what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Hacktivity 2017 Call For Papers

Hacktivity 2017 Call For Papers
Posted May 29, 2017
Site hacktivity.com

The Hacktivity 2017 Call For Papers has been announced. It will be held from October 20th through the 21st, 2017 in Budapest, Hungary.

tags | paper, conference
SHA-256 | 07397fcebea555c248b18611220f81f63d91e071526bbeccebbe4a6b055edadf

Hacktivity 2017 Call For Papers

Change Mirror Download
[ == Hacktivity 2017 Call For Papers  ==]

Conference: October 20-21, 2017
CFP closing date: June 30, 2017
CFP notification to authors: July 31, 2017
Venue: Budapest, Hungary

Web: https://hacktivity.com
Email: cfp _!{at}!_ hacktivity.com
Twitter: @hacktivityconf

[ == The Hacktivity Crew == ]

The Hacktivity hacking conference brings together the official and
alternative representatives of information security profession with all
those interested in the area, in an informal, yet educational, and most of
the times highly technical.

[ == Call For Contributions/Speakers

This year we are offering two alternatives: you can either give a
presentation as usual or you can give a hello workshop.

[ == Presentations == ]

This is the business as usual. We require similar thing as in any other IT
security conference CFP. We are accepting presentations from a wide
spectrum of IT security topics. It is up to you to apply for a presentation
which is in line with the spirit of Hacktivity. We favor presentations with
demo.

Please write your slide deck in English. Your speech can be in English
(favored) or Hungarian.

As a speaker you can have either 20A minutes or 40 Aminute s lot to
present your topic.

[ == Hello workshop == ]

We all know there is a huge difference between seeing and doing. Real
knowledge grows from issuing your first command. Therefore, to help
visitors start off learning we organize hello workshops. Hello workshops
are short courses introducing basic/intermediate IT security skills.
Previous years included topics like:

Burp Extensions
Malicious PDF analysis
Basic rootkit techniques
SQL injections
A hello workshop should meet the following requirements:

participants should acquire a definite and useful piece of knowledge;
participants bring their own equipment you should calculate with the
diversity;
a workshop will not have more than 16 attendees;
it should fit into 20 plus 20 minutes (seeing plus doing) from preparation
to takeAaways.
one workshop will be held approx. 3 times during the two days

[ == Topics == ]

Here are some topics that we are especially interested in:

- Vulnerabilities at unexpected territories
- Exploit mitigations and their mitigations
- Malware analysis inside or outside the sandbox
- Blue Team techniques / operation
- Big Data / Cloud / APT / any_fancy_buzzword A Whatas the big deal? Are
there any / What are the new threats?
- Extraordinary stories of #FAIL

Any research which brings something brand new to the security world
These are just examples though, please feel free to submit your talk as
long as it fits to the spirit of Hacktivity.

[ == How to apply as a speaker == ]

Please fill out our CFP application form: http://bit.ly/2pqGiy5

[ == Speaker benefits == ]

Speaker benefits are applicable to every person presenting at least one 40
minute or two 20 minute presentations. If you would like to hold a Hello
workshop and need coverage for travel or accommodation please contact us!

Hacktivity offers speakers accommodation for 2 nights next to the venue of
the conference and cover travel expenses up to 350 EUR .

Please note that we have flexibility regarding the travel expenses. The
travel contribution is agreed individually with every speaker . Please
contact us at cfp _!{at}!_ hacktivity.com for more details.

[ == Copyright == ]

As a speaker or workshop presenter you should accept the following use of
your intellectual properties:

Presentations will be recorded and made available on our website.

To the event a conference paper will be published with
presentation/workshop titles and abstracts, the presentersa bio and their
photos. The brochures will be distributed at the registration for all
participants of the conference.

Presentations and workshop materials will available on the conference web
page after the event in pdf form.

During the presentation we will take photos and use them in our
publications and will be published on our site.

We are not going to use your materials in any other form mentioned above
without your prior consent.

Cheers,
Attila Marosi
head of program committee


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close