1 |
Ruxcon 2013 Call For Presentations |
2 |
Melbourne, Australia, October 26th-27th |
3 |
CQ Function Centre |
4 |
http://www.ruxcon.org.au/call-for-papers/ |
5 |
|
6 |
|
7 |
The Ruxcon team is pleased to announce the Call For Presentations for Ruxcon 2013. |
8 |
|
9 |
This year the conference will take place over the weekend of the 26th and 27th |
10 |
of October at the CQ Function Centre, Melbourne, Australia. |
11 |
|
12 |
|
13 |
.[x]. About Ruxcon .[x]. |
14 |
|
15 |
Ruxcon is ia premier technical computer security conference in the Australia. |
16 |
The conference aims to bring together the individual talents of the best and |
17 |
brightest security folk in the region, through live presentations, activities |
18 |
and demonstrations. |
19 |
|
20 |
The conference is held over two days in a relaxed atmosphere, allowing |
21 |
attendees to enjoy themselves whilst networking within the community and |
22 |
expanding their knowledge of security. |
23 |
|
24 |
Live presentations and activities will cover a full range of defensive |
25 |
and offensive security topics, varying from previously unpublished research |
26 |
to required reading for the security community. |
27 |
|
28 |
For more information, please visit the http://www.ruxcon.org.au |
29 |
|
30 |
|
31 |
.[x]. Important Dates .[x]. |
32 |
|
33 |
May 7th - Call For Presentations Open |
34 |
September 7th - Call For Presentations Close |
35 |
October 22-23 - Ruxcon/Breakpoint Training |
36 |
October 24-25 - Breakpoint Conference |
37 |
October 26-27 - Ruxcon Conference |
38 |
|
39 |
|
40 |
.[x]. Topic Scope .[x]. |
41 |
|
42 |
o Topics of interest include, but are not limited to: |
43 |
o Mobile Device Security |
44 |
o Virtualization, Hypervisor, and Cloud Security |
45 |
o Malware Analysis |
46 |
o Reverse Engineering |
47 |
o Exploitation Techniques |
48 |
o Rootkit Development |
49 |
o Code Analysis |
50 |
o Forensics and Anti-Forensics |
51 |
o Embedded Device Security |
52 |
o Web Application Security |
53 |
o Network Traffic Analysis |
54 |
o Wireless Network Security |
55 |
o Cryptography and Cryptanalysis |
56 |
o Social Engineering |
57 |
o Law Enforcement Activities |
58 |
o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc) |
59 |
|
60 |
|
61 |
.[x]. Submission Guidelines .[x]. |
62 |
|
63 |
In order for us to process your submission we require the following information: |
64 |
|
65 |
1. Presentation title |
66 |
2. Detailed summary of your presentation material |
67 |
3. Name/Nickname |
68 |
4. Mobile phone number |
69 |
5. Brief personal biography |
70 |
6. Description of any demonstrations involved in the presentation |
71 |
7. Information on where the presentation material has or will be presented |
72 |
before Ruxcon |
73 |
|
74 |
* As a general guideline, Ruxcon presentations are between 45 and 60 minutes, |
75 |
including question time. |
76 |
|
77 |
If you have any enquiries about submissions, or would like to make a |
78 |
submission, please send an email to presentations@××××××××××.au |
79 |
|
80 |
|
81 |
.[x]. Contact .[x]. |
82 |
|
83 |
o Email: presentations@××××××××××.au |
84 |
o Twitter: @ruxcon |