posted by organizer: TyphoonCon || 2163 views || tracked by 4 users: [display]

TYCON 2020 : TyphoonCon 2020

FacebookTwitterLinkedInGoogle

Link: https://typhooncon.com
 
When Jun 14, 2020 - Jun 18, 2020
Where Seoul, Korea
Submission Deadline Apr 15, 2020
Categories    cyber security   software and hardware exploits   mobile exploitation   software reverse engineering
 

Call For Papers

Topics of Interest for the CFP:

Vulnerability discovery
Advanced exploitation techniques:
Browsers Exploitation
OS Kernel Exploitation
Mobile Exploitation
Revolutionary Web Hacking Technique
Mitigation bypass techniques
Hardware reverse engineering
Software reverse engineering
Protocol reverse engineering
Attacks on cryptography in hardware and/or software


Your submission should include the following details:

Name, last name and contact details
Brief bio
Place of residence
Past speaking experience
Presentation topic and description
Speaker Benefits

At TyphoonCon we gather the best speakers from all across the world. That’s why we provide the best benefits possible to make their experience at our event the enjoyable and stress free:

-A trip to the capital of Seoul in June – considered the best time of the year to visit (not too cold, not too hot)
-Three nights of accommodation in the conference hotel (Courtyard Seoul Namdaemun). Located in one of the best areas for both eating, shopping and sightseeing.
-Round trip coach airfare of up to 2,000.00 USD
-Speaker honorarium of 1,000.00 USD for exclusive content not presented anywhere else before conference event date
-Invitation to the private pre-conference speaker dinner taking place June 17th 2020

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
DFDS 2025   Digital Forensics Doctoral Symposium
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins