Gentoo Archives: gentoo-security

From: cfp@××××××××××.au
To: gentoo-security@l.g.o
Subject: [gentoo-security] Ruxcon 2013 Call For Papers
Date: Tue, 07 May 2013 04:55:01
Message-Id: 20130507042810.12A0E6CCB2@ruxcon.org.au
1 Ruxcon 2013 Call For Presentations
2 Melbourne, Australia, October 26th-27th
3 CQ Function Centre
4 http://www.ruxcon.org.au/call-for-papers/
5
6
7 The Ruxcon team is pleased to announce the Call For Presentations for Ruxcon 2013.
8
9 This year the conference will take place over the weekend of the 26th and 27th
10 of October at the CQ Function Centre, Melbourne, Australia.
11
12
13 .[x]. About Ruxcon .[x].
14
15 Ruxcon is ia premier technical computer security conference in the Australia.
16 The conference aims to bring together the individual talents of the best and
17 brightest security folk in the region, through live presentations, activities
18 and demonstrations.
19
20 The conference is held over two days in a relaxed atmosphere, allowing
21 attendees to enjoy themselves whilst networking within the community and
22 expanding their knowledge of security.
23
24 Live presentations and activities will cover a full range of defensive
25 and offensive security topics, varying from previously unpublished research
26 to required reading for the security community.
27
28 For more information, please visit the http://www.ruxcon.org.au
29
30
31 .[x]. Important Dates .[x].
32
33 May 7th - Call For Presentations Open
34 September 7th - Call For Presentations Close
35 October 22-23 - Ruxcon/Breakpoint Training
36 October 24-25 - Breakpoint Conference
37 October 26-27 - Ruxcon Conference
38
39
40 .[x]. Topic Scope .[x].
41
42 o Topics of interest include, but are not limited to:
43 o Mobile Device Security
44 o Virtualization, Hypervisor, and Cloud Security
45 o Malware Analysis
46 o Reverse Engineering
47 o Exploitation Techniques
48 o Rootkit Development
49 o Code Analysis
50 o Forensics and Anti-Forensics
51 o Embedded Device Security
52 o Web Application Security
53 o Network Traffic Analysis
54 o Wireless Network Security
55 o Cryptography and Cryptanalysis
56 o Social Engineering
57 o Law Enforcement Activities
58 o Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)
59
60
61 .[x]. Submission Guidelines .[x].
62
63 In order for us to process your submission we require the following information:
64
65 1. Presentation title
66 2. Detailed summary of your presentation material
67 3. Name/Nickname
68 4. Mobile phone number
69 5. Brief personal biography
70 6. Description of any demonstrations involved in the presentation
71 7. Information on where the presentation material has or will be presented
72 before Ruxcon
73
74 * As a general guideline, Ruxcon presentations are between 45 and 60 minutes,
75 including question time.
76
77 If you have any enquiries about submissions, or would like to make a
78 submission, please send an email to presentations@××××××××××.au
79
80
81 .[x]. Contact .[x].
82
83 o Email: presentations@××××××××××.au
84 o Twitter: @ruxcon