exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

GreHack 2012 Call For Papers

GreHack 2012 Call For Papers
Posted May 25, 2012
Site ensiwiki.ensimag.fr

The GreHack 2012 Call For Papers has been announced. It will be held in Grenoble, France on October 19th, 2012.

tags | paper, conference
SHA-256 | 6e421da4cd6b7010e65487f7a52f69e401e8bb337e0877e8a18abd3df844ccff

GreHack 2012 Call For Papers

Change Mirror Download
*GreHack 2012* 2nd Call For Papers
http://ensiwiki.ensimag.fr/index.php/GreHack-2012-english
GreHack 2012 conference will be held in Grenoble (French Alps), France
and brings together students, academia, industry and gov in order to
exchange knowledge around emerging issues in the security + hacking
world.
During the night, a Capture The Flag will take place.


*Suggested Topics (not limited to)*
http://ensiwiki.ensimag.fr/index.php/GreHack_2012-Call_For_Presentation-english
- Track: ethical and legal
-- greyhat hacking: a consumer advance, or a risque for worlwide security?
-- current state of laws relative to cyber-security and hacking +
justified suggestions of modifications

- Track: technical
-- Hadopi: why is it a technical and legal failure? how to exploit
in memory vulnerabilities of Hadopi approved software?

-- In Memory Vulnerabilities
--- Windows 8: heap analysis, kernel structures and new memory protections
--- Exploit Corner: come present us your last sploit!

-- Hardcore Penetration Testing
--- Code obfuscation to complicate Reverse Engineering
--- Discrete Attacks (eg: without writing on the filesystem)
--- Hypervisor evasion
--- Vulnerabilities and exploits on defensive security tools (eg:
AntiMalwares, Firewalls, IDS)

-- Attacking Infrastructures
--- Internet: how to root your ***box? Which security
functionalities (and properties) are provided? How to bypass them?
--- ipsec, ipv6
--- routing protocols
--- wireless: 802.11, réseaux 3G, 4G, WiMAX, RFID
--- sensor networks

-- Malwares and Botnets
--- state of the art of botnets redundancy mechanism
--- self-code modification (polymorphism) of malwares
--- comparison of antimalwares when mutating malwares

- Track: research
-- Learning and Offensive Security
--- static and dynamic analysis (data tainting)
--- dumb/simple/basic fuzzing and smart-fuzzing for automating
vulnerability detection
--- metrics for exploitability of vulns (in memory, web)
--- model checking
--- advances in reverse-engineering automation and model inference
--- symbolic exection

-- Hardware Attacks
--- nanotechnology
--- fault injection in memory via laser
--- smart cards
--- transportations
--- medical tools
--- embedded malwares

-- Cryptology
--- influence of the environnment on PRNG entropy
--- mathematic aspects in current cryptology

-- Defensive Security
--- Trust Based Computing
--- New Access Control Models for processes isolation
--- New H/W + S/W for increasing the cost of exploitation

*Remark*
- We highly encourage original topics that break with traditional
research directions
- We will favor presentations with tools demonstrations or results


*Important Dates*
- CFP Opens: 1st May 2012
- CFP Closing Date: 15th July 2012
- Final speakers List online: 09 September 2012
- Conference Dates: 19 October 2012
- Capture The Flag: night (19 October 2012 till 20 October 2012 6am
french time :)

*Speaker Benefits:*
- Free pass to the conference
- Accommodation during the Conference
- GreHack will participate to travel expenses (up to 100% depending
on the cost and our final budget. Contact us for details)

Call for Papers is open till 15th July 2012, thus consider submitting
even if your topic is not listed above.


*Submission Guidelines:
http://ensiwiki.ensimag.fr/index.php/GreHack_2012-Call_For_Presentation-english
you can Email your submission to: grehack-program_committee _A_T_ car-online.fr

*Capture The Flag*
http://ensiwiki.ensimag.fr/index.php/GreHack-2012-Capture_The_Flag_rules-english

----
SecurIMAG - (in)security we trust!
http://ensiwiki.ensimag.fr/index.php/GreHack-2012-english

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close