Pages
▼
2015/05/12
【HITCON 2015 Community Call for Papers】
Succeeding HITCON X, the 10th annivarsary of the Hacks in Taiwan Conference (HITCON), this year’s HITCON will continue with the Training and Enterprise events that was introduced last year, and will be a six day event being held from 24th Aug to 29th Aug. There will be three components in this year’s HITCON: The HITCON Training, a workshop type conference. The HITCON Enterprise, an event aimed at the enterprises and government sectors, similiar to the BlackHat Briefings. The HITCON Community, the rename and continuation of the classical HITCON event, and is similar to DEFCON.
HITCON Community will be held in the Humanities & Social Sciences Building, Academia Sinica, and is a great carnival for hackers, security experts and everyone in the information security community. In addition to presenting information security technologies, there will be many more activities, so that everyone in the community, including students, the professionals and everyone interested can network with each others. We are looking forward to having papers submitted from elite hackers, researchers and everyone else. The following are the Call For Paper details:
Call for Papers topics:
There are three featured topics at HITCON Community 2015:
Security of Things: Security of Thigs is an extension of Internet of Things (IoT). As the IoT industry experiencing intense growth, and will likely be all around us in the future, deeply intertwined with our lives, its security is not something that we can ignore. Convience almost always brought about insecurities, and while expecting the convience brought by IoT, can it really protect our privacy?
Capture The Flag: As the cradle for professionals in the information security field, the significance of the CTF competition cannot be overlooked. Recently, some of the local teams have been scoring pretting well in various international CTF competition, and thus we’ll be inviting various CTF teams to share their experience in the preparation that led to, and the actual participation in, these CTF competitions, in order to promote the values and meanings of CTF competition in the field of information security.
Training of Information Security Professionals: Training of information security professionals have always been a key focus of HITCON, it is in fact our the mission. This is done in the hope of introducing more people to the field of information security, and furthermore learn about it, thus joining the information security industry. In coordination with the HITCON Junior series of activities, this year we will be collaborating more with the community and student organizations, in order to ensure that even beginners gets to learn a lot during the conference, instead of feeling isolated.
Aside from the 3 topics above, we are also interested in other information security topics, including but not limited to:
Advanced Malware Analysis, Vulnerability Discovery and Exploitation Techniques, Network Monitoring, Mobile Devices Security, Mobile Apps Security, Wireless Device Security, Cloud Security, Reverse Engineering, Backdoors and Rootkits, APT Incidents, DDoS Attacks, Web and Database Security, Cryptography and Wargame.
Submission Format, Procedures and Other Considerations
The presentation format is 40 to 50 minutes of speech and it is preferred that the presentations covers actual implementation techniques and technologies.
For those intending to submit their paper, please apply for an account at the call for papers website ( https://cfp2015.hitcon.org ) and upload the paper before July 5th.
Submissions will be reviewed on a rolling basis. The review committee reserves the right to end the call for papers before the dealine if quota is met.
For more informations on the terms and remunerations for accepted papers, please refer to our Terms and Conditions document on the HITCON CFP website.
Important Dates:
Call for papers :2015 / 5 / 12 ~ 2015 / 7 / 5
HITCON Training:2015 / 8/ 24 - 2015 / 8 / 25
HITCON Enterprise:2015 / 8 / 26 - 2015 / 8 / 27
HITCON Community:2015 / 8 / 28 - 2015 / 8 / 29
No comments:
Post a Comment