lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200808261255.59920.dr@kyx.net>
Date: Tue, 26 Aug 2008 12:55:59 -0700
From: Dragos Ruiu <dr@....net>
To: full-disclosure@...ts.grok.org.uk
Subject: PacSec 2008 CFP   (Deadline Sept. 1, Conference Nov. 12/13) and BA-Con 2008 Speakers (Sept. 30/  Oct. 1)PacSec 2008 CFP  (Deadline Sept. 1, Conference Nov. 12/13) and BA-Con 2008 Speakers (Sept. 30/  Oct. 1)

I would like to thank the academy, and endorsement of the Great  
Council, for placing us on their top sellout list among such esteemed  
company. But, uh just before you engrave the gold statuette, there is  
the small matter of a some mis-spellings.... so in the spirit of  
selling out...  it's....

the larch.

nope. ok.

How about a small editorial - I'm told that Argentina will be blazing  
into uncharted territory by instituting internet based voting in  
presidential elections imminently. Most people are treating this with  
remarkably little concern, IMHO. (See: http://xkcd.com/463/)  We've  
taken the liberty of inviting someone who has actually looked at some  
of these systems (Harri Hursti) in to inject some realism (:-) and  
practical experience gained from analyzing other such plans into the  
efforts as the legislation for this new system is being built. Ask  
Harri for his comparison between fraud in the financial system and  
electronic voting... :-)

--8<--kyx--8<--

Spanish url: http://ba-con.com.ar/speakers.html?language=es

Speaker list and Dojos for BA-Con, September 30, October 1st.
(all presentations in both Spanish and English)

  Presentations:

  WPA/WPA2: how long is it gonna make it - Cédric Blancher & Simon Maréchal, 
EADS & SGDN
  Security Concerns of Firmware Updates (SPI System BIOS and Embedded  
Controller) - Sun Bing
  A Practical Approach to Mitigate and Remove Malware - Ching Tim Meng
  Advances in Attacking Interpreted Languages: Javascript - Justin  
Ferguson
  Understanding eVoting in post Everest, TTBR world - Harri Hursti
  SecViz 007 - Raffael Marty, Splunk
  Pass-the-hash Toolkit for Windows - Hernan Ochoa, Core
  Linux 2.6 kernel rootkits - Daniel Palacio, Immunity
  Reverse Engineering Dynamic Languages, a Focus on Python - Aaron  
Portnoy & Ali Rizvi-Santiago, TippingPoint
  All the Crap Aircrafts Receive and Send - Hendrik Scholz
  Teflon: anti-stick for the browsers attack surface - Saumil Shah,  
Net-Square
  Hacking PXE without reboot (using the BIOS network stack for other 
purposes) - Julien Vanegue, CESAR
  LeakedOut: the Social Networks You Get Caught In - Jose Orlicki, Core

Dojos (September 28/29):
  Reverse Code Engineering - Edgar Barbosa, COSEINC
  Practical 802.11 Wi-Fi (In)Security - Cédric Blancher, EADS
  Effective Fuzzing using the Peach Fuzzing Platform (2 days) -  Michael 
Eddington, Leviathan
  Assembler for Exploits - Gerardo Richarte, Core
  The Exploit Lab - Saumil Shah, Net-Square

We would like to especially thank the gracious sponsorship of Core, 
Microsoft, and Symantec/SecurityFocus, without whom this event 
would not be possible and/or would be a lot more expensive for attendees.
We also suggest that conference attendees stay a couple of days
longer and go to ekoparty right after this event.

cheers,
--dr

--8<--kyx--8<--

English url: http://pacsec.jp/speakers.html?language=en
Japanese url: http://pacsec.jp/speakers.html?language=ja
(the following should be up soon...)
Spanish url: http://pacsec.jp/speakers.html?language=es
Chinese url: http://pacsec.jp/speakers.html?language=cn

PacSec 2008 CALL FOR PAPERS

World Security Pros To Converge on Japan

    TOKYO, Japan -- To address the increasing importance of information
    security in Japan, the best known figures in the international
    security industry will get together with leading Japanese
    researchers to share best practices and technology. The most 
    significant new discoveries about computer network hack attacks 
    and defenses will be presented at the sixth annual PacSec conference.

