posted by user: axellec || 4645 views || tracked by 1 users: [display]

TROOPERS 2015 : Troopers

FacebookTwitterLinkedInGoogle

Link: https://www.troopers.de/troopers/contribute/
 
When Mar 18, 2015 - Mar 19, 2015
Where Heidelberg/Germany
Submission Deadline Jan 10, 2015
Notification Due Feb 1, 2015
Final Version Due Mar 1, 2015
Categories    security   hacking   embedded devices
 

Call For Papers

Troopers14 was an extraordinary event (take a look at the TROOPERS Archives). Everybody involved had so much fun and we had so many great talks… it seems quite difficult to do even better 2015. Still, we’ll try.
You can be part of it. Again, Troopers will be held in the beautiful city of Heidelberg/Germany (on 18th and 19th March 2015) and will feature two tracks, one on attack techniques and security research, the other focused on the defense side and management aspects of the infosec world.

This call for papers addresses security researchers interested in sharing their work with other researchers and a high level audience (composed of about 60% people from industry, 20% from academia and another 20% from [research] community). We would like to invite everyone with special knowledge in breaking security in whatever area or practical experience in securing complex information systems to present their skills, tools or experience.
Speaker Privileges

We will cover the flight costs (limited to EUR 750 for speakers from Europe and US$ 1800 for speakers from other continents) and five nights of accomodation, plus “some evening fun and other amenities” for con speaker. To get an idea of our speaker treatment see http://www.elladodelmal.com/2010/03/como-una-rockn-roll-star.html
“Fresh Headz”

Given an appropriate subject and technical level we’re happy to welcome “fresh speakers” (not seen in various places before) and we’re happy to help you with setting up your talk (or getting over your pre-talk excitement).
Submissions

We are mainly interested in talks on

Embedded Devices
Security in a Mobile World
Virtualization & Cloud Stuff
Industrial Networking
Security in Telco Environments
Secure Coding & Advances in the Software Security Space
Feasible Risk Assessment Approaches
IPv6

Obviously heavy vendor-pitching will not be welcomed warmly and we reserve the right to ask for modifications of confirmed talks if we have the impression there’s too much of that in a talk.
CFP submissions [to cfp@troopers.de] must include the following information:

Brief biography including list of publications and papers published previously.
Proposed presentation title & synopsis/description.
Contact Information (full name, alias, handle, e-mail, postal address, phone, country of origin, special meal requirement, smoking habits .
Employment and/or affiliations information.
Why is your material different or innovative or significant?

Please note that all speakers will be allocated 55 minutes of presentation time + 5 minutes Q+A. Any speakers that require more time must inform the CFP committee in the course of the submission. Talks happening in the attack track are expected to include a live demo and a subsequent tool release. We plan to perform a (WebEx based) dry run of all presentations in the final two weeks before Troopers. Please be prepared for that.

By agreeing to speak at Troopers 15 you are granting ERNW GmbH the rights to reproduce, distribute, advertise and show your presentation including but not limited to www.troopers.de, printed and/or electronic advertisements, and all other mediums.
Important Dates

Deadline for Submission: 10 Jan 2015,
Final Notification: 01 Feb 2015,
Presentation slides due: 01 Mar 2015
The conference: 18-19 Mar 2015.

Related Resources

CSW 2024   2024 3rd International Conference on Cyber Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology
CRBL 2024   International Conference on Cryptography and Blockchain
JoL 2024   International Journal of Law
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
MLNLP 2024   5th International Conference on Machine Learning Techniques and NLP
CSEIT 2024   11th International Conference on Computer Science, Engineering and Information Technology