lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20150413034004.487C210922@ruxcon.org.au>
Date: Mon, 13 Apr 2015 03:40:04 +0000
From: cfp@...con.org.au
To: bugtraq@...urityfocus.com
Subject: Ruxcon 2015 Call For Presentations

Ruxcon 2015 Call For Presentations
Melbourne, Australia, October 24-25
CQ Function Centre

http://www.ruxcon.org.au

The Ruxcon team is pleased to announce the first round of Call For Presentations for Ruxcon 2015.

This year the conference will take place over the weekend of the 24th and 25th of October at the CQ Function Centre, Melbourne, Australia.

The deadline for submissions is the 30th of June, 2015.


.[x]. About Ruxcon .[x]. 

Ruxcon is ia premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations.

The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security.

Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community. 


.[x]. Important Dates .[x].

 June 30 - Call For Presentations Close
 October 22-23 - Breakpoint Conference
 October 24-25 - Ruxcon Conference


.[x]. Topic Scope .[x].

 o Topics of interest include, but are not limited to:
 o Mobile Device Security
 o Virtualization, Hypervisor, and Cloud Security
 o Malware Analysis
 o Reverse Engineering
 o Exploitation Techniques
 o Rootkit Development
 o Code Analysis
 o Forensics and Anti-Forensics
 o Embedded Device Security
 o Web Application Security
 o Network Traffic Analysis
 o Wireless Network Security
 o Cryptography and Cryptanalysis
 o Social Engineering
 o Law Enforcement Activities
 o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)


.[x]. Submission Guidelines .[x].

In order for us to process your submission we require the following information:

 1. Presentation title
 2. Detailed summary of your presentation material
 3. Name/Nickname
 4. Mobile phone number
 5. Brief personal biography
 6. Description of any demonstrations involved in the presentation
 7. Information on where the presentation material has or will be presented before Ruxcon

 To submit a presentation please use our submission form: http://goo.gl/WXNBvr

* As a general guideline, Ruxcon presentations are between 45 and 60 minutes, including question time. 
 

.[x]. Contact .[x].

 o Email: presentations@...con.org.au
 o Twitter: @ruxcon

Content of type "text/html" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