Tuesday, April 05, 2016
ROOTCON 10 Call For Papers Now Open!
Posted by
Shipcode
at
5.4.16
Labels:
Call For Papers,
hacking,
hacking conference,
rootcon,
ROOTCON 10,
rootcon speakers
Last year at ROOTCON IX, we had some awesome lineup of talks from 31337 speakers:- How to Shot Web: Better Web Hacking in 2015 by Jason Haddix
- BackDooring Git by John Menerick
- Open Source Internet Infrastructure Insecurity by John Menerick
- Unmasking Malware by Christopher Elisan
- Hacking Time by Carlos Tingson
- Hiding Behind ART by Paul Sabanal
- Building Automation and Control: Hacking Energy Saving System by Philippe Z Lin
- Detecting Indicators of a Compromise Using an SDN-Based Network Access Control Implementation by Mon Nunez & Paul Prantilla
- Incident Response for Targeted attacks by Jose Ramon Palanco
- How safe is my system from reverse engineering by Markku Kero
- Fixing CSRF Vulnerabilities Effectively by Lu Zhao
- Once more unto the data breach by Steve Miller
- Oh My Honey: Honeypots (or honeynets) by Ray Torres
- Understanding HTTP/2 by Nathan LaFollette
Now what about this year? Well, we need the crowd of researchers and 31337 hackers again to submit your talks since ROOTCON X's CFP (Call for Papers) has been opened for this year!
It's time to show off those fresh and sizzling new hacks on September 22-24, 2016 at the Taal Vista Hotel, Tagaytay, Philippines. What are you waiting for? Email cfp [at] rootcon [dot] org and follow the instructions here: https://www.rootcon.org/xml/rc10/cfp
Topics of interest but not limited to:
- Real-life hack (responsible disclosure)
- Non-tech hacking
- New tool release
- Exploit Development
- Reverse Engineering
- Web Application Attacks
- Tools 101 (Metasploit, Nmap, etc…etc…)
- Wireless Attacks (3G, 4G, 802.11(x))
- Cloud Security
- Vulnerability Discovery
- OS Level Vulnerabilities
- Physical Security (Lock picking – Digital Locks or Digital Safes)
- SQL Injections
- Vendor Appliance Vulnerabilities
- Exploitation Techniques
- Mobile Security
- Internet of Things (IOT)