lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20091016224233.69B4E7439A@mail.kyx.net>
Date: Fri, 16 Oct 2009 15:42:33 -0700 (PDT)
From: dr@....net (Dragos Ruiu)
To: bugtraq@...urityfocus.com
Subject: CanSecWest 2010 CALL FOR PAPERS (deadline Nov 30, conf. Mar22-26) and PacSec (Nov 4/5) Selections

We extend our apologies if you are inconvenienced by multiple copies of this messages.

We would like to announce the PacSec 2009 Paper Selections, and
the opening of the 2010 CanSecWest Call For Papers. Given
the proximity of the Winter Olympics in Vancouver one month
before the conference, we would advise all planning to attend
to make travel preparations well in advance for next year... 

PacSec 2009 Presentations

Keynote Presentation November 4: Mitsugu Okatani, National Information Security Center / Ministry of Defense / Japan Air Self-Defense Force
Keynote Presentation November 5: Hideaki Kobayashi, Information Technology Promotion Agency
Virtualisation security and the Intel privilege model - Tavis Ormandy & Julien Tinnes, Google
Silicon Chips: No More Secrets - Karsten Nohl
Filter Resistant Code Injection on ARM - Yves Younan, University of Leuven
iPhone SMS Fuzzing and Exploitation - Charlie Miller, Independent Security Evaluators
The Microsoft View of the 2008 Threat Landscape - Tony Lee, Microsoft
Cloud Defense in the Post-BotWar Era - Ikuo Takahashi
The Android Security Story: Challenges and Solutions for Secure Open Systems - Rich Cannings & Alex Stamos, Google, iSec Partners
Stealthy Rootkit : How malware fools live memory forensics - Tsukasa Ooi, Livegrid
Defending a Social Network - Alex Rice, Facebook
Museum of API Obfuscation on Win32 - Masaki Suenaga, Symantec
!exploitable and Effective Fuzzing Strategies as a Regular Part of Test - Jason Shirk, Microsoft
Analyzing Word and Excel Document Encryption - Eric Filiol, ESIEA - Operational cryptology and Virology Lab
English Dojo: Auditing Java Security, Marc Schoenefeld
Japanese Dojo: Assembler Programming and Reverse Engineering Malware, Yuji Ukai, fourteenforty

Pacsec will be held on November 4 and 5th, in Aoyama, Tokyo.

CanSecWest 2010 CALL FOR PAPERS

   VANCOUVER, Canada -- The eleventh annual CanSecWest applied        
   technical security conference - where the eminent figures in       
   the international security industry will get together share        
   best practices and technology - will be held in downtown           
   Vancouver at the the Sheraton Wall Centre on March 22-26,          
   2010. The most significant new discoveries about computer          
   network hack attacks and defenses, commercial security             
   solutions, and pragmatic real world security experience will       
   be presented in a series of informative tutorials.                 
                                                                      
   The CanSecWest meeting provides international researchers a        
   relaxed, comfortable environment to learn from informative         
   tutorials on key developments in security technology, and          
   collaborate and socialize with their peers in one of the           
   world's most scenic cities - a short drive away from one of        
   North America's top skiing areas.                                  
                                                                      
   The CanSecWest conference will also feature the availability       
   of the Security Masters Dojo expert network security sensei        
   instructors, and their advanced, and intermediate, hands-on        
   training courses - featuring small class sizes and practical       
   application excercises to maximize information transfer.           
                                                                      
   We would like to announce the opportunity to submit papers,        
   and/or lightning talk proposals for selection by the               
   CanSecWest technical review committee. This year we will be        
   doing one hour talks, and some shorter talk sessions.              
                                                                      
   Please make your paper proposal submissions before November        
   30th, 2009.                                                        
                                                                      
   Some invited papers have been confirmed, but a limited number      
   of speaking slots are still available. The conference is           
   responsible for travel and accomodations for the speakers. If      
   you have a proposal for a tutorial session then please make        
   your submission using our new online form, available at            
   https://cansecwest.com/submissions/. If the on-line form is        
   not available you can alternatively email a synopsis of the        
   material and your biography, papers and, speaking background       
   to secwest09 [at] cansecwest.com . Only slides will be needed      
   for the March paper deadline, full text does not have to be        
   submitted - but will be accepted if available. This year we        
   will be opening up the presentation guidelines to include          
   talks not in English which we will offer to translate for
   the speaker if they are not a native English speaker.                                                   
                                                                      
   The CanSecWest 2010 conference consists of tutorials on            
   technical details about current issues, innovative techniques      
   and best practices in the information security realm. The          
   audiences are a multi-national mix of professionals involved       
   on a daily basis with security work: security product              
   vendors, programmers, security officers, and network               
   administrators. We give preference to technical details and        
   new education for a technical audience.                            
                                                                      
   The conference itself is a single track series of                  
   presentations in a lecture theater environment. The                
   presentations offer speakers the opportunity to showcase           
   on-going research and collaborate with peers while educating       
   and highlighting advancements in security products and             
   techniques. The focus is on innovation, tutorials, and             
   education instead of product pitches. Some commercial content      
   is tolerated, but it needs to be backed up by a technical          
   presenter - either giving a valuable tutorial and best             
   practices instruction or detailing significant new technology      
   in the products.                                                   
                                                                      
   Paper proposals should consist of the following information:       

    1. Presenter, and geographical location (country of               
       origin/passport) and contact info (e-mail, postal              
       address, phone, fax).                                          
    2. Employer and/or affiliations.                                  
    3. Brief biography, list of publications and papers.              
    4. Any significant presentation and educational                   
       experience/background.                                         
    5. Topic synopsis, Proposed paper title, and a one paragraph      
       description.                                                   
    6. Reason why this material is innovative or significant or       
       an important tutorial.                                         
    7. Optionally, any samples of prepared material or outlines       
       ready.                                                         
    8. Will you have full text available or only slides?              
    9. Language of preference for submission.                         
   10. Please list any other publications or conferences where        
       this material has been or will be published/submitted.         
   11. If you have multiple speakers, please outline why each         
       presenter is necessary and what each is presenting.            

   Please include the plain text version of this information in       
   your email as well as any file, pdf, sxw, ppt, or html             
   attachments.                                                       
                                                                      
   Please forward the above information to secwest09 [at]             
   cansecwest.com or use our on-line submissions form at              
   https://cansecwest.com/submissions/ to be considered for           
   placement on the speaker roster, or have your lightning talk       
   scheduled. If you contact anyone else at our organization          
   please ensure you also cc the submission address with your         
   proposal or use the on-line submissions system or else it may      
   be omitted from the review process.                               


thanks,
--dr

P.S. please accept my apologies if your submission feedback
hasn't arrived yet from PacSec (but no news is good news for
a few which will be invited to Vancouver ;-).

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
Tokyo, Japan November 4/5 2009  http://pacsec.jp
Vancouver, Canada March 22-26 2010  http://cansecwest.com
Amsterdam, Netherlands, June 16/17 2010  http://eusecwest.com
pgpkey http://dragos.com/ kyxpgp

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