Conference in The Netherlands is now open!
Call for Papers: http://cfp.hackinthebox.org/
Event Website: http://conference.hitb.org/hit
HITBSecConf has always been an attack oriented deep-knowledge research
event aimed at not only bringing the security community together, but
one that also highlights and showcases cutting edge research from up and
coming talent. If you're working on new ways to break out of sandboxes,
mess with millions of IoT devices or if you've found a new way to defend
these threats, we definitely want to see you on stage at HITBSecConf2016
- Amsterdam!
Held at the NH Grand Krasnapolsky in Amsterdam on the 26th and 27th of
May, the opening keynote will be delivered by Morgan Marquis-Boire, one
of the influential minds of IT Security and Italian WIRED's 50 people of
2014. On Day 2, Chris Evans formerly head of Google's Project Zero will
deliver the morning keynote and Sophia D'Antoine, who has been working
on malicious applications of hardware side channels, will deliver the
closing keynote.
We are looking for 60 and 120 minute offensive focused deep-knowledge
presentations. Research that is new, novel and preferably material
that has not been presented elsewhere before.
Submission Deadlines:
Round #1 selection: 14th January 2016
Round #2 selection: 14th February 2016
Each accepted submission will entitle the speaker(s) to
accommodation for 3 nights / 4 days and travel expense reimbursement
up to EUR1200.00 _per speaking slot_
Topics of interest include, but are not limited to the following:
IoT Security
Cloud Security
File System Security
3G/4G/WIMAX Security
SS7/GSM/VoIP Security
Security of Medical Devices
Critical Infrastructure Security
Smartphone / MobileSecurity
Smart Card and Physical Security
Network Protocols, Analysis and Attacks
Applications of Cryptographic Techniques
Side Channel Analysis of Hardware Devices
Analysis of Malicious Code / Viruses / Malware
Data Recovery, Forensics and Incident Response
Hardware based attacks and reverse engineering
Windows / Linux / OS X / *NIX Security Vulnerabilities
Next Generation Exploit and Exploit Mitigation Techniques
NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security
WHITE PAPER: If your presentation is short listed for inclusion into the
conference program, a technical white paper must also be provided for
review (3000 - 5000 words).
Your submissions will be reviewed by The HITB CFP Review Committee:
Charlie Miller, Uber Advanced Technology Center
Katie Moussouris, Chief Policy Officer, HackerOne
Marco Balduzzi, Lead Research Scientist, Trend Micro
Dr. Sophia Bekrar, Senior Security Researcher, Vupen
Itzik Kotler, Chief Technology Officer, Security Art
Cesar Cerrudo, Chief Technology Officer, IOActive
Jeremiah Grossman, Founder, Whitehat Security
Andrew Cushman, Senior Director, Microsoft
Saumil Shah, Founder CEO Net-Square
Thanh 'RD' Nguyen, THC, VNSECURITY
Alexander Kornburst, Red Database
Fredric Raynal, QuarksLab
Shreeraj Shah, Founder, BlueInfy
Emmanuel Gadaix, Founder, TSTF
Andrea Barisani, Inverse Path
Philippe Langlois, TSTF
Ed Skoudis, InGuardians
Haroon Meer, Thinkst
Chris Evans, Google
Raoul Chiesa, TSTF/ISECOM
rsnake, SecTheory
Gal Diskin, Palo Alto Networks
Skyper, THC
Note: We do not accept product or vendor related pitches. If you would
like to showcase your company's products or technology at the
conference, please email conferenceinfo@hackinthebox.or
a sponsorship kit
Regards,
Hafez Kamal
Hack in The Box (M) Sdn. Bhd
36th Floor, Menara Maxis
Kuala Lumpur City Centre
50088 Kuala Lumpur, Malaysia
Tel: +603-26157299
Fax: +603-26150088
------------------------------
This list is sponsored by: Information Assurance Certification Review Board
Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
http://www.iacertification.org
------------------------------
Komentarų nėra:
Rašyti komentarą