Welte, Karsten Nohl and
David Burgess:
This two-day workshop revisits the basics of GSM, SS7, and OTA before
discussing their control and trust mechanics. It will become apparent
that technology providers and attackers can invade GSM users' location
and communication privacy in multiple ways. The workshop is targeted
at GSM users concerned with the confidentiality of their information
and location. The class provides technical and organizational
protection strategies for minimizing the attack surface and mitigating
the risks of the telecommunication infrastructure.

2) Exploit Laboratory with Saumil Shah:
The workshop brings you an action packed class teaching the art of
exploitation from scratch. We start with an insight into system
architecture, process execution, operating systems and error
conditions. We then accelerate to using debuggers, reproducing
reliable error conditions and exploit writing. Most of the class time
is spent working on exercises that cover both the Linux and Windows,
illustrating stack overflows, heap overflows and memory overwrites.
The class is delivered in a down-to-earth, learn-by-example
methodology.

The early bird for both workshops lasts until July 25th, 2010. For
details and registration see:
https://www.hashdays.ch/workshop.html

Best regards,
The #days organization committee



On 24.04.10 15:51, hashdays CFP wrote:
 
 Call for Paper for hashdays 2010 (#days)
 
 
 Introduction
 
 Hashdays is an international security technology and research conference
 which is preceded by several 2-day workshops delivering IT security
 training. The event features many international IT security experts
 sharing their deep technical knowledge in an open environment and takes
 place November 3rd to 6th, 2010 in Lucerne. The conference is the first
 of its kind in Switzerland and is organized by DEFCON Switzerland, a
 non-profit association with the aim to give experts and professionals a
 platform to transfer insights into the information security domain and
 to sensitize users to information security topics. The official
 conference web site is located at: https://www.hashdays.ch.
 
 The Call For Paper (CFP) is now open and we are accepting interesting 
 innovative proposals for 50-minute talks.
 
 Scope
 - 
 In particular, we are looking for topics in the following domains:
 
 * Operating system and application security
 * Wired and wireless network security
 * Mobile communication security
 * Forensics and anti-forensics
 * Digital privacy and anonymous communication
 * Reverse engineering of software and hardware
 * Malware collection and analysis
 * Botnet analysis
 * Electronic voting
 * Security metrics and visualization
 * Intrusion detection and prevention
 * Cloud computing security
 * Cryptography and security protocols
 * Biometric system security
 * Quantitative and model based IT risk management
 
 Submissions from academic and scientific institutions are welcome.
 
 Deadlines
 -
 * Submission of package until: Sunday, July 4, 2010
 * Latest acceptance notification date: Sunday, August 29, 2010
 
 Submission Guidelines
 -
 The submission package is assessed by the program committee and the
 author is notified on the outcome by electronic means. Your submission
 package must be delivered in non-proprietary electronic formats (e.g.
 PDF, OpenOffice) and contain the following:
 
 Talk details:
 
 * Either:
   - a proposal of your intended talk with at maximum 400 words XOR
   - a full paper with a minimum of 6 and a maximum of 12 pages XOR
   - a slide deck with a maximum of 45 slides
 * 150 word abstract of the talk which will be displayed on our
   conference website
 * Rationale why your material is significant and should be presented
 * Information on whether this talk has been or will be presented
   elsewhere
 * Samples of other materials which might help to assess your submission
   (optional)
 * Links to your web presence, if relevant (optional)
 
 Presenter details:
 * Your name and contact information
 * Location of residence
 * Country where the passport was issued
 * Name of employer and/or affiliations (optional)
 * 150 word biography of the speaker for use on our conference website
 * A photo of yourself which is shown along with your biography
   (optional)
 * List of previous significant talks (topic and name of conference)
 * List of publications
 
 To submit your CFP, put all the requested information into an archive
 and send it by e-mail to c...@defcon-switzerland.org.
 
 Speaker Benefits
 
 We offer the following benefits to accepted speakers

[Full-disclosure] hashdays 2010 - Call for Papers (#days CFP)

2010-04-24 Thread hashdays CFP

Call for Paper for hashdays 2010 (#days)


Introduction

Hashdays is an international security technology and research conference
which is preceded by several 2-day workshops delivering IT security
training. The event features many international IT security experts
sharing their deep technical knowledge in an open environment and takes
place November 3rd to 6th, 2010 in Lucerne. The conference is the first
of its kind in Switzerland and is organized by DEFCON Switzerland, a
non-profit association with the aim to give experts and professionals a
platform to transfer insights into the information security domain and
to sensitize users to information security topics. The official
conference web site is located at: https://www.hashdays.ch.

The Call For Paper (CFP) is now open and we are accepting interesting 
innovative proposals for 50-minute talks.

