DEF CON One Five CfP in effect!

看板Bugtraq作者時間19年前 (2007/04/10 23:58), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
DEFCON 15 Call For Papers is now officially Open and will close on June 1= 5, 2007.=20 Don't know what DEFCON is? Go to https://www.defcon.org/ and clue up!=20 Papers and presentations are now being accepted for DEFCON 15, the confer= ence your mother and ISC(2) warned you about. DEFCON will take place at t= he Riviera in Las Vegas, NV, USA, August 3-5, 2007.=20 Last year, we eliminated speaking tracks, and we received a diverse selec= tion of submissions. From hacking your car, your brain, and CIA sculpture= s to hacking the vote, Bluetooth, and DNS hacks. We group presentations b= y subject and come up with topic areas of interest. It worked out so well= in the past we are doing it again.=20 What are we looking for then, if we don't have tracks? Were looking for t= he presentation that you've never seen before and have always wanted to s= ee. We are looking for the presentation that the attendees wouldn't ask f= or, but blows their minds when they see it. We want strange demos of Pers= onal GPS jammers, RFID zappers, and HERF madness. Got a MITM attack again= st cell phones? We want to see it.=20 Subjects that we have traditionally covered in the past, and will continu= e to accept include: Trojan development, worms, malware, intelligent agen= ts, protocol exploits, application security, web security, database hacki= ng, privacy issues, criminal law, civil law, international law/treaties, = prosecution perspectives, 802.11X, bluetooth, cellular telephony protocol= s, privacy, identity theft, identity creation, fraud, social implications= of technology, media/film presentations, firmware hacking, hardware hack= ing, embedded systems hacking, smartcard technologies, credit card and fi= nancial instrument technologies, surveillance, counter-surveillance, UFO'= s, peer2peer technologies, reputation systems, copyright infringement and= anti-copyright infringement enforcement technologies, critical infrastru= cture issues, physical security, social engineering, academic security re= search, PDA and cell phone security, EMP/HERF weaponry, TEMPEST technolog= ies, corporate espionage, IDS evasion.=20 What a mouth full! Well you can't say we didn't give you some ideas. This= list is not intended to limit possible topics, merely to give examples o= f topics that have interested us in the past, and is in fact the same lis= t we used last year..=20 Check out https://www.defcon.org/html/defcon-14/dc-14-speakers.html for p= ast conference presentations to get a complete list of past topics that w= ere accepted if you want to learn from the past.=20 We are looking for and give preference to: unique research, new tool rele= ases, =D8 day attacks (with responsible disclosure), highly technical mat= erial, social commentaries, and ground breaking material of any kind. Wan= t to screen a new hacking documentary or release research? Consider DEFCO= N.=20 Speaking Formats:=20 Choose between 12 hundred seconds, 50 minutes, 110 minutes, or a break ou= t format of a length you determine. We are continuing the Twelve Hundred = Second Spotlight, which is a shorter presentation (about twenty minutes) = that doesn't warrant a full 50 or 110 minute talk. The Twelve Hundred Sec= ond Spotlight is designed for those who don't have enough material for a = full talk, but still have a valuable contribution to make. This is to ens= ure that great ideas that can be presented quickly don't fall through the= cracks merely because they didn't justify a full length talk. Examples i= nclude research, announcements, group presentations, projects needing vol= unteers or testers, requests for comments, updates on previously given ta= lks, quick demonstrations. You get the idea. Presenters will get a speake= r badge which entitles them to free admittance to DEFCON, but we will be = unable to pay an Honorarium.=20 Remember being attacked by flying meat? Do you remember thick accented Ge= rmans trying to convince you to attack critical infrastructure? Do you re= member extravagant vapor ware releases by a stage filled with posses? We = do, and sans projectiles of raw meat we want to encourage such shenanigan= s again this year. We are calling on all "hacker groups" (you know who yo= u are, and the FBI has a nifty file with your name on it) to present at D= EFCON, to discuss what you're up to, what your mission is, to discuss any= upcoming or past projects, and to discuss parties/conferences you are th= rowing. We do humbly request that all gang warfare be relegated to electr= onic attacks, and not fall over into meat space.=20 New for DEFCON 15:=20 The second year being at the Riviera has allowed us to make some changes = to the format from last year. We have more speaking rooms, and because of= this I want to announce a call for workshops, demos, and mini trainings.= We have additional small rooms that will enable highly focused demonstra= tions or workshops. If you want to talk about building a passport cloner = or a tutorial on developing Metasploit exploits this might be the format = for you. You tell us how much time you need, and we try to accommodate yo= u!=20 To submit a speech Complete the Call for Papers Form at: https://www.defc= on.org/html/defcon-15/dc-15-cfp-form.html and send to talks at defcon dot= org. You will receive a confirmation within 48 hours of submission.=20 We are going to continue last year's goal of increasing the quality of th= e talks by screening people and topics. I realize you guys are speaking f= or basically free, but some talks are better than others. Some people put= in a bit more effort than others. I want to reward the people who do the= work by making sure there is room for them.=20 This year we will have two rounds of speaker acceptance. In the first rou= nd we will fill about half of the schedule before the submission deadline= , and the remaining half afterwards. This is to encourage people to submi= t as early as possible and allows attendees to plan on the topics that in= terest them. If you see the schedule on-line start to fill, do not worry = if you have not heard from us yet, as we are still in the process of sele= ction.=20 Barring a disaster of monstrous proportions, speaker selection will be co= mpleted no later July 1. The sooner you submit the better chance you have= of the reviewers to give your presentation the full consideration it war= rants. If you wait until the last minute to submit, you have less of a ch= ance of being selected.=20 After a completed CFP form is received, speakers will be contacted if the= re are any questions about their presentations. If your talk is accepted = you can continue to modify and evolve it up until the last minute, but do= n't deviate from your accepted presentation. We will mail you with inform= ation on deadlines for when we need your presentation, to be burnt on the= CDROM, as well as information for the printed program.=20 Speakers get in to the show free, get paid (AFTER they give a good presen= tation!), get a coolio badge, and people like you more. Heck, most people= find it is a great way to meet people or find other people interested in= their topics. Speakers can opt to forgo their payment and instead receiv= e three human badges that they can give to their friends, sell to strange= rs, or hold onto as timeless mementoes. Receiving badges instead of check= s has been a popular option for those insisting on maintaining their anon= ymity.=20 Please visit:=20 https://www.defcon.org/ for previous conference archives, information, an= d speeches. Updated announcements will be posted to news groups, security= mailing lists and this web site.=20 https://forum.defcon.org/ for a look at all the events and contests being= planned for DEFCON 15. Join in on the action.=20 https://pics.defcon.org/ to upload all your past DEFCON pictures. We stor= e the pictures so you don't have to worry about web space. If you have an= account on the forums, you have an account here.=20 https://www.defcon.org/defconrss.xml for news and announcements surroundi= ng DEFCON.=20 CFP forms and questions should get mailed to: talks/at/defcon.org Thanks! The Dark Tangent
文章代碼(AID): #166xGR00 (Bugtraq)