lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 31 Jan 2018 11:26:33 -0500 (EST)
From: cfpmontreal2018@...on.cx
To: <fulldisclosure@...lists.org>
Subject: [FD] Recon Montreal 2018 Call For Papers - 0xE - Registration -
	Training - Conference - Submit! - PGP key

- RECON MONTREAL 2018 -

0xE  - CFP - Training Registration - Conference - Submit! - PGP key
║││■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■││║
╠┐└■└┐│■│■┤──╚╝──╔════╗┌┬──┐  ■│├┤│╔╗│├┤│■  ┌──┬┐╔════╗──╚╝──├■│■│┌┘■┘┌╣
╠■─╔═╗┘││■┤──■ ┌─╚════╝├┘▄─┘┌──┤├┤├╣╠┤├┤├──┐└─▄└┤╚════╝─┐ ■──├■││└╔═╗─■╣
■──║ ║─┘■─┤──█┌┘┌─┘││└─■  ▄─┘ ■┴┘└┘╚╝└┘└┴■ └─▄  ■─┘││└─┐└┐█──├─■└─║ ║──■
┌──╚═╝──┐■┘┌──┘┌┘ ┌┘└              ..              ┘└┐ └┐└──┐└■┌──╚═╝──┐
■┌■──╔╗ │ ┌┘■──┘┌─┘      ...                ...      └─┐└──■└┐ │ ╔╗───┐■
╠││■■  ■│■┌─■                                                 ■│     ││╣
║││└■  ■─┴■          https://recon.cx/2018/montreal                  ││║
║│└──────────────■       June 15 - 16 - 17, 2018                     ││║
║└─────────────────■            Montreal        ■────────────────────┘│║
╚═╦═╦═╦═╦═════╦════════════════════════════════════════════════════════╝
╔══════════════════════════════════════════════════════════════════════╗
╚══════════════════════════════════════════════════════════════════════╝
┌───┐┌──┐┌──┐┌──┐┐┌─┐   ┬ ┌──┐   ┌──┐ ╔════════════════════════════════╗
│ ■─┘├─  │   │  │├┘ │   │ └──┐   │  │ ║                                ║
└   ┘└──┘└──┘└──┘└  ┘   ┘ └──┘   └─┘└ ╚═══════╦═════════════════╦══════╝
┌──┐┌──┐┐┌─┐─┐ ┌──┐┌  ┐┌─┬─┐┌──┐┌──┐ ╔════════╩══════╗╔═════════╩══════╗
│   │  │├┘ │ │ ├──┘│  │  │  ├─  │ ─┘ ║///////////////║║                ║
└──┘└──┘└  ┘ └ ┘   └──┘  ┴  └──┘└  ┘ ╚═══════════════╝╚══╦═════════════╝
┌──┐┌──┐┌──┐┌  ┐┌──┐  ┬ ┌─┬─┐ ┐ ┌╔═══════════════════════╩═════════════╗
└──┐├─  │   │  ││ ─┘  │   │   └│┘║                                     ║
└──┘└──┘└──┘└──┘└  ┘  ┴   ┴    ┴ ╚════════╦════════════════════╦═══════╝
┌──┐┌──┐┐┌─┐┌──┐┌──┐┌──┐┌──┐┐┌─┐┌──┐┌──┐╔═╩═══════════════╗╔═══╩═══════╗
│   │  │├┘ │├─  ├─  │ ─┘├─  ├┘ ││   ├─  ║                 ║║///////////║
└──┘└──┘└  ┘┘   └──┘└  ┘└──┘└  ┘└──┘└──┘╚══╦══════════════╝╚═══════════╝
┌   ┐┬┌─┬─┐┬  ┬   ┌──┐ ╔═══════════════════╩═══════════════════════════╗
│ │ ││  │  ├──┤   │  │ ║                                               ║
└─┴─┘┴  ┴  ┴  ┴   └─┘└ ╚══════════╦════════════╦═══════════════════════╝
┌───┌──┐┌──┐┌  ┐┌──┐ ╔════════════╩═════╗╔═════╩═══════╗               ║
├─  │  ││   │  │└──┐ ║//////////////////║║             ║├───────────────
┘   └──┘└──┘└──┘└──┘ ╚══════════════════╝╚════╦════════╝               ║
┌──┐┐┌─┐       ╔══════════════════════════════╩══╗                     ║
│  │├┘ │       ║                                 ║├─────────────────────
└──┘└  ┘       ╚═════════════════════╦═══════╦═══╝                     ║
┌───┐┌──┐┐  ┌┌──┐┌──┐┌──┐┌──┐ ╔══════╩═══╗╔══╩══════════════════╗      ║
│ ■─┘├─  └┐┌┘├─  │ ─┘└──┐├─   ║//////////║║                     ║├──────
└   ┘└──┘ └┘ └──┘└  ┘└──┘└──┘ ╚══════════╝╚══════════════════╦══╝      ║
┌──┐┐┌─┐┌──┐ ┬ ┐┌─┐┌──┐┌──┐┌──┐ ┬ ┐┌─┐┌──┐ ╔═════════════════╩═════════╗
├─  ├┘ ││ ─┐ │ ├┘ │├─  ├─ ││ ─┘ │ ├┘ ││ ─┐ ║                           ║
└──┘└  ┘└──┘ ┴ └  ┘└──┘└──┘└  ┘ ┴ └  ┘└──┘ ╚══╦═════════════════╦══════╝
┌──┐┐┌─┐   │ ╔════════════════════════════════╩══════╗╔═════════╩══════╗
│  │├┘ │┌──│ ║///////////////////////////////////////║║                ║
└─┘└└  ┘└──┘ ╚═══════════════════════════════════════╝╚════════╦═══════╝
┌──┐   │┐  ┌┌──┐┐┌─┐┌──┐┌──┐   │ ╔═════════════════════════════╩═══════╗
│  │┌──│└┐┌┘│  │├┘ ││   ├─  ┌──│ ║                                     ║
└─┘└└──┘ └┘ └─┘└└  ┘└──┘└──┘└──┘ ╚═══════════════════╦══════════════╦══╝
┌──┐ ┐ ┌─ ┌──┐│  ┌──┐ ┬┌─┬─┐┌──┐┌─┬─┐ ┬┌──┐┐┌─┐ ╔════╩══════╗╔══════╩══╗
├─   └─┐  ├──┘│  │  │ │  │  │  │  │   ││  │├┘ │ ║           ║║/////////║
└──┘─┘ └  ┘   └─┘└──┘ ┴  ┴  └─┘└  ┴   ┴└──┘└  ┘ ╚═════════╦═╝╚═════════╝
┌─┬─┐┌──┐┌──┐ ┬  ┬ ┐┌─┐ ┬┌──┐┌  ┐┌──┐┌──┐ ╔═══════════════╩════════════╗
  │  ├─  │    ├──┤ ├┘ │ │└──┤│  │├─  └──┐ ║                            ║
  ┴  └──┘└──┘ ┴  ┴ └  ┘ ┴   │└──┘└──┘└──┘ ╚═══════════════╦════════════╝
╔═════════════════════════════════════════════════════════╩════════════╗
#                           C F P                                      #
╚══════════════════════════════════════════════════════════════════════╗
We are now inviting speakers to submit proposals                       ║
for Recon Montreal 2018.                                               ║
                                                                       ║
Some guidelines for talks are:                                         ║
                                                                       ║
 - 30 or 60 minute presentations                                       ║
                                                                       ║
 - We are open to proposals for workshops that would occur alongside   ║
   talks                                                               ║
                                                                       ║
 - There will be time for five to ten minute informal lightning talks  ║
   during the REcon party                                              ║
                                                                       ║
                                                                       ║
                                                                       ║
