exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Rooted CON 2013 Call For Papers

Rooted CON 2013 Call For Papers
Posted Sep 6, 2012
Site rootedcon.es

RootedCON 2013 Call For Papers - RootedCON is a security congress that will take place between March 7 to 9, 2013 in Madrid (Spain). With an estimated capacity of 670 people, it is one of the largest specialized conferences ever undertaken in the country and one of the largest in Europe, with profiles of attendees ranging from students, state forces, through market professionals in IT security or simply technology enthusiasts.

tags | paper, conference
SHA-256 | 11029accce51a6ffe621bde34e401c66b388459d9b1e9d4a2ec8659b6d220883

Rooted CON 2013 Call For Papers

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hello all,

Here you've attached all the necessary information for any potential
speakers willing to have a talk at Rooted CON 2013.

Kind regards to all and thanks in advance

______ _ _ ____ ___ _ _
/ / _ \ ___ ___ | |_ ___ __| |/ ___/ _ \| \ | |
/ /| |_) / _ \ / _ \| __/ _ \/ _` | | | | | | \| |
/ / | _ < (_) | (_) | || __/ (_| | |__| |_| | |\ |
/_/ |_| \_\___/ \___/ \__\___|\__,_|\____\___/|_| \_|

RootedCON 2013 - 'Call for Papers'


PLEASE, READ CAREFULLY ALL THE DETAILS IN THIS DOCUMENT.


- -=] About RootedCON

RootedCON is a security congress that will take place between March 7
to 9, 2013 in Madrid (Spain).

With an estimated capacity of 670 people, is one of the largest
specialized conferences ever undertaken in the country and one of the
largest in Europe, with
profiles of attendees ranging from students, state forces, through
market professionals in IT security or simply technology enthusiasts.

- -=] Types of talks

Two type of talks can be accepted:

- - Fast talks: 20 minutes.
- - Standard talks: 50 minutes.

There will be a limited number of each of the types and may even adapt the
calendar for an interesting talk extends beyond 20 minutes
or, for specific needs, reducing a 50 minutes one.

- -=] Topics

Any relevant topic associated with the concept of Hacking, for
example, and not being these the only topics that interest us:

- - Hacking, cracking, phreaking, virii, WiFi, VoIP, GSM...
- - Critical Infrastructure Security, SCADA environments...
- - Hardware Hacking, Jtag, SWJ, Dap, ...
- - Console and gaming hacking.
- - Mobile terminals: android, iOS, Windows mobile, maemo,...
- - Reverse engineering, debugging, hooking, fuzzing, exploiting,...
- - Innovative tools and techniques both for defense and attack.
- - APT, botnets and malware.
- - (In)security cloud, virtual environments,...
- - Cryptographical techniques, steganography, covert channels,...
- - Forensics and antiforensics.
- - Networking, level2 and level3,...
- - Very original talks like the kind of audience we have...

In the last edition, there were popular talks related to "Hardware
Hacking", modificating the behavior of robots, specialized hardware,
or even devices creation. Related Keywords: Drones, Arduino, *copters,
Roomba, alarms, Jtag, cameras ...

For this edition, we are especially interested in 0days
vulnerabilities and all kinds of security problems in whatever
critical infrastructures or platforms.

- -=] Papers submission procedure

We only accept talks submissions through the online form which has
been prepared for this purpose:

https://www.rootedcon.es/cfp2013-en/ (english)
https://www.rootedcon.es/cfp2013-es/ (spanish)

Any other submission method will not be considered as "official" and
will not be evaluated by the selection team.

- -=] Schedule and milestones

05 Sep 2012 - Launch of Call for papers
14 Dic 2012 - Call For Papers closing
Dic 2012 - Get in touch and interviews with the speakers for final
confirmation.
Jan 2013 - Publication of speakers schedule.