Scope
-   
In particular, we are looking for topics in the following domains:

* Operating system and application security
* Wired and wireless network security
* Mobile communication security
* Forensics and anti-forensics
* Digital privacy and anonymous communication
* Reverse engineering of software and hardware
* Malware collection and analysis
* Botnet analysis
* Electronic voting
* Security metrics and visualization
* Intrusion detection and prevention
* Cloud computing security
* Cryptography and security protocols
* Biometric system security
* Quantitative and model based IT risk management

Submissions from academic and scientific institutions are welcome.

Deadlines
-
* Submission of package until: Sunday, July 4, 2010
* Latest acceptance notification date: Sunday, August 29, 2010

Submission Guidelines
-
The submission package is assessed by the program committee and the
author is notified on the outcome by electronic means. Your submission
package must be delivered in non-proprietary electronic formats (e.g.
PDF, OpenOffice) and contain the following:

Talk details:

* Either:
  - a proposal of your intended talk with at maximum 400 words XOR
  - a full paper with a minimum of 6 and a maximum of 12 pages XOR
  - a slide deck with a maximum of 45 slides
* 150 word abstract of the talk which will be displayed on our
  conference website
* Rationale why your material is significant and should be presented
* Information on whether this talk has been or will be presented
  elsewhere
* Samples of other materials which might help to assess your submission
  (optional)
* Links to your web presence, if relevant (optional)

Presenter details:
* Your name and contact information
* Location of residence
* Country where the passport was issued
* Name of employer and/or affiliations (optional)
* 150 word biography of the speaker for use on our conference website
* A photo of yourself which is shown along with your biography
  (optional)
* List of previous significant talks (topic and name of conference)
* List of publications

To submit your CFP, put all the requested information into an archive
and send it by e-mail to c...@defcon-switzerland.org.

Speaker Benefits

We offer the following benefits to accepted speakers:
* Free admission for the two conference days (including lunches and
  coffee breaks)
* Invitation to the complimentary speaker's dinner
* Paid accommodation for two nights at the hotel where the conference
  takes place
* Reimbursement of travel expenses in economy class up to a certain
  amount

However, we can reimburse travel and accommodation for one person per
talk only.

Terms
-
The author of the content keeps his or her full rights on the submitted
material. By submitting the CFP package the author agrees to the
following terms:

* You confirm that the material submitted is your own except for where
  explicit references to third-party works are made.
* You confirm that you have obtained permission to use and distribute
  third-party content, like images.
* You give permission to DEFCON Switzerland to publishing/distributing
  your material either in physical or electronic format without royalty.
* You give permission to DEFCON Switzerland to create audio and video
  recordings of your presentation and publish/distribute these without
  royalty.
* You agree that travel and accommodation expenses are reimbursed only
  upon successful delivery of your talk and upon presenting the
  receipts.
* You agree to reading out a disclaimer to the audience at the
  beginning of your presentation if deemed necessary by DEFCON
  Switzerland.
* You agree not to hold DEFCON Switzerland liable for any direct or
  indirect damages or costs in case the event is canceled.

Sponsoring
--
If you like our conference, you can support us by sponsoring. We offer
attractive sponsoring opportunities. For details please contact:
sponsor...@defcon-switzerland.org.


Thank you and best regards,
#days organizing committee

[Full-disclosure] Ruxcon 2010 Call For Papers

2010-03-25 Thread cfp
RUXCON 2010 CALL FOR PAPERS

Ruxcon would like to announce the call for papers for the sixth annual Ruxcon 
conference.

This year the conference will take place over the weekend of 4th and 5th of 
December.

Ruxcon will be held at the Royal Melbourne Institute of Technology (RMIT), 
Melbourne, Australia.

The deadline for submissions is the 30th of July.

* What is Ruxcon?

Ruxcon is the premiere technical computer security conference within Australia. 
Ruxcon aspires to bring together the individual talents of the best and the 
brightest security folk within the Aus-Pacific region, through live 
presentations, activities, and demonstrations.

Ruxcon's unique approach to running a security conference ensures that the 
conference is accessible to all levels of the security industry. Ruxcon aims to 
be the most interesting, thought-provoking, and relevant information security 
conference in Australia.

The conference is held over two days in a relaxed atmosphere, allowing 
attendees to enjoy themselves whilst networking within the community and 
expanding their knowledge of security.

Live presentations and activities will cover a full range of defensive and 
offensive security topics, varying from previously unpublished research to 
required reading for the security community.

For more information, please visit http://www.ruxcon.org.au

* Presentation Information

Presentations are set to run for 50 minutes, and will be of a formal nature, 
with slides and a speech.

* Presentation Submissions

Ruxcon would like to invite people who are interested in security to submit a 
presentation.