╔══════════════════════════════════════════════════════════════════════╝
╚══════════════════════════════════════════════════════════════════════╗
                                                                       ║
 ____            _     _             _                                 ║
|  _ \ ___  __ _(_)___| |_ _ __ __ _| |_(_) ___  _ __                  ║
| |_) / _ \/ _` | / __| __| '__/ _` | __| |/ _ \| '_ \                 ║
|  _ <  __/ (_| | \__ \ |_| | | (_| | |_| | (_) | | | | █════════════╗ ║
|_| \_\___|\__, |_|___/\__|_|  \__,_|\__|_|\___/|_| |_|              ║ ║
           |___/                                                     ║ ║
                                                                     ║ ║
Registration for the conference and training sessions is now open.   ║ ║
                           - - - - - - - -                           ║ ║
You can register at: https://tickets.recon.cx/reconmtl/reconmtl18/   ║ ║
                                                                     ║ ║
                                                                     ║ ║
                                                                     ║ ║
                                                                     ║ ║
 _____          _                   █════════════════════════════════╩═╣
|_   _| __ __ _(_)_ __ (_)_ __   __ _                                  ║
  | || '__/ _` | | '_ \| | '_ \ / _` |                                 ║
  | || | | (_| | | | | | | | | | (_| |                                 ║
  |_||_|  \__,_|_|_| |_|_|_| |_|\__, |   █═══════════════════════════╗ ║
                                |___/                                ║ ║
                                                                     ║ ║
                                                                     ║ ║
This year we have another great set of trainings available:          ║ ║
                                                                     ║ ║
                                                                     ║ ║
╔════════════════════════════════════════════════════════════════════╩═╣
║                                                                      ║
╠─■  Mobile and Telecom Applied Hacking and Reverse Engineering        █
║    by P1Sec (2 days: 13 June - 14 June)                              ║
║                                                                      ║
╠─■  IC Reverse Engineering 101 by Olivier Thomas                      █
║    (2 days: 13 June - 14 June)                                       ║
║                                                                      ║
╠─■  Defending From Platform Firmware Threats                          █
║    by Yuriy Bulygin, Oleksandr Bazhaniuk                             ║
║    (3 days: 12 June - 14 June)                                       ║
║                                                                      ║
╠─■  Reverse Engineering Malware by Nicolas Brulez                     █
║    (4 days: 11 June - 14 June)                                       ║
║                                                                      ║
╠─■  Windows Internals for Reverse Engineers by Alex Ionescu           █
║    (4 days: 11 June - 14 June)                                       ║
║                                                                      ║
╠─■  Hardware Hacking by Dmitry Nedospasov                             █
║    (4 days: 11 June - 14 June)                                       ║
║                                                                      ║
╠─■  The ARM IoT Exploit Laboratory by Saumil Shah                     █
║    (4 days: 11 June - 14 June)                                       ║
║                                                                      ║
╠─■  Windows Kernel Rootkits Techniques and Analysis by Bruce Dang     █
║    (4 days: 11 June - 14 June)                                       ║
║                                                                      ║
╠─■  Botnet Takeover Attacks For Reverse Engineers                     █
║    by Brett Stone-Gross and Tillmann Werner                          ║
║    (4 days: 11 June - 14 June)                                       ║
║                                                                      ║
╠─■  MacOS High Sierra and iOS 11 Kernel Internals                     █
║    for Security Researchers                                          ║
║    (4 days: 11 June - 14 June)                                       ║
║                                                                      ║
╠─■  Binary Literacy: Systematic Static Reverse                        █
║    Engineering by Rolf Rolles (4 days: 11 June - 14 June)            ║
║                                                                      ║
╠─■  Vulnerability Discovery and Triage Automation                     ║
║    by Richard Johnson (4 days: 11 June - 14 June)                    ║
║                                                                      ║
  ____             __                                                  ║
 / ___|___  _ __  / _| ___ _ __ ___ _ __   ___ ___                     ║
| |   / _ \| '_ \| |_ / _ \ '__/ _ \ '_ \ / __/ _ \                    ║
| |__| (_) | | | |  _|  __/ | |  __/ | | | (_|  __/  █═══════════════╗ ║
 \____\___/|_| |_|_|  \___|_|  \___|_| |_|\___\___|                  ║ ║
                                                                     ║ ║
                                                                     ║ ║
