1 |
Breakpoint 2013 Call For Papers |
2 |
Melbourne, Australia, October 24th-25th |
3 |
Intercontinental Rialto |
4 |
http://www.ruxconbreakpoint.com |
5 |
|
6 |
|
7 |
.[x]. Introduction .[x]. |
8 |
|
9 |
The Ruxcon team is pleased to announce Call For Papers for Breakpoint 2013. |
10 |
|
11 |
Breakpoint showcases the work of expert security researchers from around the |
12 |
world on a wide range of topics. This conference is organised by the Ruxcon |
13 |
team and offers a specialised security conference to complement and lead into |
14 |
the larger and more casual Ruxcon weekend conference. Breakpoint caters |
15 |
towards security researchers and industry professionals alike, with a focus on |
16 |
cutting edge security research. |
17 |
|
18 |
Breakpoint presents a great opportunity for our selected speakers to receive a |
19 |
complimentary trip to Australia and experience both the Breakpoint and Ruxcon |
20 |
conferences, not to mention the great weather, awesome parties, and friendly |
21 |
people. Melbourne is a city of many subcultures, personalities and styles. |
22 |
Melbourne has a vibrant arts and music scene, eccentric cafes, intimate bars |
23 |
and restaurants, and is known as Australia's cultural capital. |
24 |
|
25 |
|
26 |
.[x]. Important Dates .[x]. |
27 |
|
28 |
May 1 - Call For Presentations Open |
29 |
August 23 - Call For Presentations Close |
30 |
October 22-23 - Breakpoint Training |
31 |
October 24-25 - Breakpoint Conference |
32 |
October 26-27 - Ruxcon Conference |
33 |
|
34 |
|
35 |
.[x]. Topic Scope .[x]. |
36 |
|
37 |
Topics of interest include, but are not limited to: |
38 |
|
39 |
o Mobile Device Security |
40 |
o Exploitation Techniques |
41 |
o Reverse Engineering |
42 |
o Vulnerability Discovery |
43 |
o Rootkit Development |
44 |
o Malware Analysis |
45 |
o Code Analysis |
46 |
o Virtualisation, Hypervisor Security |
47 |
o Cloud Security |
48 |
o Embedded Device Security |
49 |
o Hardware Security |
50 |
o Telecommunications Security |
51 |
o Wireless Network Security |
52 |
o Web Application Security |
53 |
o Law Enforcement Activities |
54 |
o Forensics |
55 |
o Threat Intelligence |
56 |
o You get the idea |
57 |
|
58 |
|
59 |
.[x]. Submission Guidelines .[x]. |
60 |
|
61 |
In order for us to process your submission we will require the following |
62 |
information: |
63 |
|
64 |
1. Presentation title |
65 |
2. Detailed summary of your presentation material |
66 |
3. Name/Nickname |
67 |
4. Mobile phone number |
68 |
5. Brief personal biography |
69 |
6. Description of any demonstrations involved in presentation |
70 |
7. Information on where the presentation material has or will be presented |
71 |
before Breakpoint |
72 |
|
73 |
* Preference will be given to presentations that contain original research |
74 |
that will be first presented at Breakpoint. |
75 |
* As a general guideline, Breakpoint presentations are between |
76 |
45 and 60 minutes, including question time. |
77 |
|
78 |
If you have any questions about submissions, or would like to make a |
79 |
submission, please send an email to bpx@××××××××××××××××.com |
80 |
|
81 |
|
82 |
.[x]. Speaker Benefits .[x]. |
83 |
|
84 |
Speakers at Breakpoint will be entitled to the following benefits: |
85 |
|
86 |
- A return economy airfare to Melbourne (total cost limit applies) |
87 |
- Three nights accommodation at the Intercontinental Rialto |
88 |
- Complimentary registration for Breakpoint and Ruxcon conferences |
89 |
- Invitation to all Breakpoint and Ruxcon parties |
90 |
- Unlock 'Presented on world's smallest continent' achievement |
91 |
|
92 |
* All speaker benefits apply to a single speaker per submission. |
93 |
|
94 |
|
95 |
.[x]. Contact .[x]. |
96 |
|
97 |
If you have any questions or inqueries, contact us at: |
98 |
|
99 |
* Email: bpx@××××××××××××××××.com |
100 |
* Twitter: @ruxconbpx |