what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

RECON 2015 Call For Papers

RECON 2015 Call For Papers
Posted Jan 9, 2015
Authored by REC0N 2015 | Site recon.cx

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. For 2015 it will be held June 19th through the 21st and the Call For Papers has been announced.

tags | paper, conference
SHA-256 | 09695547b783f1e6eaf7825f0dbd02ce95b7c52091bf5f147761f36e0eebbc5d

RECON 2015 Call For Papers

Change Mirror Download
   +                    +                     +         +
+ + +
+ +
\ /
+ _ - _+_ - ,__
_=. .:. /=\ _|===|_ ||::|
| | _|. | | | | | | __===_ -=- ||::|
|==| | | __ |.:.| /\| |:. | | | | .|| : |||::|
| |- |.:|_|. :__ |.: |--|==| | .| |_ | ' |. ||. |||:.|
__|. | |_|. | |.|...||---| |==| | | | |_--. || |||. |
| | | |. | | |::.||: .| |==| | . : |=|===| :|| . ||| .|
|:.| .| | | | |:.:|| . | |==| | |=|===| . |' | | |
| | | | |' : . | ; ; ' |
' : ` : ' . ' . . :
' . .
` . R E C O N 2 0 1 5 . '
. C F P ' .
' https://recon.cx
. June 19 to 21, 2015 .
Montreal, Canada .


REcon is a computer security conference with a focus on reverse
engineering and advanced exploitation techniques. It is held annually
in Montreal, Canada.

The conference offers a single track of presentations over the span
of three days along with technical training sessions held before
the presentation dates. Technical training varies in length between
two and four days.

REcon 2015 is almost upon us. As with years past, it will offer a
great lineup of trainings, talks from some of the top reversers in the
world, and a lot of fun.

Attendees help define the event. They have always been, and will always
be, those looking to learn something new, share ideas, and unwind in a
welcoming environment. With the release of this CFP, we are happy to
announce registration is now open.

We are now inviting speakers to submit proposals for this year's talks.
Some guidelines for talks are:

- 30 or 60 minute presentations
- We are open to proposals for workshops that would occur alongside
talks
- There will be time for five to ten minute informal lightning talks
during the REcon party

Registration for training is also now open. This year we have another
great set of trainings available:

- Reversing telecom platforms for security by Philippe Langlois (2
days: 17-18 June)
- Hardware Hacking by Joe Grand (2 days: 17-18 June)
- The Exploit Laboratory: Advanced Browser Exploitation by Saumil
Shah (2 days: 15-16 June)
- The Exploit Laboratory: Master by Saumil Shah (2 days: 17-18 June)
- Security of BIOS/UEFI System Firmware from Attacker's and Defender's
Perspective by Yuriy Bulygin (3 days: 16-18 June)
- Reverse Engineering Malware by Nicolas Brulez (4 days: 15-18 June)
- Windows Internals for Reverse Engineers by Alex Ionescu (4 days:
15-18 June)
- Botnet Takeover Attacks for Reverse Engineers by Brett Stone-Gross
and Tillmann Werner (4 days: 15-18 June)
- Windows Kernel Rootkits Techniques and Analysis by Bruce Dang (4
days: 15-18 June)
- Utilizing Programmable Logic for Analyzing Hardware Targets by
Dmitry Nedospasov (4 days: 15-18 June)
- OS X Kernel Internals for Security Researchers by Stefan Esser (4
days: 15-18 June)

The conference talks in the following fields are encouraged (but not
limited to):

- Hardware reverse engineering
- Software reverse engineering
- Protocol reverse engineering
- Finding vulnerabilities and writing exploits
- Novel data visualization for hackers and reverse engineers
- Bypassing security and software protections
- Attacks on cryptography in hardware and software
- Techniques for any of the above on new or interesting architectures
- Wireless hacking (We aren't talking about wifi here)

How to submit:

Please send your submission to cfp2015 at reconcx in plain text format.
You may send additional supporting documentation in other formats.

Please include:

- Speaker name(s) and/or handle
- Contact information, e-mail, and cell phone (optional)
- Presentation title
- Presentation subtitle
- Length of presentation between 30 or 60 minutes (including 5-10 min
for questions)
- Description of the presentation
- Brief biography
- If available, presentation supporting materials (website, code,
paper, slides, outline, ...)
- And why it is cool, or why you want to present it
- If we are allowed to release the video of the presentation
- Country of origin (Passport origin, current geographical location)
- Let us know if you need help with a Canadian visa (So we can start
the procedure early)
- Whether your employer will pay for your travel or if you need
assistance from us.

Get back to us soon! The first round of the CFP will end on March 27,
and the CFP closes on April 24. The first round of talks will be
announced during the first week of April and the final selection will
be announced during the first week of May.

You can optionally email your response using the following PGP key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1
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=HgNZ
-----END PGP PUBLIC KEY BLOCK-----
Login or Register to add favorites

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close