| |||||||||||
DeepSec 2009 : IN-DEPTH SECURITY CONFERENCE 2009 EUROPE | |||||||||||
Link: https://deepsec.net | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
About DeepSec
Bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. The DeepSec IDSC is an annual European two-day in-depth conference on computer, network, and application security. DeepSec IDSC 2009 will be held from November 17nd to 20th 2009 at the Imperial Riding School Vienna, and aims to bring together the leading security experts from all over the world in Europe. DeepSec IDSC is a non-product, non-vendor-biased conference event. Our aim is to present the best research and experience from the fields' leading experts. Intended target audience: Security Officers, Security Professionals and Product Vendors, IT Decision Makers, Policy Makers, Security-/Network-/Firewall-Admins, Hackers and Software Developers. In the past this conference has been attended by: Ericsson, Commerzbank, Philips, RBT, GRZ IT, IERN Sierra Leone, SAP AG, Improware, Telekom Austria, Microsoft, BAWAG P.S.K., T-Systems, Iphos, Sektion Eins, T-Mobile, Red Hat, SWITCH, Austrian National Bank, Daimler AG, Sentrigo, University of Vienna, SEC Consult, Tech Data, S21Sec, DHL, Bearing Point, Cygnos, wecon, YCO, Rolex SA, IronPort Systems, Microsoft, Cisco Systems, Oracle Corporation, and many others. Topics We are interested in bleeding edge security research directly from leading researchers, professionals, academics, industry, government and the underground security community. The focus of DeepSec will be on subtle dangers, stealthy exploits and things you don't see. If you got something to talk about that doesn't look like a security problem at the first glance, tell us about it. We'd like to hear about underestimated security issues that may be turned into major headaches for computer systems, networks and users alike. Send us stories about single bits that can change our destiny. Failing that we welcome less sneaky approaches, too. Please do not submit specific single exploits (which might be fixed by the time of the conference) and "yet-another-XYZ-hack", script kiddy content or similar "breakthroughs". Exploit frameworks, general approaches, "defective by design" resp. "defective by implementation" and high impact exploits have a much higher chance to get accepted. ;) Topics of special interest include * Operating System Security (7, XP, Vista, GNU/Linux, OS X, Plan 9, *BSD, ...) * E/I-Voting Case-Studies, Attacks, Weaknesses * Mobile and PAN Security * Network Protocol Analysis * AJAX/Web2.0/JavaScript Security * Secure Software Development * VoIP * Perimeter Defense / Firewall Technology * Digital Forensics * WLAN/WiFi, GPRS, IPv6 and 3G Security * IPv6 * Wireless Technologies * Virtualisation * Social Engineering * Smart Card Security * Cryptography * Intrusion Detection * Incident Response * Rootkit Detection, Techniques, and Defense * Security Properties of Web-Frameworks * Malicious Code Analysis * Secure Framework Design * .NET and Java Security * Security Management |
|