posted by organizer: nsan || 5966 views || tracked by 8 users: [display]

Hacktivity 2024 : Hacktivity 2024 - IT Security Festival

FacebookTwitterLinkedInGoogle

Link: https://hacktivity.com/call-for-papers/
 
When Oct 17, 2024 - Oct 18, 2024
Where Budapest, Hungary
Submission Deadline Jul 15, 2024
Notification Due Jul 31, 2024
Categories    computer security   cyber security
 

Call For Papers

# Most important details

Conference: October 17-18, 2024
CFP closing date: July 15, 2024
CFP notification to authors: July 31, 2024
Venue: Budapest, Hungary, MOM Cultural Center (also Streamed Worldwide)
Email: cfp _!{at}!_ hacktivity.com
CFP application form: https://forms.gle/cYPmZcrxkNCEXhbC6


# The Hacktivity Crew

The Hacktivity hacking conference brings together the official and alternative representatives of the information security profession with all those interested in the area, in an informal, yet educational, and most of the times highly technical.


# Call For Contributions/Speakers

As usual, we are offering two alternatives: you can either give a presentation (20 or 40 minutes long) or you can give a 2 hour long workshop.


# Presentations

This is business as usual. We require a similar thing as in any other IT security conference CFP. We are accepting presentations from a wide spectrum of IT security topics. It is up to you to apply for a presentation that is in line with the spirit of Hacktivity. We favor presentations with a demo.

Please write your slide deck in English. Your speech can be in English (favored) or Hungarian.

As a speaker, you can have either a 20­ minutes or a 40 ­minutes slot to present your topic.


# Comprehensive workshop

We all know there is a huge difference between seeing and doing. Real knowledge grows from issuing your first command. Therefore, to help visitors start off learning we organize workshops. Comprehensive workshops are 2 hours long courses introducing basic/intermediate IT security skills. Previous years included topics like:

- Burp Extensions
- Malicious PDF Analysis
- Basic rootkit techniques
- SQL injections
- Hardware hacking
- etc...

A comprehensive workshop should meet the following requirements:

- participants should acquire a definite and useful piece of knowledge;
- participants bring their own equipment you should calculate with the diversity;
- a workshop will not have more than 25 attendees;
- it should fit into 60 plus 60 minutes (seeing plus doing) from preparation to take­aways.
- one workshop will be held max. 2 times during the two days


# Topics

Here are some topics that we are especially interested in:

- Vulnerabilities at unexpected territories
- Exploit mitigations and their mitigations
- Malware analysis inside or outside the sandbox
- Blue Team techniques / operation
- Big Data / Cloud / APT / any_fancy_buzzword
- What's the big deal? Are there any / What are the new threats?
- Extraordinary stories of #FAIL
- Any research which brings something brand new to the security world

These are just examples though, please feel free to submit your talk as long as it fits to the spirit of Hacktivity.


# How to apply as a speaker?

Please fill out our CFP application form: https://forms.gle/cYPmZcrxkNCEXhbC6

In case the Program Committee accepts your submission, we will get in touch with you to get the Speaker Agreement signed and to finalize every detail of your travel, accommodation & presentation.


# Speaker benefits

We would like to make our speakers comfortable so we are providing them with travel cost reimbursement up to 300 EUR, 2 nights of accommodation near the venue of the conference, a Speakers' Dinner on the second day of Hacktivity, a Sightseeing Tour around Budapest and a welcome package with exciting surprises.

What we are offering:

- Travel cost reimbursement up to 300 EUR;
- 2 nights of accommodation near the venue of Hackitvity;
- Speakers' dinner;
- In case your employer covers your travel and accommodation expenses, we display its logo on our content sponsor page;
- Cool limited edition Hacktivity apparel;
- Free entry to the 2 days conference;
- Photo and video documentation of your talk;
- Budapest sightseeing tour after the conference;
- Info about you and your presentation on our website;
- Promotion via social media;


# Great travel option

If you have ever considered visiting Hungary, this might be a good opportunity for you to see Budapest, meet the Hungarian IT security community & experience Hungarian hospitality and cuisine as well.

The capital of Hungary is situated along the Danube, in the heart of the Carpathian basin. Hilly Buda, which comprises one-third of the city's area is located along the right bank of the Danube surrounded by low mountains. Across the river sprawls flat Pest. The geology of Budapest has played a determining role in the city's life over the course of history. Hot springs breaking through limestone mountains supplying water of 35-76 degrees centigrade gave rise to a flourishing culture of spas in the Roman Age and made Budapest one of the most popular spa cities of Europe.


# Copyright

As a speaker or workshop presenter you should accept the following use of your intellectual properties:

Presentations will be recorded and made available on our website.

​For the event, a conference paper will be published with presentation/workshop titles and abstracts, the presenters' bio, and their photos. The brochures will be distributed at the registration for all participants of the conference.

​Presentations and workshop materials will be available on the conference web page after the event in pdf form.

During the presentation, we will take photos and use them in our publications which will be published on our site.

We are not going to use your materials in any other form mentioned above without your prior consent.


# Someone you would like to see present? Let us know!

If you are not decided yet on the subject you'd like to present, but know someone who is likely to accept speaking at the event, write to us at cfp[at]hacktivity.com including that person's contact info, and we'll do our best to reach out for him/her!

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder
SECRYPT 2025   22nd International Conference on Security and Cryptography