posted by user: axellec || 3878 views || tracked by 1 users: [display]

TROOPERS 2015 : Troopers

FacebookTwitterLinkedInGoogle

Link: https://www.troopers.de/troopers/contribute/
 
When Mar 18, 2015 - Mar 19, 2015
Where Heidelberg/Germany
Submission Deadline Jan 10, 2015
Notification Due Feb 1, 2015
Final Version Due Mar 1, 2015
Categories    security   hacking   embedded devices
 

Call For Papers

Troopers14 was an extraordinary event (take a look at the TROOPERS Archives). Everybody involved had so much fun and we had so many great talks… it seems quite difficult to do even better 2015. Still, we’ll try.
You can be part of it. Again, Troopers will be held in the beautiful city of Heidelberg/Germany (on 18th and 19th March 2015) and will feature two tracks, one on attack techniques and security research, the other focused on the defense side and management aspects of the infosec world.

This call for papers addresses security researchers interested in sharing their work with other researchers and a high level audience (composed of about 60% people from industry, 20% from academia and another 20% from [research] community). We would like to invite everyone with special knowledge in breaking security in whatever area or practical experience in securing complex information systems to present their skills, tools or experience.
Speaker Privileges

We will cover the flight costs (limited to EUR 750 for speakers from Europe and US$ 1800 for speakers from other continents) and five nights of accomodation, plus “some evening fun and other amenities” for con speaker. To get an idea of our speaker treatment see http://www.elladodelmal.com/2010/03/como-una-rockn-roll-star.html
“Fresh Headz”

Given an appropriate subject and technical level we’re happy to welcome “fresh speakers” (not seen in various places before) and we’re happy to help you with setting up your talk (or getting over your pre-talk excitement).
Submissions

We are mainly interested in talks on

Embedded Devices
Security in a Mobile World
Virtualization & Cloud Stuff
Industrial Networking
Security in Telco Environments
Secure Coding & Advances in the Software Security Space
Feasible Risk Assessment Approaches
IPv6

Obviously heavy vendor-pitching will not be welcomed warmly and we reserve the right to ask for modifications of confirmed talks if we have the impression there’s too much of that in a talk.
CFP submissions [to cfp@troopers.de] must include the following information:

Brief biography including list of publications and papers published previously.
Proposed presentation title & synopsis/description.
Contact Information (full name, alias, handle, e-mail, postal address, phone, country of origin, special meal requirement, smoking habits .
Employment and/or affiliations information.
Why is your material different or innovative or significant?

Please note that all speakers will be allocated 55 minutes of presentation time + 5 minutes Q+A. Any speakers that require more time must inform the CFP committee in the course of the submission. Talks happening in the attack track are expected to include a live demo and a subsequent tool release. We plan to perform a (WebEx based) dry run of all presentations in the final two weeks before Troopers. Please be prepared for that.

By agreeing to speak at Troopers 15 you are granting ERNW GmbH the rights to reproduce, distribute, advertise and show your presentation including but not limited to www.troopers.de, printed and/or electronic advertisements, and all other mediums.
Important Dates

Deadline for Submission: 10 Jan 2015,
Final Notification: 01 Feb 2015,
Presentation slides due: 01 Mar 2015
The conference: 18-19 Mar 2015.

Related Resources

ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
ACSAC 2017   Annual Computer Security Applications Conference
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
IJNGN 2017   International Journal of Next-Generation Networks
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IJSC 2017   International Journal on Soft Computing
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
IJCIS 2017   International Journal on Cryptography and Information Security
FGCT 2017   Sixth International Conference on Future Generation Communication Technologies