posted by user: alashkov || 1590 views || tracked by 3 users: [display]

PHDays 2015 : Positive Hack Days


When May 26, 2015 - May 27, 2015
Where Moscow
Submission Deadline Jan 30, 2015
Final Version Due Mar 31, 2015
Categories    information security   computer science   web security   hacking

Call For Papers

Positive Hack Days is a annual international forum on practical information security. The PHDays programme consists of two large blocks combining theory and practice. These are the conference and the contests.

What is waiting for you at PHDays V? 3,000 specialists from all over the world, six conference flows, 15,000 online participants, CTF and competitions based on real incidents, no cliches and advertisement propaganda, an opportunity to experiment with hard-to-get equipment, excitement of path breaking, hackers and security experts networking.


We are expecting researches that develop and advance modern information technologies. If you have found a new vulnerability, developed new protection methods, organized an international CERT, or estimated the moonlight influence on people behavior in social networks and credit card fraud — then the PHDays Forum is an excellent place to share your results with thousands of experts.

This year, we are organizing something new — a separate flow for developers to discuss the problems of high-load and embedded systems development, Big Data practical use, and Internet stability improvement.

If you believe your talk will be interesting for the community, please, feel free to apply. The most important thing for a research to apply is to be unique and provide a fresh, hacking look at modern information technologies and their role in our life.


Participation format and selection principles

- Talk (50 minutes)
- Fast Track (15 minutes)
- Hands-on Lab (up to 4 hours)

If you have something interesting and surprising to show, but no of the above-listed formats is good for you, please, feel free to apply anyway and be sure we will consider your work.

There are no tight restrictions: anyone from a novice to a recognized expert in information security can be a speaker. Every application is considered by our international program committee traditionally consisting of the most competent experts. They will select the best works!

Please, submit your application at We will not accept applications from PR or other representatives of researchers.

We will not accept works aimed at promoting products, services, or companies. The works based on the recent investigations will be preferred, as well as the reviews of new program tools and vulnerabilities.

The application should contain the following information:

1) Speaker's name, country and city of residence and contacts (e-mail address, phone number).

2) Curriculum vitae including education, main speeches and published articles.

3) The topic, title, and brief summary of the talk.

4) Other investigations in this field. Why is your work especially noteworthy?

5) Places where the investigation has been already shown including events, blogs, online and offline titles.

Please, specify whether you will be able to provide us with the full text of your research or with the presentation only. Mark what the preferred language of speech for you is.

It is recommended that you send additional materials, utilities, and practical examples to help us understand the essence of your work. You are welcome to submit several applications, but all separately.


For additional information, please write to We urge you to use this e-mail address instead of asking the program committee members personally. Important datesThe applications for participation in the conference will be accepted in two stages:

- the first stage: from December 3, 2014 to January 30, 2015,
- the second stage: from February 16, 2015 to March 31, 2015.

Every applicant will receive a response with the results within two weeks after the stage closing.


For CFP, we use an open-source system Frab. We will appreciate if you pay attention to this service in the course of traditional examination of the conference resources (the source code can be found at

We are going to invite those who will reveal unknown vulnerabilities in Frab to visit PHDays for free. Please, do not perform destructive actions against the Frab site lest we lose our speakers.

Related Resources 2016
ICML 2017   34th International Conference on Machine Learning
BSC-UPC-HACK 2016   1st Annual BSC/UPC HPC Hackathon
ICCV 2017   International Conference on Computer Vision
SWQD 2017   Software Quality Days 2017
IJE 2016   International Journal of Education
WSED 2017   World Sustainable Energy Days 2017
ISMIS 2017   23rd International Symposium on Methodologies for Intelligent Systems
VDB 2016   Voxxed Days Belgrade 2016
ICMLSC - ACM 2017   2017 International Conference on Machine Learning and Soft Computing (ICMLSC 2017)--Ei, ISI and Scopus