firewall-wizards@listserv.icsalabs.com
To subscribe or unsubscribe via the World Wide Web, visit
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
or, via email, send a message with subject or body 'help' to
firewall-wizards-request@listserv.icsalabs.com
You can reach the person managing the list at
firewall-wizards-owner@listserv.icsalabs.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of firewall-wizards digest..."
Today's Topics:
1. Hackito Ergo Sum 2010 - Call For Paper - HES2010 CFP (endrazine)
2. Draft paper submission deadline is extended: ISP-10
(James Heralds)
----------------------------------------------------------------------
Message: 1
Date: Thu, 04 Feb 2010 02:23:16 +0100
From: endrazine <endrazine@gmail.com>
Subject: [fw-wiz] Hackito Ergo Sum 2010 - Call For Paper - HES2010 CFP
To: undisclosed-recipients:;
Message-ID: <4B6A2184.8040208@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hackito Ergo Sum 2010 - Call For Paper - HES2010 CFP
http://hackitoergosum.org
Hackito Ergo Sum conference will be held from April 8th to 10th 2010 in
Paris, France.
It is part of the series of conference "Hacker Space Fest" taking place
since 2008 in France and all over Europe.
HES2010 will focus on hardcore computer security, insecurity,
vulnerability analysis, reverse engineering, research and hacking.
INTRO
The goal of this conference is to promote security research, broaden
public awareness and create an open forum so that communication between
the researcher, the security industry, the experts and the public can
happen.
A recent decision of justice in France has convicted a security
researcher for disclosing vulnerabilities and exploits. These laws
(similar to the one in Germany), descending from USA's DMCA law, are
orienting freedom of research and knowledge into a situation where
"illegal knowledge" can happen, restricted to the only ones blessed by
governmental silent approval and military. Scientific research and
public information cannot be made into another monopoly of state, where
"some" can study and publish and "some others" cannot.
Such approach just show how misinformed some politics are and how little
understanding they get of the struggle they are acting in.
Not understanding that the best way to improve security is to attack it
shows the lack of maturity of some stakeholder by being cut out of
independent information sources.
This is where our ethics and responsibility is to say "No, we have a
right for free information and true independence in research", and this
responsibility is the one of anybody, not just the responsibility of
academically blessed scientists.
This conference will try to take in account all voices in order to reach
a balanced position regarding research and security, inviting
businesses, governmental actors, researchers, professionals and general
public to share concerns, approaches and interests during.
During three days, research conferences, solutions presentations, panels
and debates will aim at finding synthetic and balanced solutions to the
current situation.
CONTENT
> Research Track:
We are expecting submissions in english or french, english preferred.
The format will be 45 mn presentation + 10mn Q&A.
For the research track, preference will be given for offensive,
innovative and highly technical proposals covering (but not restricted
to) the topics below:
Attacking Software
* Vulnerability discovery (and automating it!)
* Non-x86 exploitation
* Fuzzing with SMT and its limits
* New classes of software vulnerabilities and new methods to detect
software bugs (source or binary based)
* Reverse Engineering tools and techniques
* Static analysis (source or binary, Lattices to blind analysis, new
languages and targets strongly encouraged)
* Unpacking
* Current exploitation on Gnu/Linux WITH GRsecurity / SElinux / OpenWall
/ SSP and other current protection methods
* Kernel land exploits (new architectures or remote only)
* New advances in Attack frameworks and automation
Attacking Infrastructures
* Exotic Network Attacks
* Telecom (from VoIP to SS7 to GSM & 3G RF hacks)
* Financial and Banking institutions
* SCADA and the industrial world, applied.
* Governmental firewall and their limits (Australia, French's HADOPI,
China, Iran, Danemark, Germany, ...)
* Satellites, Military, Intelligence data collection backbones ("I
hacked Echelon and I would like to share")
* Non-IP (SNA, ISO, make us dream...)
* Red-light and other public utilities control networks
* M2M
Attacking Hardware
* Hardware reverse engineering (and exploitation + backdooring)
* Femto-cell hacking (3G, LTE, ...)
* Microchip grinding, opening, imaging and reverse engineering
* BIOS and otherwise low-level exploitation vectors
* Real-world SMM usage! We know it's vulnerable, now let's do something
* WiFi drivers and System on Chip (SoC) overflow, exploitation and
backdooring.
* Gnu Radio hacking applied to new domains
* Toll-booth and fast-lane payment systems
Attacking Crypto
* Practical crypto attacks from the hackers perspective (RCE,
bruteforce, ...)
* SAT-solver applied to cryptanalysis
* Algorithm strength modeling and evaluation metrics
* Hashing functions pre-image attacks
* Crypto where you wouldn't think there is
We highly encourage any other presentation topic that we may not even
imagine.
Required informations:
* Presenter's name
* Bio
* Presentation Title
* Description
* Demo?
* Needs: Internet? Others?
* Company (name) or Independent?
* Address
* Phone
* Email
Send your submission to:
hes2010-cfp __AT__ lists.hackitoergosum.org
> Business & Society Track:
Format:
20 minutes slots to present a tool, an innovative product, a solution
(commercial, open source, free); a customer experience or open research
domain; a society issue or a subject of public interest.
Demos are mandatory for tool, product or solutions presentations.
Pure-marketing presentation will be moderated (i.e. interrupted).
Follow-up with private group can be arranged for in-depth demo or analysis.
