Penetration Testing
Recon Europe 2017 Call For Papers - January 27 - 29, 2017 - Brussels, Belgium Sep 22 2016 09:47PM
cfpbrussels2017 recon cx

` . R E C O N * B R U S S E L S .
. . C F P ' .
' https://recon.cx
. 27 - 29 January 2017 . .
. ' Brussels, Belgium .
\ .
-6)) +
\ â?  .
. |
. . |
. / \ .
/ \ |
o. | / \ | | _^_
o 8-o : = : | ||X|| ^ ^ (:::)
'";//-.;'`;`/`o'\'`:;-.,;^,H,.;:= ,.,;:,." ||||| --A--.H H ,..{¨:¨:¨};:,
=:::",.N -A- HH_.;=_+=;',|::|" ":.===| A |==|M|M|::.^ ^ ____ ___
|__\__\_ |M|M|M|M|\'`---/__ A A === =,``===| A |""| | /= ; ; ; T T T T
|XX|XX|_||=|=|=|=|';|_|_|:|.=== ===/,.`.===|---]/ - ==== ; ; ; T T T T

REcon is a computer security conference with a focus on reverse
engineering and advanced exploitation techniques. It has been held
annually in Montreal, Canada, for 10 years.

We are pleased to announce that after 10 great years of hosting the
conference in Montreal, we are expanding to share the REcon experience
with Europe as well. This January we will host our first European annual
edition of the conference in Brussels, Belgium!

To get a feel for what the conference is all about, you can see videos
of presentations from REcon Montreal 2016 on our website at
https://recon.cx/

The conference offers a single track of presentations over the span
of three days along with technical training sessions held before
the presentation dates. Technical training varies in length between
two and four days.

Attendees help define the event. They have always been and always will
be those looking to learn something new, share ideas, and unwind in a
welcoming environment. The registration for the conference will open
soon.

We are now inviting speakers to submit proposals for Recon Brussels 2017
year's talks. Some guidelines for talks are:

- 30 or 60 minute presentations
- We are open to proposals for workshops that would occur alongside
talks
- There will be time for five to ten minute informal lightning talks
during the REcon party

Registration for training is also now open. This year we have another
great set of training's available:

- Mobile and Telecom Applied Hacking and Reverse Engineering by
Philippe Langlois (2 days: 25-26 January)
- Reverse Engineering Malware by Nicolas Brulez (4 days: 23-26 January)
- Windows Internals for Reverse Engineers by Alex Ionescu (4 days:
23-26 January)
- Hardware Hacking (Advanced) by Dmitry Nedospasov
(4 days: 23-26 January)
- The ARM Exploit Laboratory by Saumil Shah (4 days: 23-26 January)
- Windows Kernel Rootkits Techniques and Analysis by Bruce Dang
(4 days: 23-26 January)
- MacOS Sierra and iOS 10 Kernel Internals for Security Researchers
(4 days: 23-26 January)
- Botnet Takeover Attacks for Reverse Engineers by Brett Stone-Gross
and Tillmann Werner (4 days: 23-26 January)

Conference talks in the following fields are encouraged (but not
limited to):

- Hardware reverse engineering
- Software reverse engineering
- Protocol reverse engineering
- Finding vulnerabilities and writing exploits
- Novel data visualization for hackers and reverse engineers
- Bypassing security and software protections
- Attacks on cryptography in hardware and software
- Techniques for any of the above on new or interesting architectures
- Wireless hacking (We aren't talking about wifi here)
+ Anything else elite

How to submit:

Please send your submission to cfpbrussels2017 (at) recon (dot) cx [email concealed] in plain text
format.
You may send additional supporting parser exploits in other formats.

Please include:

- Speaker name(s) and/or handle
- Contact information, e-mail, and cell phone (optional)
- Presentation title
- Presentation subtitle
- Length of presentation (30 or 60 minutes)
- Description of the presentation
- Brief biography
- If available, presentation supporting materials (website, code,
paper, slides, outline, ...)
- Why it is cool / why you want to present it
- If you have any objections to recording the presentation
- Country of origin (Passport origin, current geographical location)
- Let us know if you need help with a Canadian visa (So we can start
the procedure early)
- Whether your employer will pay for your travel or if you need
assistance from us.

Get back to us soon! The first round of the CFP will end on October 30,
and the CFP closes on November 27. The first round of talks will be
announced during the second week of November and the final selection
will be announced during the second week of December.

You can optionally email your response using the following PGP key (You
can also find it at https://recon.cx/2017/brussels/contact/):

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=ickZ
-----END PGP PUBLIC KEY BLOCK-----

+++ATH0

N0 C4RR13R

------------------------------------------------------------------------

This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus