posted by user: adulau || 5810 views || tracked by 11 users: [display]

HACK.LU 2014 : HACK.LU 2014


When Oct 21, 2014 - Oct 24, 2014
Where Luxembourg
Submission Deadline Jul 15, 2014
Notification Due Aug 1, 2014
Final Version Due Jul 15, 2014
Categories    security   network security   cryptography   information security

Call For Papers 2014

"Within a few months of its availability, new technology helps
the bad guys at least as much as it helps the good guys."

21-24 October 2014 / Luxembourg

Call for Papers 2014

The purpose of the convention is to give an open and free
playground where people can discuss the implication of new
technologies in society. is a balanced mix convention where
technical and non-technical people can meet each others and share
freely all kind of information. The convention will be held in the
Grand-Duchy of Luxembourg in October (21-24.10.2014). The most
significant new discoveries about computer network attacks and
defenses, commercial security solutions, and pragmatic real world
security experience will be presented in a three days series of
informative tutorials. We would like to announce the opportunity to
submit papers, and/or lightning talk proposals for selection by the technical review committee. This year we will be doing
workshops on the first day PM and talks of 1 hour or 30 minutes in
the main track for the three days.

A capture the flag (organized by @fluxfingers) contest will take place
during the whole conference.

Scope ======

Topics of interest include, but are not limited to :

* Software Engineering and Security
* Social Engineering
* Honeypots/Honeynets
* Spyware, Phishing and Botnets (Distributed attacks)
* Newly discovered vulnerabilities in software and hardware
* Electronic/Digital Privacy
* Wireless Network and Security
* Attacks on Information Systems and/or Digital Information Storage
* Electronic Voting
* Free Software and Security
* Assessment of Computer, Electronic Devices and Information Systems
* Standards for Information Security
* Legal and Social Aspect of Information Security
* Software Engineering and Security
* Security in Information Retrieval
* Network Security
* Malware Analysis and Reversing
* Forensics and Anti-Forensics
* Offensive (and counter-offensive) Information Technology
* Mobile Communications Security and Vulnerabilities
* CSIRTs, Incident Analysis and Response

Deadlines =========

The following dates are important if you want to participate in the
call for papers.

Full paper submission : no later than 15th July 2014

Notification date : 15th August 2014

Submission guideline ====================

Authors should submit a paper in English up to 5.000 words, using a
non-proprietary and open electronic format. The program committee
will review all papers and the author of each paper will be notified
of the result, by electronic means. Abstract is up to 400
words. Submissions must be sent to

Submissions should also include the following:

1. Presenter, and geographical location (country of origin/passport)
and contact info.
2. Employer and/or affiliations.
3. Brief biography, list of publications or papers.
4. Any significant presentation and/or educational
5. Reason why this material is innovative or significant
or an important tutorial.
6. Optionally, any samples of prepared material or outlines ready.
7. Information about if yes or no the submission has already
been presented and where.

Presentations/topics that haven't been presented before
will be rewarded. Presentation or research including software or
proof-of-concept will be rewarded too.

The information will be used only for the sole purpose of the
convention including the information on the public website. If you
want to remain anonymous, you have the right to use a nickname.

If the paper is not accepted in the main track, it could be accepted
in short or lightning talk session but in this case the speakers'
privileges are not applicable.

Speakers' Privileges ====================

* Accommodation will be provided (3 nights)
* Travel expenses will be covered up to a max amount agreed in advance
* Conference speakers night

Publication and rights ======================

Authors keep the full rights on their publication/papers but give an
unrestricted right to redistribute their papers for the
convention and its related electronic/paper publication.

Sponsoring ==========

If you want to support the initiative and gain visibility by
sponsoring, please contact us by writing an e-mail to info(AT)

Web site and wiki =================

CfP website :

Related Resources

NordSec 2022   The 27th Nordic Conference on Secure IT Systems
IJITMC 2022   The International Journal of Information Technology, Modeling and Computing
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
ICSS 2022   8th International Conference on Software Security
DNLP 2023   4th International Conference on Data Mining and NLP
SVC 2023   4th International Conference on Signal Processing, VLSI Design & Communication Systems
CSE 2022   10th International Conference on Computational Science and Engineering
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
IJANS 2022   International Journal on AdHoc Networking Systems
NLMLT 2022   International Conference on NLP and Machine Learning Trends