exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DeepSec 2012 Call For Papers

DeepSec 2012 Call For Papers
Posted Feb 27, 2012
Site deepsec.net

DeepSec 2012 Call For Papers - "Sector v6" will be held November 27th to the 30th, 2012 in Austria.

tags | paper, conference
SHA-256 | bf095e6d0d3623b8f974e12bbcf45836644c033d55b9a4139a9f2ff5cc9d6c0b

DeepSec 2012 Call For Papers

Change Mirror Download
--- DeepSec 2012 "Sector v6" - Call for Papers

We are looking for talks and trainings for the DeepSec In-Depth Security
Conference 2012 ("Sector 6"). We invite researchers, developers,
and everyone else dealing with information security to submit their
We offer slots for talks and workshops, and we encourage everyone
on projects to present their results and findings.

Please visit our updated website for more details about the venue, the
schedule and information about our past conferences:

The DeepSec offers a mix of different topics and aspects like current
threats and vulnerabilities, social engineering and psychological
as well as security management and philosophy. Our speakers and trainers
traditionally come from the security community, companies, hacker
journalism and academic organisations.

You can submit content for three categories:
- Talks for the conference (45 minute slots)
- Two day workshops
- U21 (a special category for young security researchers)


--- Talks:
To make it short, talks should be up-to-date, of a high quality that
matches our previous years and preferably exclusive (which of course is
a hard requirement but it will be one evaluation criterion). Topics from
all security disciplines are welcome but we encourage you to submit
about emerging technologies and concepts like these (in alphabetical
- Cloud computing and virtualisation
- Design flaws ("defective by design" or even "secure by design")
- IPv6 (again, until protocol designers get it right)
- Mobile computing and communications
- Risk assessment
- Security intelligence
- Security management and IT governance
- Topics that have a high impact on IT security

Talks must not:
- Endorse products, vendors or specific solutions
- Discredit anyone or anything, let's be fair

Speaker privileges:
- Free entrance to the conference
- Hotel accommodation for three nights (single/double room)
- Travel expenses up to EUR 800,-
- Invitation to our famous Speaker's Dinner with genuine Austrian food

--- Workshops:
We look for highest quality and most current topics. We had very good
feedback for our workshops in the past and we want to keep it that way.
Our audience has a very high level of technical understanding and is
deeply involved with security management, implementation, operation and
What we like to see:
- Applied cryptography
- In-depth workshops on securing infrastructure or systems therein
- Mobile communications, vulnerabilities and defences
- Protocol and software development/design
- Social engineering and psychological aspects

Workshops should not:
- Cover too much (two days sounds a lot, but isn't)
- Focus on specific vendors or products
- Teach too much basic stuff (keep the level sufficiently high)

Trainer privileges:
- Free entrance to the conference
- Invitation to our famous Speaker's Dinner with Austrian food
- 50% of the net profit of your class

--- U21 category:
We don't take the age so serious as it might sound but this category is
especially for young security researchers who are *not* working in a
professional sense yet, e.g. (full-time) students, or attending college,
technical school or just interested in computer security. We will also
accept submissions if you are a little bit older than 21 years.
Don't be shy if your idea is not groundbreaking or not the top
vulnerability discovered in the last 5 years. There's always room for
some extra hacking and we'd be happy to provide a basis for
breakthroughs. :)
We want to encourage you to submit your _own_ research.
We will ask some questions and evaluate your submission, so don't cheat.
What we like to see:
- anything that is your own idea and/or implementation
- a valuable extension to existing ideas and/or implementations
- anything you have discovered on your own and is not discussed a lot
yet or has been accepted as a CVE (common exploit and vulnerability)

Please don't:
- Implement something which has been around for long
- Reuse something existing

U21 privileges:
- A 15 minute lightning talk on the conference
- Free entrance to the conference
- Invitation to the Speaker's Dinner, but no alocohol without age
check ;)
- We help you with your travel expenses to Vienna, but cannot cover the
full speakers allowance, if in doubt talk to us we can work something

All CfP submissions must go through the form on our web site:

Please make sure that you read http://blog.deepsec.net/?p=294 before
submitting your ideas. Practice is never a bad thing. :)

We will support anyone if you have question, need clarification
whatever, just contact us for additional questions: cfp@deepsec.net

In-Depth Security Conference 2012 - DeepSec 2012
November 27th to 30th 2012 https://deepsec.net/
Venue: Renaissance Penta Vienna Hotel - Austria
DeepSec GmbH - FN 294621 t - Handelsgericht Wien
Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    9 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By