Hack.lu - Call for Papers

The purpose of the hack.lu convention is to give an open and free playground where people can discuss the implication of new technologies in society. hack.lu is a balanced mix convention where technical and non-technical people can meet each other and share freely all kind of information.

technology
Hack.lu: the call for paper is open

The purpose of the hack.lu convention is to give an open and free playground where people can discuss the implication of new technologies in society. hack.lu is a balanced mix convention where technical and non-technical people can meet each other and share freely all kind of information.

For its 14th edition, Hack.lu will be held in October in the Grand-Duchy of Luxembourg, as the previous editions. You can already save the date: 16-18/10/2018.

The most significant new discoveries about computer network attacks and defenses, open-source security solutions, and pragmatic real world security experience will be highlighted in a 3 days series of informative tutorials.

Experts, researchers and cyber-security professionals are invited to submit papers, lightning talk, and workshops proposals for selection by the hack.lu technical review committee.

Scope

Topics of interest include, but are not limited to:

  • Software Engineering and Security
  • Social Engineering
  • Honeypots/Honeynets
  • Spyware, Phishing and Botnets (Distributed attacks)
  • Newly discovered vulnerabilities in software and hardware
  • Electronic/Digital Privacy
  • Wireless Network and Security
  • Attacks on Information Systems and/or Digital Information Storage
  • Electronic Voting
  • Free Software and Security
  • Assessment of Computer, Electronic Devices and Information Systems
  • Standards for Information Security
  • Legal and Social Aspect of Information Security
  • Software Engineering and Security
  • Security in Information Retrieval
  • Network Security
  • Malware Analysis and Reversing
  • Forensics and Anti-Forensics
  • Offensive (and counter-offensive) Information Technology
  • Mobile Communications Security and Vulnerabilities
  • CSIRTs, Incident Analysis and Response
  • Information Security and Data Mining
  • Threats Exchange and Sharing