Gentoo Archives: gentoo-security

From: cfp@××××××××××.au
To: gentoo-security@l.g.o
Subject: [gentoo-security] Breakpoint 2013 Call For Papers
Date: Tue, 30 Apr 2013 22:24:25
Message-Id: 20130430215728.8BF016CC25@ruxcon.org.au
1 Breakpoint 2013 Call For Papers
2 Melbourne, Australia, October 24th-25th
3 Intercontinental Rialto
4 http://www.ruxconbreakpoint.com
5
6
7 .[x]. Introduction .[x].
8
9 The Ruxcon team is pleased to announce Call For Papers for Breakpoint 2013.
10
11 Breakpoint showcases the work of expert security researchers from around the
12 world on a wide range of topics. This conference is organised by the Ruxcon
13 team and offers a specialised security conference to complement and lead into
14 the larger and more casual Ruxcon weekend conference. Breakpoint caters
15 towards security researchers and industry professionals alike, with a focus on
16 cutting edge security research.
17
18 Breakpoint presents a great opportunity for our selected speakers to receive a
19 complimentary trip to Australia and experience both the Breakpoint and Ruxcon
20 conferences, not to mention the great weather, awesome parties, and friendly
21 people. Melbourne is a city of many subcultures, personalities and styles.
22 Melbourne has a vibrant arts and music scene, eccentric cafes, intimate bars
23 and restaurants, and is known as Australia's cultural capital.
24
25
26 .[x]. Important Dates .[x].
27
28 May 1 - Call For Presentations Open
29 August 23 - Call For Presentations Close
30 October 22-23 - Breakpoint Training
31 October 24-25 - Breakpoint Conference
32 October 26-27 - Ruxcon Conference
33
34
35 .[x]. Topic Scope .[x].
36
37 Topics of interest include, but are not limited to:
38
39 o Mobile Device Security
40 o Exploitation Techniques
41 o Reverse Engineering
42 o Vulnerability Discovery
43 o Rootkit Development
44 o Malware Analysis
45 o Code Analysis
46 o Virtualisation, Hypervisor Security
47 o Cloud Security
48 o Embedded Device Security
49 o Hardware Security
50 o Telecommunications Security
51 o Wireless Network Security
52 o Web Application Security
53 o Law Enforcement Activities
54 o Forensics
55 o Threat Intelligence
56 o You get the idea
57
58
59 .[x]. Submission Guidelines .[x].
60
61 In order for us to process your submission we will require the following
62 information:
63
64 1. Presentation title
65 2. Detailed summary of your presentation material
66 3. Name/Nickname
67 4. Mobile phone number
68 5. Brief personal biography
69 6. Description of any demonstrations involved in presentation
70 7. Information on where the presentation material has or will be presented
71 before Breakpoint
72
73 * Preference will be given to presentations that contain original research
74 that will be first presented at Breakpoint.
75 * As a general guideline, Breakpoint presentations are between
76 45 and 60 minutes, including question time.
77
78 If you have any questions about submissions, or would like to make a
79 submission, please send an email to bpx@××××××××××××××××.com
80
81
82 .[x]. Speaker Benefits .[x].
83
84 Speakers at Breakpoint will be entitled to the following benefits:
85
86 - A return economy airfare to Melbourne (total cost limit applies)
87 - Three nights accommodation at the Intercontinental Rialto
88 - Complimentary registration for Breakpoint and Ruxcon conferences
89 - Invitation to all Breakpoint and Ruxcon parties
90 - Unlock 'Presented on world's smallest continent' achievement
91
92 * All speaker benefits apply to a single speaker per submission.
93
94
95 .[x]. Contact .[x].
96
97 If you have any questions or inqueries, contact us at:
98
99 * Email: bpx@××××××××××××××××.com
100 * Twitter: @ruxconbpx