exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

beVX Offensive Security Conference 2018 Call For Papers

beVX Offensive Security Conference 2018 Call For Papers
Posted Jan 11, 2018
Authored by beVX CFP | Site bevxcon.com

beVX! has announced its call for papers. It will take place September 20th through the 21st, 2018 in Hong Kong.

tags | paper, conference
SHA-256 | bec537f06a7424b170bd86c02dc04456f73a802ff1e9996a480384813b13b111

beVX Offensive Security Conference 2018 Call For Papers

Change Mirror Download
We are proud to announce the first all offensive security conference - beVX!

20-21 September 2018 // Hong-Kong

beVX focuses on highly technical offensive security topics.

*Website*: bevxcon.com


*Call For Papers*


*Overview*
We are pleased to announce the CFP for the first edition of beVX. We are
looking for deep-knowledge technical talks - come and take part of the
journey

*Important Dates*

Call for Papers Opens: January 15 2018
Call for Papers Closes: June 20 2018
Notification to Authors: July 20 2018

*Where*

Hong Kong - We will publish the venue in the next couple of weeks

*Topics of interest*

Vulnerability discovery
Advanced exploitation techniques
Browsers Exploitation
OS Kernel Exploitation
Mobile Exploitation
Revolutionary Web Hacking Technique
Mitigation bypass techniques
Hardware reverse engineering
Software reverse engineering
Protocol reverse engineering
Attacks on cryptography in hardware and/or software

*Speakers benefits*

Three nights of accommodation
Flight (Up to 2,000$ USD - Coach)
Speaker fee - 1,000$ USD (exclusive content not presented anywhere else
before + 1,000$ USD == total of 2,000$ USD)
Speakers party

*Submission*

Talks will be 45 minutes including questions. We will have Simultaneous
Translation (English-Canonize / English-Mandarin) but the Presentations
must be in English

E-mail for submission: ssd@beyondsecurity.com

*Call For workshops*

*Overview*

We are pleased to announce the Call For Workshops for the first edition of
beVX. We are looking for deep-knowledge technical workshops - come and
take part of the journey

*Important Dates*

Call for Workshops Opens: January 15 2018
Call for Workshops Closes: June 20 2018
Notification to Trainers: July 20 2018

*Where*

Hong Kong - We will publish the venue in the next couple of weeks

*Topics of interest*

Vulnerability discovery
Advanced exploitation techniques
Browsers Exploitation
OS Kernel Exploitation
Mobile Exploitation
Revolutionary Web Hacking Technique
Mitigation bypass techniques
Hardware reverse engineering
Software reverse engineering
Protocol reverse engineering

*Trainers benefits*

Three nights of accommodation
Flight (Up to 2,000$ USD - Coach)
Trainers fee - 10,000$ USD
Speakers party

*Submission*

1 day training - must be in English

E-mail for submission: ssd@beyondsecurity.com

--
Thanks
Maor Shwartz
Beyond Security
GPG Key ID: 6D273779F52A9FC2


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close