The Call for Papers for the 8th annual HITBSecConf in Amsterdam is now open!
If you're working on new ways to break out of sandboxes, built a state of the art neural network or if you've found a new way to detect and defend next gen attacks, we want to see you on stage at HITBSecConf2018 in Amsterdam!
HITB2018AMS will be held at the NH Grand Krasnapolsky in Amsterdam from the 9th till the 13th of April, featuring six 3-day technical training courses followed by our 2-day triple track conference, a Capture the Flag competition, a technology exhibition with an expanded area covering AI and blockchain related entities, a space for EU hackerspaces, a lock picking village, car hacking and hardware related exhibits plus our CommSec track - a free-to-attend track of 30 and 60 minute talks that we also live stream on Youtube!
For the main conference track, we are looking for 60 and 120 minute offensive focused deep-knowledge presentations. Research that is new and never before seen attack and defense methods are of more interest than a subject that has been covered several times before. Summaries not exceeding 1250 words should be submitted (in plain text format) to us through our online CFP system for review and possible inclusion in the programme.
Submission Deadline: 31st December 2017
Each accepted submission will entitle the speaker(s) to accommodation for 3 nights / 4 days and travel expense reimbursement up to EUR1200.00 _per speaking slot_
Topics of interest include, but are not limited to the following:
File System Security
Security of Medical Devices
Critical Infrastructure Security
Smartphone / MobileSecurity
Smart Card and Physical Security
Network Protocols, Analysis and Attacks
Applications of Cryptographic Techniques
Side Channel Analysis of Hardware Devices
Analysis of Malicious Code / Viruses / Malware
Data Recovery, Forensics and Incident Response
Hardware based attacks and reverse engineering
Windows / Linux / OS X / *NIX Security Vulnerbilities
Artificial Intelligence / Machine Learning for Security
Next Generation Exploit and Exploit Mitigation Techniques
NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security