    The PacSec meeting provides an opportunity for foreign specialists  
    to be exposed to Japanese innovation and markets and collaborate 
    on practical solutions to computer security issues. In an informal
    setting with a mixture of material bilingually translated in both
    English and Japanese the eminent technologists can socialize and
    attend training sessions.

    Announcing the opportunity to submit papers for the PacSec 2008
    network security training conference. The conference will be held
    November 12/13th in Tokyo at the Aoyama Diamond Hall above
    Omotesando station. The conference focuses on emerging
    information security tutorials - it is a bridge between the
    international and Japanese information security technology
    communities..

    Please make your paper proposal submissions before September 1st,
    2008. Slides for the papers must be submitted for translation by
    October 1, 2008.

    A some invited papers have been confirmed, but a limited number of
    speaking slots are still available. The conference is responsible
    for travel and accomodations for the speakers. If you have a 
    proposal for a tutorial session then please email a synopsis of 
    the material and your biography, papers and, speaking background 
    to secwest08 [at] pacsec.jp . Tutorials are one hour in length, but 
    with simultaneous translation should be approximately 45 minutes 
    in English, or Japanese. Only slides will be needed for the October 
    paper deadline, full text does not have to be submitted.

    The PacSec conference consists of tutorials on technical details
    about current issues, innovative techniques and best practices in the
    information security realm. The audiences are a multi-national mix
    of professionals involved on a daily basis with security work: security
    product vendors, programmers, security officers, and network
    administrators. We give preference to technical details and
    education for a technical audience.

    The conference itself is a single track series of presentations in a
    lecture theater environment. The presentations offer speakers the
    opportunity to showcase on-going research and collaborate with peers
    while educating and highlighting advancements in security products
    and techniques. The focus is on innovation, tutorials, and education
    instead of product pitches. Some commercial content is tolerated,
    but it needs to be backed up by a technical presenter - either giving 
    a valuable tutorial and best practices instruction or detailing
    significant new technology in the products.

    Paper proposals should consist of the following information:
     1. Presenter, and geographical location (country of
        origin/passport) and contact info (e-mail, postal address,
        phone, fax).
     2. Employer and/or affiliations.
     3. Brief biography, list of publications and papers.
     4. Any significant presentation and educational
        experience/background.
     5. Topic synopsis, Proposed paper title, and a one paragraph
        description.
     6. Reason why this material is innovative or significant or an
        important tutorial.
     7. Optionally, any samples of prepared material or outlines
        ready.
     8. Will you have full text available or only slides?
     9. Please list any other publications or conferences where
        this material has been or will be published/submitted.
     10. Do you have any special demo or network requirements
        for your presentation?

    Please include the plain text version of this information in
    your email as well as any file, pdf, sxw, ppt, or html
    attachments.

    Please forward the above information to secwest08 [at]
    pacsec.jp to be considered for placement on the speaker
    roster, or have your lightning talk scheduled. The deadline
    is soon for this one: September 1st 2008.


cheers,
--dr

P.S. We have also set the dates for CanSecWest 2010 for Mar. 22-26.
With the Olympics in the neighborhood a month before we have to
plan way ahead.
-- 
World Security Pros. Cutting Edge Training, Tools, and Techniques
Buenos Aires, Argentina   Sept. 30 / Oct. 1 - 2008    http://ba-con.com.ar
Tokyo, Japan  November 12/13 2008  http://pacsec.jp
Vancouver, Canada  March 16-20 2009  http://cansecwest.com
pgpkey http://dragos.com/ kyxpgp

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