{"id":836,"date":"2014-01-23T13:14:00","date_gmt":"2014-01-23T13:14:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2014\/01\/23\/brucon-0x06-cfp-is-open\/"},"modified":"2014-01-23T13:14:00","modified_gmt":"2014-01-23T13:14:00","slug":"brucon-0x06-cfp-is-open","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2014\/01\/23\/brucon-0x06-cfp-is-open\/","title":{"rendered":"BruCON 0x06 CFP is open"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left\">\n<div style=\"text-align: left\"><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">This is the call for papers (CFP) for talks and workshops for the 6th edition of BruCON, a 2-day Security and Hacking Conference full of interesting presentations, workshops and security challenges.<\/span><span style=\"background-color: white;color: #333333;line-height: 20px\">&nbsp;<\/span><span style=\"background-color: white;color: #333333;line-height: 20px\">BruCON is an open-minded gathering of people discussing computer security, privacy, and information technology. The conference tries to create bridges between the various actors active in computer security world including (but not limited to) hackers, security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies,etc.&nbsp;<\/span><span style=\"background-color: white;color: #333333;line-height: 20px\">The conference will be held in Ghent <\/span><span style=\"background-color: white;color: #333333;line-height: 20px\">on the 25th and 26th of September 2014.&nbsp;<\/span><\/span><\/div>\n<div style=\"text-align: left\"><\/div>\n<p><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">Topics of interest include, but are not limited to :<\/span><\/span><br \/><span style=\"background-color: white;color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\">* Electronic\/Digital Privacy<\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Wireless Network and Security<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Attacks on Information Systems and\/or Digital Information Storage<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Web Application and Web Services Security<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Lockpicking &amp; physical security<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Honeypots\/Honeynets<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Spyware, Phishing and Botnets (Distributed attacks)<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Hardware hacking, embedded systems and other electronic devices<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Mobile devices exploitation, Symbian, P2K and bluetooth technologies<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Electronic Voting<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Free Software and Security<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Legal and Social Aspect of Information Security<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Software Engineering and Security<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Security in Information Retrieval<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Security aspects in SCADA, industrial environments and &#8220;obscure&#8221; networks<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Forensics and Anti-Forensics<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Mobile communications security and vulnerabilities<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Information warfare and industrial espionage<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Social Engineering<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* Virtualisation Security<\/span><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif\"><span style=\"background-color: white;color: #333333;line-height: 20px\">* &#8230;<\/span><\/span><br \/><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\"><br \/><\/span><\/span><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">Possibly formats are:<\/span><\/span><br \/><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\">* 1hr talk<\/span><\/p>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">* 2hr workshop (preferably hands on)<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">* 4hr workshop (preferably hands on)<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\"><br \/><\/span><\/span><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\">How to submit:<\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\">Submissions will contain as much detail as possible and will be written in English.<\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">This year we use EasyChair to collect and review talk and workshop proposals.<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">You will submit your proposal online:&nbsp;<\/span><\/span><a href=\"https:\/\/www.easychair.org\/conferences\/?conf=brucon0x06\" style=\"background-color: white;color: #1155cc;font-family: arial, sans-serif\" target=\"_blank\">https:\/\/www.easychair.org\/conferences\/?conf=brucon0x06<\/a><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">Your submission will contain at least the following details:<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">* Your name<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">* Where do you live (country)<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">* How to reach you<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">* The title of your talk\/workshop, including type [talk|2h workshop|4h workshop]<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\">* An abstract of your talk\/workshop, including&nbsp;<\/span><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">a brief biography<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\">* A number of keywords to&nbsp;characterise&nbsp;your submission<\/span><\/span><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\">* Additionally you are encouraged to include, in plain text or PDF format, supporting materials such as slidedecks, white papers, curriculums, prerequisites for talk\/workshop, &#8230;<\/span><\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\"><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\">Our speaker treatment hasn&#8217;t changed since the first year. You&#8217;re our guest and we will do anything to make your stay and experience as enjoyable as possible. This includes helping you with travel and accomodation and providing ample opportunities to sample the best of whatever Belgium has to offer. You know what we&#8217;re talking about so &#8230; submit now!<\/span><br \/><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;line-height: 20px\"><br \/><\/span><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif\"><span style=\"line-height: 20px\"><b>This CFP closes on March 31st 2014 at midnight CET &#8212; CFP feedback will be sent before April 30th 2014. All talks will be published before May 15th 2014.<\/b><\/span><\/span><\/div>\n<p><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;font-size: x-small\"><span style=\"line-height: 20px\"><br \/><\/span><\/span><span style=\"color: #333333;font-family: Arial, Helvetica, sans-serif;font-size: xx-small\"><span style=\"line-height: 20px\">Small print: We do not accept product or vendor related pitches. If your presentation involves an advertisement for a new product or service your company is offering, please do not submit. Also, we do not accept presentations submitted by a third party including (but not limited to) company representatives, management bureau&#8217;s, etc. BruCON presentations should be focused on topics that are of interest to security and technology professionals who are paying attention to current trends and issues. We want BruCON to be educational and entertaining to the attendees and the community.<\/span><\/span><\/p>\n<div><\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\"><span style=\"font-family: Arial, Helvetica, sans-serif\"><br \/><\/span><\/div>\n<p><span style=\"font-family: Arial, Helvetica, sans-serif\"><br \/><\/span><span style=\"font-family: Arial, Helvetica, sans-serif\"><br \/><\/span><\/p>\n<div><b><br \/><\/b><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This is the call for papers (CFP) for talks and workshops for the 6th edition of BruCON, a 2-day Security and Hacking Conference full of interesting presentations, workshops and security challenges.&nbsp;BruCON is an open-minded gathering of people discussing computer security, privacy, and information technology. The conference tries to create bridges between the various actors active in computer security world including (but not limited to) hackers, security professionals, security communities, non-profit organizations, CERTs, students, law enforcement&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-836","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=836"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/836\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}