Wireshark-users: [Wireshark-users] [HITB-Announce] REMINDER: #HITB2014KUL CFP Deadline: 1st Augus
From: Hafez Kamal <aphesz@xxxxxxxxxxxxxxxx>
Date: Thu, 17 Jul 2014 13:46:56 +0800
The deadline to submit your papers for the LAST AND FINAL HITB Security Conference in Malaysia is just around the corner! HITBSecConf2014 - Malaysia takes place at Intercontinental Kuala Lumpur from October 13th - 16th (13th / 14th = training // 15th / 16th = conference) http://conference.hitb.org/hitbsecconf2014kul/ We're looking for talks that are highly technical, but most importantly, material which is new, fresh and that _hasn't been presented previously_ Here are a few talks that have already been accepted for inclusion into the conference: ARM Wrestling a Printer: How to Mod Firmware http://conference.hitb.org/hitbsecconf2014kul/sessions/arm-wrestling-a-printer-how-to-mod-firmware/ Abusing JSONP with Rosetta Flash http://conference.hitb.org/hitbsecconf2014kul/sessions/abusing-jsonp-with-rosetta-flash/ Browser Fuzzing in 2014: Where to Throw Your Stones http://conference.hitb.org/hitbsecconf2014kul/sessions/browser-fuzzing-in-2014-david-vs-goliath-a-k-a-learn-where-to-throw-your-stones/ --- HITB CFP: http://cfp.hackinthebox.org/ Each accepted submission will entitle the speaker(s) to accommodation for 3 nights / 4 days at the InterContinental Kuala Lumpur and travel expense reimbursement up to EUR1200.00 per speaking slot. Topics of interest include, but are not limited to the following: Cloud Security File System Security 3G/4G/WIMAX Security SS7/GSM/VoIP Security Security of Medical Devices Critical Infrastructure Security Smartphone / MobileSecurity Smart Card and Physical Security Network Protocols, Analysis and Attacks Applications of Cryptographic Techniques Side Channel Analysis of Hardware Devices Analysis of Malicious Code / Viruses / Malware Data Recovery, Forensics and Incident Response Hardware based attacks and reverse engineering Windows / Linux / OS X / *NIX Security Vulnerabilities Next Generation Exploit and Exploit Mitigation Techniques NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security WHITE PAPER: If your presentation is short listed for inclusion into the conference program, a technical white paper must also be provided (3000 - 5000 words). Your submissions will be reviewed by The HITB CFP Review Committee: Charlie Miller, Twitter Katie Moussouris, Chief Policy Officer, HackerOne Itzik Kotler, Chief Technology Officer, Security Art Cesar Cerrudo, Chief Technology Officer, IOActive Jeremiah Grossman, Founder, Whitehat Security Andrew Cushman, Senior Director, Microsoft Saumil Shah, Founder CEO Net-Square Thanh 'RD' Nguyen, THC, VNSECURITY Alexander Kornburst, Red Database Fredric Raynal, QuarksLab Shreeraj Shah, Founder, BlueInfy Dr. Marco Balduzzi, Senior Researcher, Trend Micro Emmanuel Gadaix, Founder, TSTF Andrea Barisani, Inverse Path Philippe Langlois, TSTF Ed Skoudis, InGuardians Haroon Meer, Thinkst Chris Evans, Google Raoul Chiesa, TSTF/ISECOM rsnake, SecTheory Gal Diskin, Intel Skyper, THC Regards, Hafez Kamal Hack in The Box (M) Sdn. Bhd 36th Floor, Menara Maxis Kuala Lumpur City Centre 50088 Kuala Lumpur, Malaysia Tel: +603-26157299 Fax: +603-26150088
- Prev by Date: Re: [Wireshark-users] Wireshark Bluetooth
- Next by Date: Re: [Wireshark-users] Wireshark Bluetooth
- Previous by thread: Re: [Wireshark-users] Heartbleed pcap
- Next by thread: [Wireshark-users] "Follow tcp stream" in tshark
- Index(es):