Submission needs to be sent to:
hes2010-cfp __AT__ lists.hackitoergosum.org
> Other interests
If you want to organize a Capture The Flag, Reverse Engineering contest,
Lockpicking contest or any other activity during the conference, you are
most welcome. Please contact us at: hes2010-orga@lists.hackitoergosum.org
DATES
2010-01-18 Call for Paper
2010-03-01 Submission Deadline
2010-04-08 Start of conference
2010-04-10 End of conference
PROGRAMMING COMMITTEE
The submissions will be reviewed by the following programming committee:
* Sebastien Bourdeauducq (Milkymist, /tmp/lab, BEC)
* Rodrigo Branco "BSDaemon" (Coseinc)
* Jonathan Brossard (P1 Code Security, DNSlab)
* Emmanuel Gadaix (TSTF)
* Laurent Gaffi? (Stratsec)
* Thomas Garnier (Microsoft)
* The Grugq (PSP)
* Dhillon Kannabhiran (HITB)
* Kostya Kortchinsky (Immunity)
* Itzik Kotler (Radware)
* Philippe Langlois (P1 Telecom Security, PSP, TSTF, /tmp/lab)
* Moxie Marlinspike (Institute for Disruptive Studies)
* Karsten Nohl (deGate, Reflextor)
* Nicolas Thill (OpenWRT, /tmp/lab)
* Julien Tinnes (Google)
* Nicolas Ruff (EADS, Security Labs)
* Carlos Sarraute (CORE Security Technologies)
* Matthieu Suiche (Sandman, win32dd)
* Fyodor Yarochkin (TSTF, o0o.nu)
FEES
Business-ticket 120 EUR
Public entrance 80 EUR
Reduction for Students below 26 40 EUR
Reduction for CVE publisher or exploit publisher in 2009/2010 40 EUR
Entrance fees and sponsors fees will be used to fund international
speakers travel costs.
VOLUNTEERS
Volunteers who sign up before 2010-03-01 get free access and will need
to be present onsite two days before (2010-04-06) if no further
arrangement is made with the organization.
SPONSORS
Sponsors are welcome to contact us to receive the Partnership Kit at:
hes2010-orga __AT__ lists.hackitoergosum.org
LOCATION
Paris, France.
CONTACT
hes2010-orga __AT__ lists.hackitoergosum.org
Hackito Ergo Sum 2010 conference - http://hackitoergosum.org
Hacker Space Festival - http://www.hackerspace.net
- ---
Please disseminate and forward to your friends, researchers, and anybody
who may be interested.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAktqIYQACgkQK/YAm7PYybnlLQCfV7vpmzMGi9UVNO7cvovqhYoK
kcoAn2RrwFZdDGGYfyKhLJzDFelaQyCr
=1R6Y
-----END PGP SIGNATURE-----
------------------------------
Message: 2
Date: Thu, 4 Feb 2010 18:38:01 -0500
From: James Heralds <jmheralds@gmail.com>
Subject: [fw-wiz] Draft paper submission deadline is extended: ISP-10
To: firewall-wizards@listserv.icsalabs.com
Message-ID:
<739582dd1002041538o4fd88e15g28478ea10da8fba@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
Draft paper submission deadline is extended: ISP-10
The 2010 International Conference on Information Security and Privacy
(ISP-10) (website:
http://www.PromoteResearch.org<http://www.promoteresearch.org/>)
will be held during 12-14 of July 2010 in Orlando, FL, USA. ISP is an
important event in the areas of information security, privacy, cryptography
and related topics.
The conference will be held at the same time and location where several
other major international conferences will be taking place. The conference
will be held as part of 2010 multi-conference (MULTICONF-10). MULTICONF-10
will be held during July 12-14, 2010 in Orlando, Florida, USA. The primary
goal of MULTICONF is to promote research and developmental activities in
computer science, information technology, control engineering, and related
fields. Another goal is to promote the dissemination of research to a
multidisciplinary audience and to facilitate communication among
researchers, developers, practitioners in different fields. The following
conferences are planned to be organized as part of MULTICONF-10.
- International Conference on Artificial Intelligence and Pattern
Recognition (AIPR-10)
- International Conference on Automation, Robotics and Control Systems
(ARCS-10) <http://www.promoteresearch.org/2009/2009/arcs/index.html>
- International Conference on Bioinformatics, Computational Biology,
Genomics and Chemoinformatics (BCBGC-10)
- International Conference on Computer Communications and Networks
(CCN-10) <http://www.promoteresearch.org/2009/eiswt/index.html>
- International Conference on Enterprise Information Systems and Web
Technologies (EISWT-10)<http://www.promoteresearch.org/2009/eiswt/index.html>
- International Conference on High Performance Computing Systems
(HPCS-10)
- International Conference on Information Security and Privacy (ISP-10)
<http://www.promoteresearch.org/2009/isp/index.html>
- International Conference on Image and Video Processing and Computer
Vision (IVPCV-10) <http://www.promoteresearch.org/2010/cvivp/index.html>
- International Conference on Software Engineering Theory and Practice
(SETP-10)
- International Conference on Theoretical and Mathematical Foundations of
Computer Science (TMFCS-10)
We invite draft paper submissions. Please see the website
http://www.PromoteResearch.org <http://www.promoteresearch.org/> for more
details.
Sincerely
James Heralds
Publicity committee
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://listserv.icsalabs.com/pipermail/firewall-wizards/attachments/20100204/c67041ee/attachment-0001.html>
------------------------------
_______________________________________________
firewall-wizards mailing list
firewall-wizards@listserv.icsalabs.com
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
End of firewall-wizards Digest, Vol 46, Issue 1
***********************************************
No comments:
Post a Comment