Wireshark-users: [Wireshark-users] [HITB-Announce] REMINDER: #HITB2014KUL CFP Deadline: 1st Augus
From: Hafez Kamal <aphesz@xxxxxxxxxxxxxxxx>
Date: Thu, 17 Jul 2014 13:46:56 +0800
The deadline to submit your papers for the LAST AND FINAL HITB
Security Conference in Malaysia is just around the corner!

HITBSecConf2014 - Malaysia takes place at Intercontinental Kuala Lumpur
from October 13th - 16th (13th / 14th = training // 15th / 16th =
conference)

http://conference.hitb.org/hitbsecconf2014kul/

We're looking for talks that are highly technical, but most
importantly, material which is new, fresh and that _hasn't been
presented previously_ Here are a few talks that have already been
accepted for inclusion into the conference:

ARM Wrestling a Printer: How to Mod Firmware
http://conference.hitb.org/hitbsecconf2014kul/sessions/arm-wrestling-a-printer-how-to-mod-firmware/

Abusing JSONP with Rosetta Flash
http://conference.hitb.org/hitbsecconf2014kul/sessions/abusing-jsonp-with-rosetta-flash/

Browser Fuzzing in 2014: Where to Throw Your Stones
http://conference.hitb.org/hitbsecconf2014kul/sessions/browser-fuzzing-in-2014-david-vs-goliath-a-k-a-learn-where-to-throw-your-stones/

---

HITB CFP: http://cfp.hackinthebox.org/

Each accepted submission will entitle the speaker(s) to
accommodation for 3 nights / 4 days at the InterContinental Kuala Lumpur
and travel expense reimbursement up to EUR1200.00 per speaking slot.

Topics of interest include, but are not limited to the following:

  Cloud Security
  File System Security
  3G/4G/WIMAX Security
  SS7/GSM/VoIP Security
  Security of Medical Devices
  Critical Infrastructure Security
  Smartphone / MobileSecurity
  Smart Card and Physical Security
  Network Protocols, Analysis and Attacks
  Applications of Cryptographic Techniques
  Side Channel Analysis of Hardware Devices
  Analysis of Malicious Code / Viruses / Malware
  Data Recovery, Forensics and Incident Response
  Hardware based attacks and reverse engineering
  Windows / Linux / OS X / *NIX Security Vulnerabilities
  Next Generation Exploit and Exploit Mitigation Techniques
  NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security

WHITE PAPER: If your presentation is short listed for inclusion into the
conference program, a technical white paper must also be provided (3000
- 5000 words).

Your submissions will be reviewed by The HITB CFP Review Committee:

Charlie Miller, Twitter
Katie Moussouris, Chief Policy Officer, HackerOne
Itzik Kotler, Chief Technology Officer, Security Art
Cesar Cerrudo, Chief Technology Officer, IOActive
Jeremiah Grossman, Founder, Whitehat Security
Andrew Cushman, Senior Director, Microsoft
Saumil Shah, Founder CEO Net-Square
Thanh 'RD' Nguyen, THC, VNSECURITY
Alexander Kornburst, Red Database
Fredric Raynal, QuarksLab
Shreeraj Shah, Founder, BlueInfy
Dr. Marco Balduzzi, Senior Researcher, Trend Micro
Emmanuel Gadaix, Founder, TSTF
Andrea Barisani, Inverse Path
Philippe Langlois, TSTF
Ed Skoudis, InGuardians
Haroon Meer, Thinkst
Chris Evans, Google
Raoul Chiesa, TSTF/ISECOM
rsnake, SecTheory
Gal Diskin, Intel
Skyper, THC

Regards,
Hafez Kamal
Hack in The Box (M) Sdn. Bhd
36th Floor, Menara Maxis
Kuala Lumpur City Centre
50088 Kuala Lumpur, Malaysia
Tel: +603-26157299
Fax: +603-26150088