Topics of interest include, but are not limited to:

o Mobile Device Security
o Virtualization, Hypervisor, and Cloud Security
o Malware Analysis
o Reverse Engineering
o Exploitation Techniques
o Rootkit Development
o Code Analysis
o Forensics and Anti-Forensics
o Embedded Device Security
o Web Application Security
o Network Traffic Analysis
o Wireless Network Security
o Cryptography and Cryptanalysis
o Social Engineering
o Law Enforcement Activities
o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)

Submissions should thoroughly outline your desired presentation subject. 
Accompanying your submission should be the slides you intend to use or a 
detailed paper explaining your subject.

If you have any enquiries about submissions, or would like to make a 
submission, please send an e-mail to presentations () ruxcon org au

The deadline for submissions is the 30th of July.

If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in length).
ii. A description on your presentation (between 2-5 paragraphs in length).

* Contact Details

Presentation Submissions:  presentations () ruxcon org au 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] RUXCON 2008 Final Call For Papers

2008-09-02 Thread cfp
RUXCON 2008 FINAL CALL FOR PAPERS

Ruxcon would like to announce the final call for papers for the fifth annual
Ruxcon conference.

This year the conference will take place over the weekend of
29th to the 30th of November.

As with previous years, Ruxcon will be held at the University of
Technology, Sydney, Australia.

The deadline for submissions is the 15th of November.

* What is Ruxcon?

 Ruxcon strives to be Australia's most technical and interesting
 computer security conference. We're back for the fifth year
 and intend on bringing you another high quality conference.

 The conference is held over two days in a relaxed atmosphere,
 allowing attendees to enjoy themselves whilst expanding their
 knowledge of security.

 Live presentations and activities will cover a full range of
 defensive and offensive security topics, varying from unpublished
 research to required reading for the public security community.

 For more information, please visit http://www.ruxcon.org.au

* Presentation Information

 Presentations are set to run for 50 minutes, and will be of a formal
 nature, with slides and a speech.

* Presentation Submissions

 Ruxcon would like to invite people who are interested in security to
 submit a presentation.

 Topics of interest include, but are not limited to:

o Code analysis
o Exploitation techniques
o Network scanning and analysis
o Cryptography
o Malware Analysis
o Reverse engineering
o Forensics and Anti-forensics
o Social engineering
o Web application security
o Database security
o Legal aspects of computer security and surrounding issues
o Law enforcement activities
o Telecommunications security (mobile, GSM, VOIP, etc.)

 Submissions should thoroughly outline your desired presentation
 subject. Accompanying your submission should be the slides
 you intend to use or a detailed paper explaining your subject.

 If you have any enquiries about submissions, or would like to make a
 submission, please send an e-mail to presentations @ ruxcon dot org
 dot au

 The deadline for submissions is the 15th of November.

 If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in
   length), including: skill set, experience, and credentials.

ii. A description on your presentation or workshop (between 2-5
paragraphs in length).

* Contact Details

Presentation Submissions:  presentations @ ruxcon dot org dot au
General Enquiries: staff @ ruxcon dot org dot au



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] RUXCON 2008 CALL FOR PAPERS

2008-02-18 Thread cfp
RUXCON 2008 CALL FOR PAPERS

RuxCon would like to announce the call for papers for the fifth annual
RuxCon conference.

This year the conference will commence during the 29th/30th November.

As with previous years, RuxCon will be held at the University of
Technology, Sydney, Australia.

The deadline for submissions is the 31st of October.

* What is RuxCon?

  RuxCon strives to be Australia's most technical and interesting
  computer security conference. We're back for the fifth year
  and intend on bringing you another high quality conference.

  The conference is held over two days in a relaxed atmosphere,
  allowing attendees to enjoy themselves whilst expanding their
  knowledge of security.

  Live presentations and activities will cover a full range of
  defensive and offensive security topics, varying from unpublished
  research to required reading for the public security community.

  For more information, please visit http://www.ruxcon.org.au

* Presentation Information

  Presentations are set to run for 50 minutes, and will be of a formal
  nature, with slides and a speech.

* Presentation Submissions

  RuxCon would like to invite people who are interested in security to
  submit a presentation.

  Topics of interest include, but are not limited to:

o Code analysis
o Exploitation techniques
o Network scanning and analysis
o Cryptography
o Malware Analysis
o Reverse engineering
o Forensics and Anti-forensics
o Social engineering
o Web application security
o Database security
o Legal aspects of computer security and surrounding issues
o Law enforcement activities
o Telecommunications security (mobile, GSM, VOIP, etc)

  Submissions should thoroughly outline your desired presentation or
  workshop subject. Accompanying your submission should be the slides
  you intend to use or a detailed paper explaining your subject.

