lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <5fdd45350503120944334a5a29@mail.gmail.com>
Date: Sat, 12 Mar 2005 18:44:09 +0100
From: louis <trumpbour@...il.com>
To: bugtraq@...urityfocus.com
Subject: summercon looking for speakers


CALL FOR PAPERS: Speak at SummerCon 2005

http://www.summercon.org/rfp

SUMMERCON XVII Annual Conference on Computer Security
June 3-5, 2005 Austin, TX (USA)

Program Committee Chair: Mark Trumpbour
Organized by: The folks at SummerCon (http://www.summercon.org)
Theme for 2005: Tools of the Trade

There are many opinions about what a hacker is and what a hacker
isn't. But all hackers have a universal fascination with tools, their
design, their use and abuse, and especially the techniques that they
enable.

Modern tool designers are software engineers who are prompted by the
absence of a needed application, or limitations of an existing one.
The amount of time and effort saved by a well-designed tool is strong
motivation for the relatively small amount of effort invested. Those
who provide these fruits of labor to the rest of the world are often
highly regarded by hackers and resented by those who have lost a
degree of control as a result.

To the hacker almost everything is a tool. Some tools are very common
and easy to find, like a terminal, a web-browser, or a screwdriver.
Other tools can be downloaded, bought from a store, or made
MacGyver-style from everyday items. Many applications contain unknown
functions, and it is often the hacker thought process that discovers
what they are and how they work. Learning to use a tool requires
practice, and it is only through use of a tool that a hacker gains
proficiency.

But caution always follows the hacker because of the tools they choose
to find, use, and keep in their toolbox. Tools are often
misinterpreted by the authorities, the media and general public as
dangerous and malicious. Simple knowledge about a tool is often viewed
as a threat in a security conscious environment. The modern day cowboy
no longer wears his tools on a belt.

In the history of the world, tools have lead to the growth of many
innovations. A succession of newer better tools that replaced older
obsolete tools can be seen as the driving force of civilization. The
simple belief that there must be a way to get the job done, is
sometimes the only tool a hacker needs.
TYPES OF SUBMISSIONS ACCEPTED

   1. Research Papers
   2. Technology Reviews
   3. Position Papers
   4. Investigative Reports
   5. Proposals for a Discussion Panel
   6. Demonstrations
   7. Workshops
   8. New Topics and Invited Sessions Proposals
   9. Rap Song 

EXAMPLES OF PAST SESSIONS

Speakers always ask us for examples of past sessions. The best place
to look is in the Archives section of the SummerCon website:

http://www.summercon.org/content.agent?page_name=archive

Here are a few of our favorites from SummerCon Past:

   1. High Tech Crime Investigation, the FBI Way
   2. Interesting SQL Injection Techniques and Countermeasures
   3. RandomTalk: Whats Wheres Whys and Hows of Random Numbers
   4. War Driving and WiFi: The 201.11b Survey
   5. Hacking Your Digital Identity
   6. Number Generation with a Perspective on Factorisation
   7. The Media Report (Q&A session with a reporter from the media)
   8. The Network IS the Virus
   9. Secure Digital Music Initiative Challenge Results
  10. Practical Auditing of HTTP(s) Servers
  11. Network Mapping & Host Identification
  12. Beer Hacking

EXTENDED ABSTRACTS AND PAPER DRAFTS SUBMISSION

Extended abstracts or paper drafts should be sent taking into account
the following format:

   1. Major theme of the paper should be related to at least one of
the major themes given above.
   2. Paper title.
   3. Extended abstract of 250 to 1000 words and/or paper drafts of
500 to 5000 words, in English.
   4. Author(s) and/or co-author(s) with names (or pseudonyms),
addresses, telephone and fax numbers, and e-mail addresses (or other
reasonable contact information).

Extended abstracts or paper drafts can be sent to this email address
as an attachment: rfp2005@...mercon.org
please refrain from sending content containing naked memebers of limp
bizkit. Paris Hitlon is acceptable.


They can also be snail mailed to:
SummerCon 2005
4551 Forbes Ave
Pittsburgh PA 15213


DEADLINES
April 15th, 2005:
    Submission of extended abstracts (500-1500) words or paper drafts
(2000-5000) words.
April 29th, 2005
    Acceptance notifications.
May 13th, 2005
    Submission of camera-ready papers: hard copies and electronic versions. 

thanks,

-louis


Powered by blists - more mailing lists