-
Notifications
You must be signed in to change notification settings - Fork 0
/
44con2011-cfp.txt
204 lines (158 loc) · 6.09 KB
/
44con2011-cfp.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
]-- 44Con 2011 Technical Call For Papers
Site: http://www.44con.com/
Tech CFP: http://www.44con.com/conference/tech-cfp.html
Limited Tickets *available now*: http://44con.eventbrite.com
]-- Background
44Con is the UK's largest combined Security Conference and Training
event, with the conference taking place on the 1st and 2nd of September,
2011 at a 5* Hotel & Conference facility near
Tower Bridge and the Tower of London. We will have a dedicated
conference area - with private bar (capacity 150) - selected talks will
be broadcast live in the bar.
The main conference room will be set for 400 for Keynotes and then be
split and changed to 200/200 for 2 speaking tracks - one 'Infosec
Professional', the other 'Technical Specialists'.
This is the Call for Papers for the Technical Specialist track.
]-- Technical Talk Content
Technical submissions should be sent to [email protected]. Our submissions
review panel includes luminaries from organisations such as THC and
various H.M. Government and military personnel. In
particular, we are looking for original talks of the highest quality in
the following areas:
1. Offensive Technologies
- Vulnerability exploitation techniques
- Malware
- Rootkits
2. Defensive Technologies
- Incident Response
- Malware forensics
- Intrusion Prevention Tools & Techniques
- Computer Network Defence (CND)
3. Bugs, finding and fixing
- Fuzzing
- Static Analysis
- Source Code Auditing
- The Exploit Economy
4. Cloud Computing
- Breaking
- Defending
- Data Protection and Destruction
5. Virtualisation
- Detection, Escape and Exploitation
- Defence, Sandboxing and Countermeasures
6. Owning the Enterprise
- Enterprise Software (e.g. SAP, Ab Initio, Oracle etc.)
- Trading Systems
- Enterprise Security Fail
7. Online Money
- Online Gambling Security
- Casino, Poker and Arcade systems.
- MMO gaming
- Commercial PRNG Analysis
8. Client Side Security
- Browser Security
- File Format Security
- Out of Band Measures (e.g. Chip & Pin)
9. Embedded/Hardware Hacking
- Mobile devices
- Mobile Phones - Particularly iPhone/Windows Mobile
- Games Consoles
- Cool Hardware Hacks (e.g. Arduino etc.)
- GSM Security
- Access Control
- Consumer Broadband Devices
- DVR and Set Top Boxes
10. Application Security
- Web-based Application Security
- Binary Application Security
- Reverse Engineering
- Copyright and DRM
11. Networking and Comms
- OSI Layers 1 through 4
- RF Comms (RFID, NFC etc.)
- Satellite Hacking
- VoIP
- IPv6
- 802.11n
12. Critical National Infrastructure (CNI)
- SCADA
- Emergency Services Systems
- Medical Systems and IT Security
- Cyber Espionage
Please try to not recycle content from other conference presentations.
If you have an updated presentation please let us know what has changed
from the previous presented version.
Note: this is not an exclusive list. If you have a good talk proposal,
please let us know.
]-- Selection Committee
- Van Hauser - THC
- Steve Lord - 44Con
- The Unknown Soldier - MoD
- Assorted shadowy figures from the unconvention
]-- Speaker Privileges
Speakers at 44Con will be entitled to the following:
- Reimbursement of air ticket for one person up to 500 GBP.
- 3 nights accommodation
- Breakfast & Lunch during conference
- After-Conference Party Invite
- Press Access (for those that want it)
- Alcohol, Fun and Frolics
]-- Awards
Although no honorarium is provided for talks, cash awards will be
provided for the following:
- best technical specialist track talk: 1,000 GBP
- best infosec professional track talk: 1,000 GBP
- best new talk: 1,000 GBP
- 44Con award of awesomeness: 'special awesome prize'
The award winners will be chosen based on feedback forms provided to
delegates at the conference. Winning one category does not preclude a
speaker from competing in others.
]-- Submissions process
Submit your CFP response to [email protected]. Submissions are preferred in
plain text. If we can't read your submission we can't evaluate it, so
please work with us to make sure we can read
the submission. Submissions must be in English only.
Your submission must contain the following information (feel free to cut
and paste into an email):
1. Name
2. Handle/Alias if you have one you'd prefer us to use
3. Email address (we won't assume the from address is what you want us
to use)
4. Mobile phone number
5. Company/Group
6. A brief biography, no more than 250 words.
7. Presentation Title.
8. Which of the categories in the CFP this falls under (if any)
9. Length of talk.
10. Where this talk or presentation material has been delivered before.
11. Any differences between this and previously given versions.
12. Demo available?
13. Equipment needed for demo that you will be supplying.
14. Presentation format (e.g. PPT, Keynote, ODP, PDF, .Tex etc.)
15. Brief summary of presentation (max. 400 words).
Speaker slots are 45 minutes in length plus Q&A time up to an hour in total.
]-- Important dates
- CFP Deadline: Friday 20th May, 6pm UTC
- Speaker announcements: Wednesday 25th May - 10th June
- Speaker flight details to be submitted by 30th June
- Technical Presentation Submission Deadline: 31th July
- Technical Papers/Tools Submission Deadline: 12th August
- 44Con Training: 30th and 31st August
- 44Con Conference: 1st and 2nd September
]-- Other Information
44Con is the UK's biggest combined Information Security Conference and
Training Event. To find out more about 44Con visit http://www.44con.com/
or follow us on twitter @44con, or use the
#44con hashtag to see and take part in the discussion on Twitter.
Tickets are available now from the main web site at
http://44con.eventbrite.com/.
By agreeing to speak at 44Con you are granting Sense/Net Ltd (owners of
44Con) the rights to reproduce and distribute your presentation
including but not limited to http://www.44con.com/,
advertisements in various mediums and through partner sites and mediums.
If you are not comfortable with this arrangement this must be agreed
with us in writing prior to the event.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/