exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

RECON 2019 Call For Papers

RECON 2019 Call For Papers
Posted Mar 26, 2019
Authored by REC0N Montreal 2019 | Site recon.cx

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It will be held June 28th through the 30th, 2019, in Montreal, Canada.

tags | paper, conference
SHA-256 | 943c9ea8eeaf47093b77924d15201f65cc7a6b61b960969450ba9bf1f71586e2

RECON 2019 Call For Papers

Change Mirror Download
Recon Montreal - Call For Papers - June 28 - 30 - 2019
Welcome to TeleMate!
ATDT1514XXXXXXX
CONNECT 300
..
DATAPAC : XXXX XXXX
XXXXXXXX
DATAPAC: Call connected to XXXX XXXX

This is a private system. Access attempts are logged. Unauthorized
access may result in prosecution.

Bienvenue!


+ + + +
+ + +
+ +
\ /
+ _ - _+_ - ,__
_=. .:. /=\ _|===|_ ||::|
| | _|. | | | | | | __===_ -=- ||::|
|==| | | __ |.:.| /\| |:. | | | | .|| : |||::|
| |- |.:|_|. :__ |.: |--|==| | .| |_ | ' |. ||. |||:.|
__|. | |_|. | |.|...||---| |==| | | | |_--. || |||. |
| | | |. | | |::.||: .| |==| | . : |=|===| :|| . ||| .|
|:.| .| | | | |:.:|| . | |==| | |=|===| . |' | | |
| | | | |' : . | ; ; ' |
' : ` : ' . ' . . :
' . R E C O N 2 0 1 9 .
` . . '
. C F P
.
june 28 to 30, 2019
montreal, quebec .

+ Hi - Flash back from 2008 . .

+ We are back

╔═════════════════════════════════════════════════════════╩════════════╗
# C F P #
╚══════════════════════════════════════════════════════════════════════╗
We are now inviting speakers to submit proposals ║
for Recon Montreal 2019. ║

Some guidelines for talks are: ║

- 30 or 60 minute presentations ║

- We are open to proposals for workshops that would occur alongside ║
talks ║

- There will be time for five to ten minute informal lightning talks ║
during the REcon party ║



╔══════════════════════════════════════════════════════════════════════╝
╚══════════════════════════════════════════════════════════════════════╗

____ _ _ _ ║
| _ \ ___ __ _(_)___| |_ _ __ __ _| |_(_) ___ _ __ ║
| |_) / _ \/ _` | / __| __| '__/ _` | __| |/ _ \| '_ \ ║
| _ < __/ (_| | \__ \ |_| | | (_| | |_| | (_) | | | | █════════════╗ ║
|_| \_\___|\__, |_|___/\__|_| \__,_|\__|_|\___/|_| |_| ║ ║
|___/ ║ ║
║ ║
Registration for the conference and training sessions is now open. ║ ║
- - - - - - - - ║ ║
You can register at: https://tickets.recon.cx/reconmtl/2019/ ║ ║
║ ║
║ ║
║ ║
║ ║
_____ _ █════════════════════════════════╩═╣
|_ _| __ __ _(_)_ __ (_)_ __ __ _ ║
| || '__/ _` | | '_ \| | '_ \ / _` | ║
| || | | (_| | | | | | | | | | (_| | ║
|_||_| \__,_|_|_| |_|_|_| |_|\__, | █═══════════════════════════╗ ║
|___/ ║ ║
║ ║
║ ║
This year we have another great set of trainings available: ║ ║
║ ║
║ ║
╔════════════════════════════════════════════════════════════════════╩═╣
║ ║
╠─■ Mobile and Telecom Applied Hacking and Reverse Engineering █
║ by P1Sec (2 days: 26 June - 27 June) ║
║ ║
╠─■ IC Reverse Engineering & code dump by Olivier Thomas █
║ (3 days: 25 June - 27 June) ║
║ ║
╠─■ System Firmware Attack and Defense for the Enterprise █
║ by Oleksandr Bazhaniuk and Jesse Michael ║
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ An Introduction to Modern Binary Exploitation █
║ by Alexei Bulazel and Jeremy Blackthorne ║
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ Program Analysis Training █
║ by Sophia d’Antoine and Evan Jensen ║
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ WebAssembly Module Reverse Engineering and Analysis █
║ by Patrick Ventuzelo ║
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ WReal-world IoT & embedded device hacking by Thomas Roth █
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ Reverse Engineering Malware by Nicolas Brulez █
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ Windows Internals for Reverse Engineers by Alex Ionescu █
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ Hardware Hacking by Dmitry Nedospasov █
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ The ARM IoT Exploit Laboratory by Saumil Shah █
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ Windows Kernel Rootkits Techniques and Analysis by Bruce Dang █
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ Botnet Takeover Attacks For Reverse Engineers █
║ by Brett Stone-Gross and Tillmann Werner ║
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ MacOS Mojave and iOS 12 Kernel Internals for Security Researchers █
║ by Stefan Esser ║
║ (4 days: 24 June - 27 June) ║
║ ║
╠─■ Advanced Fuzzing and Crash Analysis ║
║ by Richard Johnson (4 days: 24 June - 27 June) ║
║ ║
____ __ ║
/ ___|___ _ __ / _| ___ _ __ ___ _ __ ___ ___ ║
| | / _ \| '_ \| |_ / _ \ '__/ _ \ '_ \ / __/ _ \ ║
| |__| (_) | | | | _| __/ | | __/ | | | (_| __/ █═══════════════╗ ║
\____\___/|_| |_|_| \___|_| \___|_| |_|\___\___| ║ ║
║ ║
║ ║
Conference talks in the following fields are encouraged (but not ║ ║
limited to): ║ ║
║ ║
║ ║
╔════════════════════════════════════════════════════════════════════╝ ║
╠─■ Hardware reverse engineering ║
║ ║
╠─■ Software reverse engineering █
║ ║
╠─■ Protocol reverse engineering █
║ ║
╠─■ Finding vulnerabilities and writing exploits █
║ ║
╠─■ Novel data visualization for hackers and reverse engineers █
║ ║
╠─■ Bypassing security and software protections █
║ ║
╠─■ Attacks on cryptography in hardware and software █
║ ║
╠─■ Techniques for any of the above on new or interesting architectures
║ ║
╠─■ Wireless hacking (We aren't talking about wifi here) █
║ ║
╠─ ┼ Anything else K-Rad 1337 █══════════════════════════════════════╣
╙ ║
____ _ _ ____ __ __ ___ _____ _ ║
/ ___|| | | | __ )| \/ |_ _|_ _| | | ║
\___ \| | | | _ \| |\/| || | | | | | ║
___) | |_| | |_) | | | || | | | |_| ║
|____/ \___/|____/|_| |_|___| |_| (_) ║

