posted by user: axellec || 3860 views || tracked by 8 users: [display]

WOOT 2016 : 10th Workshop on Offensive Technologies

FacebookTwitterLinkedInGoogle

Link: https://www.usenix.org/conference/woot16/call-for-papers
 
When Aug 8, 2016 - Aug 9, 2016
Where Austin, Texas, USA
Submission Deadline May 17, 2016
Categories    vulnerability   offensive   MALWARE   attack
 

Call For Papers

Computer security exposes the differences between the actual mechanisms of everyday trusted technologies and their models used by developers, architects, academic researchers, owners, operators, and end users. While being inherently focused on practice, security also poses questions such as "what kind of computations trusted systems are and aren't capable of?," which harken back to fundamentals of computability. State-of-the-art offense explores these questions pragmatically, gathering material for generalizations that lead to better models and more trustworthy systems.

WOOT provides a forum for high-quality, peer-reviewed work discussing tools and techniques for attack. Submissions should reflect the state of the art in offensive computer security technology, exposing poorly understood mechanisms, presenting novel attacks, or surveying the state of offensive operations at scale.

WOOT '16 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer reviewed and shepherded as appropriate.

Submission topics include but are not limited to:

Vulnerability research
Offensive applications of formal methods (solvers, symbolic execution)
Practical attacks on deployed cryptographic systems and kleptography
Offensive aspects of mobile security (including location, payments, and RF)
Attacks on content protection and DRM
Hardware attacks and attacks on the "Internet of Things"
Internet-scale network reconnaissance
Application security (web frameworks, distributed databases, multi-factor authentication)
Malware design, implementation and analysis
Vulnerabilities in browser and client-side security (runtimes, JITs, sandboxing)
Mass surveillance and attacks against privacy

Related Resources

EnergyTech 2026   8th International Conference on Renewable Energy, Resources and Sustainable Technologies
EAIT 2026   EAIT-Tokyo, Japan2026:2026 International Conference on Emerging AI Technologies (EAIT 2026)
Tokyo, Japan-EAIT 2026   EAIT 2026 : EAIT-Tokyo, Japan2026:2026 International Conference on Emerging AI Technologies (EAIT 2026)
CBMS 2026   39th IEEE International Symposium on Computer-Based Medical Systems
ICMLT 2026   2026 11th International Conference on Machine Learning Technologies (ICMLT 2026)
ICMLT--EI 2026   2026 11th International Conference on Machine Learning Technologies (ICMLT 2026)
HPCCT 2026   2026 the 10th High Performance Computing and Cluster Technologies Conference (HPCCT 2026)--ESCI
HPCCT--ESCI 2026   2026 the 10th High Performance Computing and Cluster Technologies Conference (HPCCT 2026)--ESCI
Call for Book Chapters/Wiley-IEEE Press 2026   Edge AI: Principles, Technologies, and Applications
IEEE-CTCNet 2025   2025 2nd Asia Pacific Conference on Computing Technologies, Communications and Networking (CTCNet 2025)