{"id":42,"date":"2011-12-10T21:28:00","date_gmt":"2011-12-10T21:28:00","guid":{"rendered":"http:\/\/www.thehhd.com\/HES\/?page_id=42"},"modified":"2012-03-17T15:09:38","modified_gmt":"2012-03-17T15:09:38","slug":"call-for-paper","status":"publish","type":"page","link":"http:\/\/2012.hackitoergosum.org\/blog\/home\/call-for-paper","title":{"rendered":"CALL FOR PAPER"},"content":{"rendered":"<p>If you want to propose your talk, please <a title=\"Team of HES2012\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/contact\/team\">contact the CFP Team<\/a><\/p>\n<p>&#8211;[ Synopsis:<\/p>\n<p>This is the final call for papers for the HES 2012 Conference.<br \/>\nHackito Ergo Sum 2012 will take place in Paris from the\u00a012th to the 14th of April 2012.<\/p>\n<p>&#8211;[ What is HES ? Why would I like it anyway ?<\/p>\n<p>HES is a 100% hardcore technical security conference. HES is\u00a0unique by its continuous outstanding technical quality, but also\u00a0by its unusual freedom and spirit. HES is a 100% non profit conference,\u00a0mainly supported by the \/tmp\/lab Parisian hackerspace and generous\u00a0sponsors (who in exchange for their sponsoring, don&#8217;t get their say\u00a0on any of the organisation, format or content of the conference :).<\/p>\n<p>If you are unsure of wether you&#8217;ll like it, feel free to have a look\u00a0at the content of previous editions. Talks included topics such as\u00a0SS7 phone networks hacking, satellites take overs via x25, kernel land\u00a0exploits against grsecurity hardened kernels, or the pwnie awards\u00a0winner Tarjei Mandt for his first presentation on this topic (note\u00a0to Dave Aitel: yeah man, face it, it was first seen at HES !!) and\u00a0many more.<\/p>\n<p>Presentations on new R&amp;D projects are the core of the conference.<br \/>\nBy R&amp;D and security, HES really means new offensive R&amp;D security.<br \/>\nResearchers from all around the internet are welcome to come to\u00a0Paris and talk, without discrimination whatsoever : everyone is\u00a0equal in front of a computer. Maybe skills appart that is \ud83d\ude09<\/p>\n<p>HES is also an open big party, by the hacking community and for the\u00a0hacking community, with people coming literally from around the world.<br \/>\nIf you&#8217;d like to not only come, but be part of HES by organising a\u00a0workshop (lockpickers and organisers of a social engineering contest<br \/>\nwanted !) or contest : please do and refer the relevant section below.<\/p>\n<p>&#8211;[ Quality:<\/p>\n<p>The quality of submitions is so critical to the Hackito Ergo Sum\u00a0conference that papers will be reviewed by the scary HES Programming\u00a0Comitee of death. It wasn&#8217;t made to dissuade you from submitting,\u00a0but to ensure that the talks selected for HES will be as interresting\u00a0and new as possible.<\/p>\n<p>Submitions should be original and as fresh as in &#8220;never seen anywhere\u00a0before&#8221;. Massive upgrades and significant new research added to\u00a0talks previously presented at a few great conferences may make it.\u00a0Talks given more than 3 times will be rejected.<\/p>\n<p>Intense debates often spread inside the Programming Comitee on wether\u00a0a given topic is of interrest or new at all. Consensus as been reached\u00a0though regarding a few security buzz words. In order to avoid bullshit\u00a0talks, topics on Social Engineering and SCADA will only be considered\u00a0if demos are provided, and if themagnitude of the attack would at least\u00a0affect affect a significant portion of say, a city. Old well documented\u00a0techniques such as web applications (especially XSS, CSRF and clickjacking)\u00a0but also basic exploitation techniques (or easy targets lacking modern\u00a0security protections) are discouraged. To the opposite, hacking non\u00a0understood and poorly documented technologies including for instance hardware,\u00a0protocols, architectures, devices, networks, or applications among\u00a0others are warmly welcome.<\/p>\n<p>In a nutshell, submitions on how to achieve world domination in 2012\u00a0and how to eventually avoid it are of primary importance. How to survive and<br \/>\nfacilitate privacy in an incrinsingly policed internet are also a concerned.<\/p>\n<p>&#8211;[ Submitting:<\/p>\n<p>We are glad you are reading this section and are therefore thinking about<br \/>\nsubmitting to HES.<\/p>\n<p>Before submitting, we gently recommand you to have a look at the presentations\u00a0submitted in 2010 and 2011. It would give you an idea wether your talk may make\u00a0it to HES.<\/p>\n<p>We are accepting submissions in English only.<br \/>\nThe format will be of 45 mins presentation + 10 mins Q&amp;A.<\/p>\n<p>Please note that talks with content will judged commercial or non vendor neutral\u00a0will be rejected and\/or interrupted on stage.<\/p>\n<p>For this conference, preference will be given to offensive, innovative and\u00a0highly technical proposals covering (but not restricted to) the topics below:<\/p>\n<p>[*] Attacking Software<br \/>\n* Attacking the Internet Of Things<br \/>\n* Automating vulnerability discovery<br \/>\n* Weaponization and underworld\/government exploit market intelligence<br \/>\n* Non-x86, MIPS, ARM and x64 specific exploitation techniques<br \/>\n* Smarter and Dumber fuzzing for binary only vulnerability hunt<br \/>\n* Static and Dynamic binary or source-based analysis<br \/>\n* Hacking mobile: defeating iOS and Android security<br \/>\n* Kernel land exploits<br \/>\n* New advances in Attack frameworks and automation<br \/>\n* Virtual Machines and Virtual Infrastructures evasion<br \/>\n* Governmentalization of hacking projection force<\/p>\n<p>[*] Attacking Infrastructures<br \/>\n* Bank &amp; insurance: Swift and national electronic fund transfer technologies<br \/>\n* Telecom attacks<br \/>\n* Vulnerability scanning in new networks environments.<br \/>\n* Living in a post-Duqu, post-Stuxnet world<br \/>\n* Circumventing Governmental firewalls<br \/>\n* Lawful interception and DPI: evasion, exploitation, detection<br \/>\n* Military &amp; Intelligence data collection backbones<br \/>\n* Post monitoring techniques: Passive network attack<br \/>\n* GAN attacks<br \/>\n* Who&#8217;s the less secure: GPS or Galileo, show how<\/p>\n<p>[*] Attacking Hardware<br \/>\n* Drone hacking: Tic-Tac-Toe in the sky with Reaper and Raptor<br \/>\n* Robots MCU infection: STDs for Petman and Bigdog?<br \/>\n* Attacking Wireless Sensors and their underlying networks.<br \/>\n* Hardware reverse engineering (and exploitation + backdooring)<br \/>\n* LTE mobile phone attack<br \/>\n* eNode-B hacking<br \/>\n* Hacking UEFI &amp; Secure Boot<br \/>\n* Gnu Radio hacking applied to new domains<br \/>\n* RFID exploitation<br \/>\n* Hacking radio protocols, specifications and implementations<\/p>\n<p>[*] Attacking Crypto<br \/>\n* Identity Based Encryption attacks<br \/>\n* Quantum-based attacks of asymetric crypto<br \/>\n* Linear\/differential cryptanalysis of contemporary ciphers<br \/>\n* Crypto Algorithm strength modeling and evaluation metrics<br \/>\n* Crypto where you wouldn&#8217;t think there is<br \/>\n* Weak crypto in common radio links: from heartbeat links to microwave backhaul<\/p>\n<p>We highly encourage topics entirely new and discuptive.<\/p>\n<p>&#8211;[ Submissions:<\/p>\n<p>[*] Required information:<\/p>\n<p>Submitions must contain the following information:<\/p>\n<p>* Speakers name or alias<br \/>\n* Biography<br \/>\n* Presentation Title<br \/>\n* Description<br \/>\n* Needs: Internet? Others?<br \/>\n* Company (name) or Independent?<br \/>\n* Address<br \/>\n* Phone<br \/>\n* Email<br \/>\n* Demo (Y\/N)<\/p>\n<p>We highly encourage and will favor presentations with demos.<\/p>\n<p>Specify if submission contains any of the following information:<br \/>\n* Tool<br \/>\n* Slides<br \/>\n* Whitepaper<\/p>\n<p>[*] How to submit:<\/p>\n<p>Submit your presentation and materials by sending a mail at:<\/p>\n<p>hes-cfp@hackitoergosum.org<\/p>\n<p>&#8211;[ Wargame:<\/p>\n<p>As in all the previous editions of HES, Steven from the Over The Wire\u00a0community will charm and delight us with a wargame in the Russian\u00a0Mob thema. You will have to face one of the most active cyber mafia in the world.\u00a0Otlichno! We&#8217;d like to thank Steven for his amazing job at untertaining\u00a0us with both intellectually challenging and phun wargames.<\/p>\n<p>Stevens wargames are always very creative, and have a reputation to be both\u00a0terribly exciting and technically challenging.<\/p>\n<p>&#8211;[ Workshops:<\/p>\n<p>If you want to organize a workshop or any other activity during the conference,\u00a0you are most welcome. Please contact us at:<br \/>\nhes-orga@lists.hackitoergosum.org<\/p>\n<p>We&#8217;d like to see lockpicking, Social Engineering , phone moding, demo making,\u00a0DIY eletronics workshops among others.<\/p>\n<p>&#8211;[ Dates:<\/p>\n<p>2012-02-13 Final Call for Paper<br \/>\n2012-03-01 Submission Deadline<br \/>\n2012-03-05 Acceptance notification<br \/>\n2012-03-05 Program announcement<br \/>\n2012-04-12 Start of conference<br \/>\n2012-04-14 End of conference<\/p>\n<p>&#8211;[ Program Committe:<\/p>\n<p>The submissions will be reviewed by the following program committee:<br \/>\n* Tavis Ormandy (Google) @taviso<br \/>\n* Matthew Conover @symcmatt<br \/>\n* Jason Martin (SDNA Consulting, Shakacon)<br \/>\n* Stephen Ridley @s7ephen<br \/>\n* Mark Dowd (AzimuthSecurity) @mdowd<br \/>\n* Tiago Assumpcao (RIM)<br \/>\n* Alex Rice (Facebook) facebook.com\/rice<br \/>\n* Pedram Amini @pedramamini<br \/>\n* Erik Cabetas (Include Security)<br \/>\n* Dino A. Dai Zovi (Trail Of Bits) @dinodaizovi<br \/>\n* Alexander Sotirov @alexsotirov<br \/>\n* Barnaby Jack (McAfee) @barnaby_jack<br \/>\n* Charlie Miller (Accuvant) @0xcharlie<br \/>\n* David Litchfield (Accuvant) @dlitchfield<br \/>\n* Lurene Grenier (Harris) @pusscat<br \/>\n* Alex Ionescu @aionescu<br \/>\n* Nico Waisman (Immunity) @nicowaisman<br \/>\n* Philippe Langlois (P1 Security, TSTF, \/tmp\/lab) @philpraxis<br \/>\n* Jonathan Brossard (Toucan System, \/tmp\/lab) @endrazine<br \/>\n* Matthieu Suiche (MoonSols) @msuiche<br \/>\n* Piotr Bania @piotrbania<br \/>\n* Laurent Gaffie @laurentgaffie<br \/>\n* Julien Tinnes (Google)<br \/>\n* Brad Spengler (aka spender) (Grsecurity)<br \/>\n* Silvio Cesare (Deakin University) @silviocesare<br \/>\n* Carlos Sarraute (Core security)<br \/>\n* Cesar Cerrudo (IOActive) @cesarcer<br \/>\n* Daniel Hodson (aka mercy) (Ruxcon)<br \/>\n* Nicolas Ruff (E.A.D.S) @newsoft<br \/>\n* Julien Vanegue (Microsoft Security, Redmond) @jvanegue<br \/>\n* Itzik Kotler (aka izik) @itzikkotler<br \/>\n* Rodrigo Branco (aka BSDeamon) (Qualys) @bsdaemon<br \/>\n* Tim Shelton (aka Redsand) (HAWK Network Defense) @redsandbl4ck<br \/>\n* Ilja Van Sprundel (IOActive)<br \/>\n* Raoul Chiesa (TSTF)<br \/>\n* Dhillon Andrew Kannabhiran (HITB) @hackinthebox<br \/>\n* Philip Petterson (aka Rebel)<br \/>\n* The Grugq (COSEINC) @thegrugq<br \/>\n* Emmanuel Gadaix (TSTF) @gadaix<br \/>\n* Kugg (\/tmp\/lab)<br \/>\n* Harald Welte (gnumonks.org) @LaF0rge<br \/>\n* Van Hauser (THC)<br \/>\n* Fyodor Yarochkin (Armorize) @fygrave<br \/>\n* Gamma (THC, Teso)<br \/>\n* Pipacs (Linux Kernel Page Exec Protection)<br \/>\n* Shyama Rose @shazzzam<\/p>\n<p>Note: Hackito Ergo Sum would like to thank all those great researchers\u00a0for their unvaluable help in detecting the good ideas and potential\u00a0great talks in the HES submissions.<\/p>\n<p>&#8211;[ Trainings<\/p>\n<p>There will be no trainings in 2012. We hope to be able to offer trainings\u00a0in 2013. Thanks for those who submitted training offers this year : we got<br \/>\namazing proposals.<\/p>\n<p>-[EOF]-<br \/>\n<a class=\"twitter-share-button\" href=\"https:\/\/twitter.com\/share\" data-text=\"Calll for paper for Hackito Ergo Sum\">Tweet<\/a><br \/>\n<script type=\"text\/javascript\">\/\/ <![CDATA[\n         !function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=\"\/\/platform.twitter.com\/widgets.js\";fjs.parentNode.insertBefore(js,fjs);}}(document,\"script\",\"twitter-wjs\");\n\/\/ ]]><\/script><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you want to propose your talk, please contact the CFP Team &#8211;[ Synopsis: This is the final call for papers for the HES 2012 Conference. Hackito Ergo Sum 2012 will take place in Paris from the\u00a012th to the 14th of April 2012. &#8211;[ What is HES ? Why would I like it anyway ? [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":12,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":10,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":212,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/42\/revisions\/212"}],"up":[{"embeddable":true,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/12"}],"wp:attachment":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}