lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20160127024511.ECB2AD6058@mail.recon.cx>
Date: Tue, 26 Jan 2016 21:45:11 -0500 (EST)
From: cfp2016@...on.cx
To: <fulldisclosure@...lists.org>
Subject: [FD] Recon 2016 Call For Papers - June 17 - 19, 2016 - Montreal,
	Canada

          \                       +                               
          -6))     +                +                             
             \                                                    
                                                  +               
                                                                  
                                                                  
                                                                  
+                     +                                     +     
                                                      +           
                                                                  
                                                ▀▄   ▄▀           
                                               ▄█▀███▀█▄          
                                              █▀███████▀█         
                                              █ █▀▀▀▀▀█ █         
            .  -  ., _                           ▀▀ ▀▀            
                      __\u/__                                     
      '                   '                                       
                                                   ##             
  +                                               ##              
                                                   ##             
                                      \ /                         
                                     - + -                    ,__.
       _=.    .:.  !      /5\       _|=='|_                  ||::|
      |  |    _|.  !,'', |   |     | |   |'|   \  _^_  / _-_|||::|
      |==|_ .|  |  __,-  |.T.|.;"!\| |:. | |     /_|_\   | :|||: |
      |  |c :|.:|_|. :__ |.: |--|==| |  .| |   ~ ((O)) ~ | =4||:.|
    __|. | |_7. | |.|...||---|  |==| |   | | __ / /|\  \.| .|||. |
 __|==|  |   |X | | |::.||: .|  |==| |.  || ~~~/:.:.:.:.\| '|=| .|
 = [  | .|   |X___  |:.:|| . |  |==| | :.| ~~~/:.:.:.:.:.\  |=|  |
   | :   |   |X|    |  _!-----|===== : --- ~~/:.:.:.:.|-------|  :
   '     :   |X ,  :'         |=====   :::|~/:.:.:.:.:| " "  '   .
                                                                  
                          |                                       
                        |/_\|                                     
--------------------------"---------------------------------------
                                                       CREDIT 1010
   `        .            R E C O N 2016         .                '
                 .      0xA  Anniversary             .            
      .                 .    C F P          '               .     
             '          https://recon.cx                          
         .            June  17 to 19, 2016       .            .   
 .             '        Montreal, Canada                    .     
                                                                  
                                                                  
REcon is a computer security conference with a focus on reverse
engineering and advanced exploitation techniques.  It is held annually
in Montreal, Canada.

The conference offers a single track of presentations over the span
of three days along with technical training sessions held before
the presentation dates.  Technical training varies in length between
two and four days.

REcon 2016 is almost upon us. This year is actually the 10th Recon.
It will offer great lineup of trainings, talks from some of the top
reversers in the world, and a lot of fun (I mean it's going to be our
0xA anniversary!). Come and join us for the celebration and help make
this year an unforgettable experience!

Attendees help define the event. They have always been--and always will
be--those looking to learn something new, share ideas, and unwind in a
welcoming environment. With the release of this CFP, we are happy to
announce registration is now open.

We are now inviting speakers to submit proposals for this year's talks.
Some guidelines for talks are:

 - 30 or 60 minute presentations
 - We are open to proposals for workshops that would occur alongside
   talks
 - There will be time for five to ten minute informal lightning talks
   during the REcon party

Registration for training is also now open. This year we have another
great set of trainings available:

 - Mobile and Telecom Applied Hacking and Reverse Engineering by
   Philippe Langlois (2 days: 15-16 June)  
 - Hands-on Hardware Hacking and Reverse Engineering by Joe Grand
   (2 days: 15-16 June)  
 - Reverse Engineering Malware by Nicolas Brulez (4 days: 13-16 June)  
 - Windows Internals for Reverse Engineers by Alex Ionescu (4 days:
   13-16 June)  
 - Hardware Hacking (Advanced) by Dmitry Nedospasov
   (4 days: 13-16 June)  
 - The ARM Exploit Laboratory by Saumil Shah (4 days: 13-16 June)  
 - Windows Kernel Rootkits Techniques and Analysis by Bruce Dang
   (4 days: 13-16 June)  
 - iOS and OS X Kernel Internals for Security Researchers by Stefan
   Esser (4 days: 13-16 June)  
 - Botnet Takeover Attacks for Reverse Engineers by Brett Stone-Gross
   and Tillmann Werner (4 days: 13-16 June)  
 - Security of System Firmware from Attacker and Defender Perspectives
   by Yuriy Bulygin, Oleksandr Bazhaniuk, Andrew Furtak and John
   Loucaides (4 days: 13-16 June)  

Conference talks in the following fields are encouraged (but not
limited to):

 - Hardware reverse engineering
 - Software reverse engineering
 - Protocol reverse engineering
 - Finding vulnerabilities and writing exploits
 - Novel data visualization for hackers and reverse engineers
 - Bypassing security and software protections
 - Attacks on cryptography in hardware and software
 - Techniques for any of the above on new or interesting architectures
 - Wireless hacking (We aren't talking about wifi here)
 + Anything else elite

How to submit:

Please send your submission to cfp2016 at recon.cx in plain text format.
You may send additional supporting parser exploits in other formats.

Please include:

 - Speaker name(s) and/or handle
 - Contact information, e-mail, and cell phone (optional)
 - Presentation title
 - Presentation subtitle
 - Length of presentation (30 or 60 minutes)
 - Description of the presentation
 - Brief biography
 - If available, presentation supporting materials (website, code,
   paper, slides, outline, ...)
 - Why it is cool / why you want to present it
 - If you have any objections to recording the presentation
 - Country of origin (Passport origin, current geographical location)
 - Let us know if you need help with a Canadian visa (So we can start
   the procedure early)
 - Whether your employer will pay for your travel or if you need
   assistance from us.

Get back to us soon! The first round of the CFP will end on March 15,
and the CFP closes on April 15. The first round of talks will be
announced during the first week of April and the final selection will
be announced during the first week of May.

You can optionally email your response using the following PGP key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=wnAd
-----END PGP PUBLIC KEY BLOCK-----

+++ATH0

N0 C4RR13R


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