  If you have any enquiries about submissions, or would like to make a
  submission, please send an e-mail to presentations @ ruxcon dot org
  dot au

  The deadline for submissions is the 31st of October.

  If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in
length), including: skill set, experience, and credentials.

ii. A description on your presentation or workshop (between 2-5
paragraphs in length).

* Contact Details

Presentation Submissions:  presentations @ ruxcon dot org dot au
General Enquiries: staff @ ruxcon dot org dot au

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Ruxcon 2006

2006-09-25 Thread cfp
Hi,

RUXCON 2006 will be held this weekend over the 30th of September to the 1st of 
October at the University of Technology, Sydney. Doors will open at 8:30am and 
the first presentation commences at 9:30am. 

Our presentation list is complete.

RUXCON 2006 Presentations [1]:

 1. Java Class Deobfuscation - Chris Mitchell 
 2. Mechanics of the Objective-C Trifecta - Reversing, Runtime Antics,  
Exploit Development - Neil Archibald
 3. Exploiting OpenBSD - Ben Hawkes 
 4. Anti-Forensic Rootkits - Darren Bilby 
 5. Access over Ethernet: Insecurites in AoE - Morgan Marquis-Boire 
 6. Attacks Against RFID - Josh Perrymon 
 7. Unusual Bugs - Ilja van Sprundel 
 8. A Quantitive Time Series Analysis of Malware and Vulnerability Trends - 
Craig Wright 
 9. IPv6: Under the Hood - Mark Dowd 
10. Software Vulnerabilities - Daniel Hodson 
11. PE Packers Used in Malicious Software - Paul Craig 
12. Web Services: Teaching a New Dog Old Tricks - Daniel Grzelak, Colin Wong 
13. Bypassing Corporate Email Filtering - Simon Howard 
14. Hit By A Bus: Physical Access Attacks with Firewire - Adam Boileau 
15. Metafuzz: Building Boring Fuzzers Faster, Using Metadata - Ben Nagy 
16. Dynamic Port Scanning - AR, HK 
17. The Common Vulnerability Scoring System (CVSS) - Christian Heinrich 
18. Ajax Security - Andrew van der Stock

As in previous years, there will be activities and competitions, which allow 
attendees to have fun, win prizes, and socialise, all while enjoying a cold 
beer on an Australian summers day. 

Some activities which will be held during the conference include:

  * Capture the flag competition
  * Exploit development competition
  * Chilli eatoff competition

This will be the fourth year in a row in which we've brought a quality 
conference to the Australian computer security community.

Hope to see you there,

Regards,

RUXCON Staff
http://www.ruxcon.org.au

[1] http://www.ruxcon.org.au/presentations.shtml

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] RUXCON 2006 Call for Papers

2006-04-04 Thread cfp

RUXCON 2006 CALL FOR PAPERS

RuxCon would like to announce the call for papers for the fourth annual
RuxCon conference.

This year the conference will commence during the 30th of September and the
1st of October, over the long weekend.

As with previous years, RuxCon will be held at the University of Technology,
Sydney, Australia.

The deadline for submissions is the 31st of August.

* What is RuxCon?

  RuxCon strives to be Australia's most technical and interesting
  computer security conference. We're back for the fourth year running 
  and intend on bringing you another high quality conference.
 
  The conference is held over two days in a relaxed atmosphere,
  allowing attendees to enjoy themselves whilst expanding their 
  knowledge of security.

  Live presentations and activities will cover a full range of
  defensive and offensive security topics, varying from unpublished
  research to required reading for the public security community.

  For more information, please visit http://www.ruxcon.org.au

* Presentation Information

  Presentations are set to run for 50 minutes, and will be of a formal
  nature, with slides and a speech.

* Presentation Submissions

  RuxCon would like to invite people who are interested in security to
  submit a presentation.
  
  Topics of interest include, but are not limited to:

o Code analysis
o Exploitation techniques
o Network scanning and analysis
o Cryptography
o Malware Analysis
o Reverse engineering
o Forensics and Anti-forensics
o Social engineering
o Web application security
o Legal aspects of computer security and surrounding issues
o Law enforcement activities
o Telecommunications security (mobile, GSM, fraud issues, etc.)

  Submissions should thoroughly outline your desired presentation or
  workshop subject. Accompanying your submission should be the slides
  you intend to use or a detailed paper explaining your subject.

  If you have any enquiries about submissions, or would like to make a
  submission, please send an e-mail to [EMAIL PROTECTED]
  The deadline for submissions is the 31st of August.

  If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in length),
including: skill set, experience, and credentials.

ii. A description on your presentation or workshop (between 2-5
paragraphs in length).

* Contact Details

Presentation Submissions:   [EMAIL PROTECTED]
General Enquiries:  [EMAIL PROTECTED]


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/