*4 Feb 2012 - Speakers materials submission to Rooted*

7, 8 y 9 Mar 2013 - /RootedCON2013


- -=] Benefits and privileges as speaker

Each speaker will receive the following benefits and privileges:

- - A dinner with the rest of the speakers, RootedLabs teachers and
RootedCON crew.
- - Accommodation (costs assumed by the organization)
- - Travel (costs assumed by the organization)
- - Full access to the whole congress
- - Free drinks at the party ;)
- - Management of potential job opportunities.
- - A surprise in gratitude for participation.

- -=] Duties and responsibilities of speakers

All speakers presenting at RootedCON 2013 must:

a) Confirm that the presented paper is technical and accompanied by a
proof of concept (PoC).

b) Send the material of the talk prior to the dates of the Congress.
Within the
submission of material is important to include details about the demos
that will be performed.

c) Develop the slides according to the RootedCON 2013 official templates.

d) Explicitly accept that the materials presented, as well as video
and audio recordings
made shall be published in either mechanisms RootedCON content
management or
other media in the future. RootedCON *won't censor* any of the
materials, recordings,
media publication or whatever mechanisms by which are made accessible
to the public and the congress attendees.

- -=] Sponsors and Partners

RootedCON is always looking for quality sponsors and partners. If you
have a proposal or
you think your company may be interested, please contact us at:

sponsors-AT-rootedcon.es

IMPORTANT: Due to the highly technical subject of the congress, and
the preferences shown by attendees
in multiple surveys, we encourage potential sponsors who intend to
have a slot as speaker attempting to adapt as far as possible to the
tastes of most
RootedCON asset you have: its audience.

Any help, comments, ideas, suggestions or collaborations that we
should do get will be considered and
valued with all its importance: it is very important for the Congress
to receive such proposals, and
they depend on you to organize the best event possible.

- -=] Critical points to consider

1. Time management and the duration of the talks are one of the
critical points in the Congress. Rather, they should ask for a longer talk
than trying to rush twenty minutes, without allowing time for audience
questions.

2. It will be appreciated exclusive talks, which
not previously published in any other forum, blog, website, event or
conference.

3. We believe in the responsible Full-disclosure so, if the idea is to
present a
Zero-Day, we want confirmation from that has contacted the
manufacturer / victim, if this
contact has not been made, we offer to manage the contact.

4. A cause for termination of the relationship between the Speaker and
RootedCON is to not deliver
of (every) material on the date indicated.

5. PLEASE, it's very important to * CLEARLY * indicate if
accommodation and
travel is needed or not when you submit your proposal, Rooted
reserves the right not to meet such needs if it is not initially
requested.

- -=] How to contact:

info-AT-rootedcon.es


- -=] Our links

- - Web: http://www.rootedcon.es/en/
- - Twitter: @rootedcon #rooted y #rooted2013
- - Facebook: http://bit.ly/fbookrooted
- - LinkedIn: http://bit.ly/linkedinrooted
- - Rooted mailing-list (spanish): rootedcon@listas.rooted.es
- - Vimeo: http://www.vimeo.com/rootedcon
- - Slideshare: http://www.slideshare.net/rootedcon
_____ _____ _____ _____ _____ _____ _____ _____ _____ _____ _____
_____ _____
|_____|_____|_____|_____|_____|_____|_____|_____|_____|_____|_____|_____|_____|
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iQEcBAEBAgAGBQJQR5wvAAoJEDImBUOIKbdk89kH/R7L6Oc0GzUhYFNDskg5KMV5
VleMqbdJeQAe4FwHF9elfdZsHi1vNTTn6dh2RVzTS3FEjbtONmYeMQzMHkkT4V73
TkNotCc4rbNjgzej467n6wOd+KMZ8eTshmHh+H2OrazATKK7V+qNq6nnUnvIY8Rg
w+J6An4rGBMybOTFH+3YsAtsUKuXensjWZUCw6HNPL/N9WZon5gI+wFVcvPZDARY
TffCZu2SqK7gAQuD/UyNPH2YO+p0Byi8O6sR+t4J7N7w9+MJTh5FyviUzzqK5l1A
vSUQQkMkJ5Crlpv1VJ6kj0nofp5FQxiP5oTSEwAPeTSo4Oo2UrFF2RbH61ZWUAE=
=RFLm
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close