Conference talks in the following fields are encouraged (but not     ║ ║
limited to):                                                         ║ ║
                                                                     ║ ║
                                                                     ║ ║
╔════════════════════════════════════════════════════════════════════╝ ║
╠─■  Hardware reverse engineering                                      ║
║                                                                      ║
╠─■  Software reverse engineering                                      █
║                                                                      ║
╠─■  Protocol reverse engineering                                      █
║                                                                      ║
╠─■  Finding vulnerabilities and writing exploits                      █
║                                                                      ║
╠─■  Novel data visualization for hackers and reverse engineers        █
║                                                                      ║
╠─■  Bypassing security and software protections                       █
║                                                                      ║
╠─■  Attacks on cryptography in hardware and software                  █
║                                                                      ║
╠─■  Techniques for any of the above on new or interesting architectures
║                                                                      ║
╠─■  Wireless hacking (We aren't talking about wifi here)              █
║                                                                      ║
╠─ ┼ Anything else 1337   █════════════════════════════════════════════╣
╙                                                                      ║
 ____  _   _ ____  __  __ ___ _____   _                                ║
/ ___|| | | | __ )|  \/  |_ _|_   _| | |                               ║
\___ \| | | |  _ \| |\/| || |  | |   | |                               ║
 ___) | |_| | |_) | |  | || |  | |   |_|                               ║
|____/ \___/|____/|_|  |_|___| |_|   (_)                               ║
                                                                       ║
■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■
                                                                       ║
How to submit:                                                         ║
                                                                       ║
Please send your submission to cfpmontreal2018@...on.cx in plain text  ║
format.                                                                ║
                                                                       ║
You may send additional supporting parser exploits in other formats.   ║
                                                                       ║
Please include:                                                        ║
                                                                       ║
 - Speaker name(s) and/or handle                                       ║
 - Contact information, e-mail, and cell phone (optional)              ║
 - Presentation title                                                  ║
 - Presentation subtitle                                               ║
 - Length of presentation (30 or 60 minutes)                           ║
 - Description of the presentation                                     ║
 - Brief biography                                                     ║
 - If available, presentation supporting materials (website, code,     ║
   paper, slides, outline, ...)                                        ║
 - Why it is cool / why you want to present it                         ║
 - If you have any objections to recording the presentation            ║
 - Country of origin (Passport origin, current geographical location)  ║
 - Let us know if you need help with a Canadian visa (So we can start  ║
   the procedure early)                                                ║
 - Whether your employer will pay for your travel or if you need       ║
   assistance from us.                                                 ║
                                                                       ║
                                                                       ║
Get back to us soon! The first round of the CFP will end on March 15,  ║
and the CFP closes on April 15. The first round of talks will be       ║
announced during the second week of April and the final selection      ║
will be announced during the second week of May.                       ║
                                                                       ║
You can optionally email your response using the following PGP key (You║
can also find it at https://recon.cx/2018/montreal/contact/):          ║
                                                                       ║
╔═══════════════════════════════════════════╦══════════════════════════╝
■                                           ║                          .
■                                           ║                          .
■                                           ║                          .
■    PGP                            ════════╝                          .
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=5D6U
-----END PGP PUBLIC KEY BLOCK-----

+++ATH0

N0 C4RR13R



_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