posted by user: adulau || 2902 views || tracked by 12 users: [display]

HACK.LU 2014 : HACK.LU 2014


When Oct 21, 2014 - Oct 24, 2014
Where Luxembourg
Submission Deadline Jul 15, 2014
Notification Due Aug 1, 2014
Final Version Due Jul 15, 2014
Categories    security   network security   cryptography   information security

Call For Papers 2014

"Within a few months of its availability, new technology helps
the bad guys at least as much as it helps the good guys."

21-24 October 2014 / Luxembourg

Call for Papers 2014

The purpose of the convention is to give an open and free
playground where people can discuss the implication of new
technologies in society. is a balanced mix convention where
technical and non-technical people can meet each others and share
freely all kind of information. The convention will be held in the
Grand-Duchy of Luxembourg in October (21-24.10.2014). The most
significant new discoveries about computer network attacks and
defenses, commercial security solutions, and pragmatic real world
security experience will be presented in a three days series of
informative tutorials. We would like to announce the opportunity to
submit papers, and/or lightning talk proposals for selection by the technical review committee. This year we will be doing
workshops on the first day PM and talks of 1 hour or 30 minutes in
the main track for the three days.

A capture the flag (organized by @fluxfingers) contest will take place
during the whole conference.

Scope ======

Topics of interest include, but are not limited to :

* Software Engineering and Security
* Social Engineering
* Honeypots/Honeynets
* Spyware, Phishing and Botnets (Distributed attacks)
* Newly discovered vulnerabilities in software and hardware
* Electronic/Digital Privacy
* Wireless Network and Security
* Attacks on Information Systems and/or Digital Information Storage
* Electronic Voting
* Free Software and Security
* Assessment of Computer, Electronic Devices and Information Systems
* Standards for Information Security
* Legal and Social Aspect of Information Security
* Software Engineering and Security
* Security in Information Retrieval
* Network Security
* Malware Analysis and Reversing
* Forensics and Anti-Forensics
* Offensive (and counter-offensive) Information Technology
* Mobile Communications Security and Vulnerabilities
* CSIRTs, Incident Analysis and Response

Deadlines =========

The following dates are important if you want to participate in the
call for papers.

Full paper submission : no later than 15th July 2014

Notification date : 15th August 2014

Submission guideline ====================

Authors should submit a paper in English up to 5.000 words, using a
non-proprietary and open electronic format. The program committee
will review all papers and the author of each paper will be notified
of the result, by electronic means. Abstract is up to 400
words. Submissions must be sent to

Submissions should also include the following:

1. Presenter, and geographical location (country of origin/passport)
and contact info.
2. Employer and/or affiliations.
3. Brief biography, list of publications or papers.
4. Any significant presentation and/or educational
5. Reason why this material is innovative or significant
or an important tutorial.
6. Optionally, any samples of prepared material or outlines ready.
7. Information about if yes or no the submission has already
been presented and where.

Presentations/topics that haven't been presented before
will be rewarded. Presentation or research including software or
proof-of-concept will be rewarded too.

The information will be used only for the sole purpose of the
convention including the information on the public website. If you
want to remain anonymous, you have the right to use a nickname.

If the paper is not accepted in the main track, it could be accepted
in short or lightning talk session but in this case the speakers'
privileges are not applicable.

Speakers' Privileges ====================

* Accommodation will be provided (3 nights)
* Travel expenses will be covered up to a max amount agreed in advance
* Conference speakers night

Publication and rights ======================

Authors keep the full rights on their publication/papers but give an
unrestricted right to redistribute their papers for the
convention and its related electronic/paper publication.

Sponsoring ==========

If you want to support the initiative and gain visibility by
sponsoring, please contact us by writing an e-mail to info(AT)

Web site and wiki =================

CfP website :

Related Resources

AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
IJMSA 2016   International Journal of Modelling, Simulation and Applications
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
FC 2017   Financial Cryptography and Data Security 2017
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ACISP 2017   Australasian Conference on Information Security and Privacy
AEIJ 2016   Advanced Energy: An International Journal
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
IJISS 2016   International Journal of Information Security Science (IJISS)