GreHack 2012-Call For Papers-english
GreHack is a non profit Security Conference (during day) and an Ethical Hacking Contest - aka CTF - (during night). This event will happen during the 42nd week (19th-20th October 2012) at Grenoble, french core for micro and nanotechnologies R&D. 2012 is the first edition. Some GreHack 2012 objectives.
|
twitter: @grehack |
Sommaire
- 1 Submission
- 2 Featured Conference Content
- 3 Program Committee
- 4 Publication
- 5 Diverse
Submission
Important Dates
- 2012-08-15 last Call For Papers (extended deadline due to several requests. was initially 2012-07-15)
- 2012-09-09 Paper Acceptance notification
- 2012-09-14 Program disclosure
- 2012-10-05 End of Call For Muscians/Artists/DJ
- 2012-10-19 Conference (9am-7pm) - CTF will start at 9pm30
- 2012-10-20 CTF will end at 6am
Language
- Summary: french or english are both fine (authors choice)
- Slides: we highly advise english
- Speech: english or french
Topics suggestions
Including, but not limited to:
Track: ethical and legal
- ethical hacking: a consumer advance, or a risque for worlwide security?
- current state of laws relative to cyber-security and hacking + justified suggestions of modifications
Track: technical
- Hadopi: why is it a technical and legal failure? how to exploit in memory vulnerabilities of Hadopi approved software?
In Memory Vulnerabilities
- Windows 8: heap analysis, kernel structures and new memory protections
- Exploit Corner: come present us your last sploit!
Hardcore Penetration Testing
- Code obfuscation in order to complicate Reverse Engineering
- Discrete Attacks (eg: without writing on the filesystem)
- Hypervisor evasion
- Vulnerabilities and exploits on defensive security tools (eg: AntiMalwares, Firewalls, IDS)
- Fuzzing of Embeeded devices (eg: TV, printers...)
Attacking Infrastructures
- Internet: how to root your ***box? Which security functionalities (and properties) are provided? How to bypass them?
- ipsec, ipv6
- routing protocols
- wireless: 802.11, réseaux 3G, 4G, WiMAX, RFID
- sensor networks
Malwares and Botnets
- state of the art of botnets redundancy mechanism
- self-code modification (polymorphism) of malwares
- comparison of antimalwares when mutating malwares
Track: research
Learning and Offensive Security
- static and dynamic analysis (data tainting)
- dumb/simple/basic fuzzing and smart-fuzzing for automating vulnerability detection
- metrics for exploitability of vulns (in memory, web)
- model checking
- advances in reverse-engineering automation and model inference
- symbolic exection
Hardware Attacks
- nanotechnology
- fault injection in memory via laser
- smart cards
- transportations
- medical tools
- embeeded malwares
Cryptology
- influence of the environnment on PRNG entropy
- mathematic aspects in current cryptology
Defensive Security
- Trust Based Computing
- New Access Control Models for processes isolation
- New H/W + S/W for increasing the cost of exploitation
Remark
- We highly encourage original topics that break with traditional research directions
- We will favor presentations with tools demonstrations or results
Presentation Format
MEDIUM TALK(= ~30min)
- Summary 4 pages long (at least)
SHORT TALK (= ~15min)
- Summary 2 pages long (at least)
Summary
- Bibliography does not count in the 2/4 pages.
- Format: IEEE double column 11pt (IEEE template (word + latex formats))
- Max: 10 annexes pages
- young_researchers-advices for writing a paper
Student Grants
A limited number of grants will be provided. Priority will be given to students who will present a paper. Students willing to participate can also be selected.
Those
- speakers: transportation, hosting (train if living more than 20Km far away from Grenoble + in France or Switzerland. Plane help will be considered for speakers from Europe.)
- participants: citizen of a low income country, or person having made significative contribution for the community
apply for a grant: send a mail to grehack-program_committee _A_T_ car-online.fr and precise your motivations. Include a link to your website, publications list and tools
See GreHack-2012 speakers fees details
Your submission must include following information
All submissions will be peer-reviewed. Single blinded review process
Authors of accepted papers must guarantee that their paper will be presented at GreHack 2012.
- Speakers name or alias
- Biography
- Presentation Title
- Description
- Needs: Internet? Others?
- Company (name) or Independent?
- Address
- Phone
- Demo (Y/N)
- Will you release a 0-day? (Y/N)
- Will you release a tool? (Y/N)
- Summary (according to above rules: 2 or 4 pages IEEE template (word + latex formats))
Featured Conference Content
Note: if possible, we advise speakers to have their slides in english and to speak in french if they are sufficiently fluent in it, otherwise english + english. First formula has the advantage of permitting both audiences to follow.
Keynote
Pic | Speaker name | Corp/Lab/Gov/Self | Talk |
![]() |
Eric Freyssinet |
Invited Talks
Pic | Speaker | Corp/Lab/Gov/Self | Talk title |
![]() |
Kostya Kortchinsky | Microsoft, previously Immunity | |
| |||
![]() |
Philippe Elbaz-Vincent |
| |
| |||
![]() |
Regis Leveugle |
| |
| |||
![]() |
Dave Penkler | HP Enterprise Services CTO Office |
|
![]() |
Boris Balacheff | HPLabs Cloud & Security Lab |
Program Committee
Submissions will be reviewed by:
- Dan Alloun (Intel)
- Florent Autreau (Mataru)
- Claude Castelluccia (INRIA)
- Fabien Duchene (LIG)
- Philippe Elbaz-Vincent (UJF)
- Karim Hossen (LIG)
- Pascal Lafourcade (VERIMAG)
- Regis Leveugle (TIMA)
- Arnaud Maillet (Evidian R&D, Ensimag student)
- Pascal Malterre (CEA)
- Marie-Laure Potet (VERIMAG)
- Sanjay Rawat (LIG)
- Guillaume Touron (Ensimag student)
- S. Bekrar (LIG)
Publication
Informal proceeedings of papers and talks will be available on the event webapge.
Diverse
- Location
- Accomodation
- Internet access
- Capture The Flag
- Questions / contact: grehack-program_committee ~AT~ car-online.fr