posted by user: axellec || 3630 views || tracked by 1 users: [display]

TROOPERS 2015 : Troopers


When Mar 18, 2015 - Mar 19, 2015
Where Heidelberg/Germany
Submission Deadline Jan 10, 2015
Notification Due Feb 1, 2015
Final Version Due Mar 1, 2015
Categories    security   hacking   embedded devices

Call For Papers

Troopers14 was an extraordinary event (take a look at the TROOPERS Archives). Everybody involved had so much fun and we had so many great talks… it seems quite difficult to do even better 2015. Still, we’ll try.
You can be part of it. Again, Troopers will be held in the beautiful city of Heidelberg/Germany (on 18th and 19th March 2015) and will feature two tracks, one on attack techniques and security research, the other focused on the defense side and management aspects of the infosec world.

This call for papers addresses security researchers interested in sharing their work with other researchers and a high level audience (composed of about 60% people from industry, 20% from academia and another 20% from [research] community). We would like to invite everyone with special knowledge in breaking security in whatever area or practical experience in securing complex information systems to present their skills, tools or experience.
Speaker Privileges

We will cover the flight costs (limited to EUR 750 for speakers from Europe and US$ 1800 for speakers from other continents) and five nights of accomodation, plus “some evening fun and other amenities” for con speaker. To get an idea of our speaker treatment see
“Fresh Headz”

Given an appropriate subject and technical level we’re happy to welcome “fresh speakers” (not seen in various places before) and we’re happy to help you with setting up your talk (or getting over your pre-talk excitement).

We are mainly interested in talks on

Embedded Devices
Security in a Mobile World
Virtualization & Cloud Stuff
Industrial Networking
Security in Telco Environments
Secure Coding & Advances in the Software Security Space
Feasible Risk Assessment Approaches

Obviously heavy vendor-pitching will not be welcomed warmly and we reserve the right to ask for modifications of confirmed talks if we have the impression there’s too much of that in a talk.
CFP submissions [to] must include the following information:

Brief biography including list of publications and papers published previously.
Proposed presentation title & synopsis/description.
Contact Information (full name, alias, handle, e-mail, postal address, phone, country of origin, special meal requirement, smoking habits .
Employment and/or affiliations information.
Why is your material different or innovative or significant?

Please note that all speakers will be allocated 55 minutes of presentation time + 5 minutes Q+A. Any speakers that require more time must inform the CFP committee in the course of the submission. Talks happening in the attack track are expected to include a live demo and a subsequent tool release. We plan to perform a (WebEx based) dry run of all presentations in the final two weeks before Troopers. Please be prepared for that.

By agreeing to speak at Troopers 15 you are granting ERNW GmbH the rights to reproduce, distribute, advertise and show your presentation including but not limited to, printed and/or electronic advertisements, and all other mediums.
Important Dates

Deadline for Submission: 10 Jan 2015,
Final Notification: 01 Feb 2015,
Presentation slides due: 01 Mar 2015
The conference: 18-19 Mar 2015.

Related Resources

TROOPERS 2016   Troopers
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
IoTBDS 2017   2nd International Conference on Internet of Things, Big Data and Security
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IJNGN 2016   International Journal of Next-Generation Networks