Security
Headlines
HeadlinesLatestCVEs

Headline

RECON 2024 Call For Papers

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It will be held June 28th through the 30th, 2024, in Montreal, Canada.

Packet Storm
#vulnerability#ios#mac#windows#wifi
   +                    +                     +         +                                  +                  +           +           +                                             +                                        \ /                       +     _        - _+_ -                   ,__         _=.    .:.         /=\       _|===|_                  ||::|        |  |    _|.        |   |     | |   | |     __===_  -=- ||::|        |==|   |  |  __    |.:.|   /\| |:. | |    |   | .|| : |||::|        |  |-  |.:|_|. :__ |.: |--|==| |  .| |_   | ' |. ||.  |||:.|      __|. | |_|. | |.|...||---|  |==| |   | | |_--.     ||   |||. |     |  |  |   |. | | |::.||: .|  |==| | . : |=|===|    :|| . ||| .|     |:.| .|   |  | | |:.:|| . |  |==| |     |=|===| .   |'   | |  |     |     |      |   |   |'           :   .   |   ;     ;    '    |     '     :      `   :   '            .       '  .      .         :     '     .                                             .               `        .        R E C O N     2 0 2 4      .                '                           .   C F P          '               .                    '         https://recon.cx                                      .            June 28 to 30, 2024                     .                            Montreal, Canada                    .     REcon is a computer security conference with a focus on reverseengineering and advanced exploitation techniques.  It is held annuallyin Montreal, Canada.The conference offers a single track of presentations over the spanof three days along with technical training sessions held beforethe presentation dates.  Technical training varies in length betweentwo and four days.REcon 2024 is almost upon us.  As with years past, it will offer agreat lineup of trainings, talks from some of the top reversers in theworld, and a lot of fun.Attendees help define the event. They have always been, and will alwaysbe, those looking to learn something new, share ideas, and unwind in awelcoming environment. With the release of this CFP, we are happy toannounce registration is now open.We are now inviting speakers to submit proposals for this year's talks.Some guidelines for talks are: - 30 or 60 minute presentations  - We are open to proposals for workshops that would occur alongside talks.    REcon have a dedicated area for workshop and    village, there will be a Software and a hardware village,          the Hardware village will have a electronic lab.                       We are planning to bring soldering equipment, BGA Station,        microscope, Oscilloscope, Spectrum Analyser, Protocol Analyser,        Bench Power supply, reflow oven, 3D Printer, ... Note that the         talks will be broadcasted in the workshops area so you won't miss      anything.         - There will be time for five to ten minute informal lightning talks   during the REcon partyRegistration for training is also now open. This year we have anothergreat set of trainings available: - Automating Reverse Engineering Processes with AI/ML, NLP, and LLMs by Malachi Jones - Modern Windows Malware OPSEC and Anti-Reverse Techniques Implementation and Reversing by Silvio La Porta and Antonio Villani - Mastering Advanced Fuzz Testing Techniques on UNIX by Marc 'vanHauser' Heuse - Software Deobfuscation Techniques by Tim Blazytko - The ARM64 Exploit Laboratory by Saumil Shah - Symbolic Execution with Angr by Jeremy Blackthorne - Windows Internals for Reverse Engineers by Yarden Shafir - Advanced IC Reverse Engineering and Data Extraction by Olivier Thomas - Advanced Malware Reverse Engineering by Nicolas Brulez - Program Analysis for Vulnerability Research by Sophia D'Antoine & Kyle Martin - MacOS Sonoma and iOS 17 Kernel Internals for Security Researchers by Stefan Esser - Practical Baseband Exploitation by Pedro Ribeiro and Seamus Burke - Attacking Instant Messaging Applications by Iddo Eldor and Jacob Bech - RISC-V Security Training by Don A. BaileyThe conference talks in the following fields are encouraged (but not limited to): - Hardware reverse engineering - Software reverse engineering - Protocol reverse engineering - Finding vulnerabilities and writing exploits - Novel data visualization for hackers and reverse engineers - Bypassing security and software protections - Attacks on cryptography in hardware and software - Techniques for any of the above on new or interesting architectures - Wireless hacking (We aren't talking about wifi here) Speakers Benefits:  - Invite to speaker dinner the night before the conference  - Invite to speaker after party  - Full access to the conference - Unless your employer can cover your travel costs, We will reimburse your travel for economic                       Class round trip and hotel for at least 1 speaker / talk ( for more than one speaker,    we'll need to evaluate) - If it's a new talk that has never been presented before, you get 1000 USD - 40% rebate for a Recon Training - 10% rebate for up to 5 of your friends / coworkers                     How to submit: https://cfp.recon.cx/recon2024/cfp Get back to us soon! The first round of the CFP will end on March 29,and the CFP closes on April 26.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution