what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

woot07-cfp.txt

woot07-cfp.txt
Posted May 3, 2007
Site usenix.org

WOOT '07 Call For Papers - The First USENIX Workshop on Offensive Technologies (WOOT) will be held August 6, 2007 in Boston, MA, USA.

tags | paper, conference
SHA-256 | 3629d47e087f7256727ca7e5600e1144b8d83649cc6fe4487b1108deef981177

woot07-cfp.txt

Change Mirror Download
WOOT '07 Call for Papers

First USENIX Workshop on Offensive Technologies (WOOT '07)
August 6, 2007
Boston, MA, USA

Sponsored by USENIX, the Advanced Computing Systems Association

WOOT '07 will be co-located with the 16th USENIX Security Symposium (Security '07), which will take place August 6–10, 2007.

Important Dates
Submissions due: June 7, 2007, 11:59 p.m. PDT
Notification of acceptance: July 7, 2007
Electronic files due: July 31, 2007

Workshop Organizers

Program Chairs
Dan Boneh, Stanford University
Tal Garfinkel, Stanford University
Dug Song, Arbor Networks

Program Committee
Martin Casado, Stanford University
Chris Eagle, Naval Postgraduate School
Halvar Flake, SABRE Security
Greg Hoglund, HBGary
Nate Lawson, Root Labs
David Litchfield, NGSSoftware
Patrick McDaniel, Pennsylvania State University
Tim Newsham, Information Security Partners, LLC
Vern Paxson, International Computer Science Institute and Lawrence Berkeley National Laboratory
Niels Provos, Google
Thomas Ptacek, Matasano Security
Peter Szor, Symantec
Giovanni Vigna, University of California, Santa Barbara

Overview
Progress in the field of computer security is driven by a symbiotic relationship between our understanding of attack and of defense. The USENIX Workshop on Offensive Technologies aims to bring together researchers and practitioners in system security to present research advancing the understanding of attacks on operating systems, networks, and applications.

Instructions for Authors
Computer security is unique among systems disciplines in that practical details matter and concrete case studies keep the field grounded in practice. WOOT provides a forum for high-quality peer-reviewed papers for discussing tools and techniques for attack.

Submissions should reflect the state of the art in offensive computer security technology—either surveying previously poorly known areas or presenting entirely new attacks.

We are interested in work that could be presented at more traditional security forums, as well as more applied work that informs the field about the state of security practice in offensive techniques.

A significant goal is producing published artifacts that will inform future work in the field. Submissions will be peer-reviewed and shepherded as appropriate.

Submission topics include:

* Vulnerability research (software auditing, reverse engineering)
* Penetration testing
* Exploit techniques and automation
* Network-based attacks (routing, DNS, IDS/IPS/firewall evasion)
* Reconnaissance (scanning, software, and hardware fingerprinting)
* Malware design and implementation (rootkits, viruses, bots, worms)
* Denial-of-service attacks
* Web and database security
* Weaknesses in deployed systems (VoIP, telephony, wireless, games)
* Practical cryptanalysis (hardware, DRM, etc.)

Workshop Format
Attendance will be by invitation only, with preference given to the authors of accepted position papers/presentations. Each author will have 25 minutes to present his or her idea.

Paper files will be available on the USENIX Web site to participants, and will be made generally accessible after the workshop.

Submission Instructions
Papers must be received by 11:59 p.m. PDT on Thursday, June 7, 2007. This is a hard deadline—no extensions will be given. Submissions should contain six or fewer two-column pages, excluding references, using 10-point fonts, standard spacing, and 1-inch margins. Please number pages. All submissions will be electronic and must be in either PDF format (preferred) or PostScript. Author names and affiliations should appear on the title page. Submit papers using the Web form, which will be available here soon.

Given the unique focus of this workshop, we expect that work that has been presented previously in an unpublished form (e.g., Black Hat presentations), but that is well-suited for a more formal and complete treatment in a peer-reviewed setting, will be submitted to WOOT, and we encourage such submissions with adequate citation of previous presentations.

Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagarism constitute dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of a program chair, take action against authors who have committed them.

Authors uncertain whether their submission meets USENIX's guidelines should contact the workshop organizers at woot07chairs@usenix.org or the USENIX office, submissionspolicy@usenix.org.

Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close