■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■

How to submit: https://cfp.recon.cx/reconmtl2019/ ║

Alternatively you can send your submission to cfpmontreal2019@recon.cx ║

You may send additional supporting parser exploits in other formats. ║

Please include: ║

- Speaker name(s) and/or handle ║
- Contact information, e-mail, and cell phone (optional) ║
- Presentation title ║
- Presentation subtitle ║
- Length of presentation (30 or 60 minutes) ║
- Description of the presentation ║
- Brief biography ║
- If available, presentation supporting materials (website, code, ║
paper, slides, outline, ...) ║
- Why it is cool / why you want to present it ║
- If you have any objections to recording the presentation ║
- Country of origin (Passport origin, current geographical location) ║
- Let us know if you need help with a Canadian visa (So we can start ║
the procedure early) ║
- Whether your employer will pay for your travel or if you need ║
assistance from us. ║


Get back to us soon! The first round of the CFP will end on April 14, ║
and the CFP closes on May 12. ║

You can optionally email your response using the following PGP key (You║
can also find it at https://recon.cx/2019/montreal/contact/): ║

╔═══════════════════════════════════════════╦══════════════════════════╝
THIS FILE PASSED THROUGH...
_______________________________________________________________________
/ NO STANDARDS \
/ * * * * * * * * * * * * \
/__ HS AA CD OH RD SD TR MR RS CS ARQ SYN DeC USHQ __\
\---------------------------------------------------------------------/
\ R E C 0 N BBS KNOWN W O R L D-W I D E FOR 0-DAY WAREZ /
.oo*\____ ___________________________________________________ ____/
O \_/ KRu1z1n' At 9600 14.0 Gigz Online \_/
o
O +------------------------------------------+
o 514
O SERVING THE PHRESHEST CRACKS IN THE LATA
O 514
O CHECK:
O [*] 0-1(MAX) DAY LATE
O [*] H/P/A/V/C
O [*] Demos/Artpacks
O [*] 1200/2400/9600 BAUD
O [*] 1500MB
"o. [ ] LAMERS
"O [?] DRAMA
"O
"ooo##" BROUGHT TO YOU BY:
Sysop........................Dataworm
CoSysop.....................TheGamble
CoSysop......................ChatBoss
CoSysop........................Fukami
CoSysop.....................IronEagle
Ex-CoSysop.....................Nivenh
+1[514] XXX - 6PWN
+1[337] XXX - 9777
+1[LUL] XXX - 3771
+9[110] KID - DING

-----BEGIN PGP PUBLIC KEY BLOCK-----
Comment: GPGTools - https://gpgtools.org
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=F4B9
-----END PGP PUBLIC KEY BLOCK-----

+++ATH0

N0 C4RR13R

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close