what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

HITBCFP-2006.txt

HITBCFP-2006.txt
Posted Mar 8, 2006
Site conference.hackinthebox.org

HITBSecConf2006 Call For Papers. Set to take place from September 18th - 21st 2006 at The Westin Kuala Lumpur, this years conference promises to once again deliver an International deep-knowledge security conference.

tags | paper, conference
SHA-256 | daa99740797b7c6862aaa2ba10e2281b2bc98ffc10e2a9a927c79b68fbc1c632

HITBCFP-2006.txt

Change Mirror Download
Greetings from Hack in The Box -- We are pleased to announce that the
Call for Paper (CfP) for HITBSecConf2006 - Malaysia is now open! Set to
take place from September 18th - 21st 2006 at The Westin Kuala Lumpur,
this years conference promises to once again deliver an International
deep-knowledge security conference. HITBSecConf has been described as
"the most intimate of hacker gatherings" and is the largest network
security conference in Asia!

SUBMISSION

HITBSecConf is a deep-knowledge technical conference. Talks that are
more technical or that discuss new and never before seen attack methods
are of more interest than a subject that has been covered several times
before. Summaries not exceeding 250 words should be submitted (in plain
text format) to cfp -at- hackinthebox.org for review and possible
inclusion in the programme.

Submissions are due no later than 1st of May 2006

TOPICS

Topics of interest include, but are not limited to the following:

· Analysis of network and security vulnerabilities
· Firewall technologies
· Intrusion detection
· Data Recovery and Incident Response
· GPRS, 3G and CDMA Security
· Identification and Entity Authentication
· Network Protocol and Analysis
· Smart Card Security
· Virus and Worms
· WLAN and Bluetooth Security.
· Analysis of malicious code
· Applications of cryptographic techniques,
· Analysis of attacks against networks and machines
· Denial-of-service attacks and countermeasures
· File system security
· Security in heterogeneous and large-scale environments
· Techniques for developing secure systems

PLEASE NOTE: We do not accept product or vendor related pitches. If your
talk involves an advertisement for a new product or service your company
is offering, please do not submit.

Your submission should include:

* Name, title, address, email and phone/contact number
* Draft of the proposed presentation (in PDF or PowerPoint format),
proof of concept for tools and exploits, etc.
* Short biography, qualification, occupation, achievement and
affiliations (limit 150 words).
* Summary or abstract for your presentation (limit 250 words)
* Time (45-60 minutes including time for discussion and questions)
* Technical requirements (video, internet, wireless, audio, etc.)

Each non-resident speaker will receive accommodation for 3 nights at The
Westin Kuala Lumpur. For each non-resident speaker, HITB will cover
travel expenses (through our airline partner, Malaysia Airlines) up to
USD 1,000.00.

HITBSecConf2006 CTF Daemons/Flags

As part of our annual conference, HITB organizes an attack and defense
"hack-game" commonly referred to as “Capture The Flag” or CTF. As part
of our continued efforts to improve on the game and raise the bar each
year, we are inviting speakers to contribute a daemon and exploit for
this years CTF competition. For further details on the submission
process, kindly e-mail dinesh -at- hackinthebox.org or ctfinfo -at-
hackinthebox.org.

On behalf of The HITB Team, we thank you and look forward to receiving
your submissions! See you guys in September!

HITBSecConf2006 - Malaysia: Deep-Knowledge Network Security
http://conference.hackinthebox.org/hitbsecconf2006kl/
http://conference.hitb.org/hitbsecconf2006kl/

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close