posted by user: usenixcfp || 4644 views || tracked by 7 users: [display]

WOOT 2011 : 5th USENIX Workshop on Offensive Technologies

FacebookTwitterLinkedInGoogle

Link: http://www.usenix.org/events/woot11/cfp/
 
When Aug 8, 2011 - Aug 9, 2011
Where Washington, DC
Submission Deadline May 8, 2011
Notification Due Jun 6, 2011
Final Version Due Jun 23, 2011
Categories    systems security   networks   USENIX
 

Call For Papers

Overview
Progress in the field of computer security is driven by a symbiotic relationship between our understandings of attack and of defense. The USENIX Workshop on Offensive Technologies (WOOT) aims to bring together researchers and practitioners in systems security to present research advancing the understanding of attacks on operating systems, networks, and applications.
WOOT '11 will be held August 8–9, 2011, in San Francisco, CA. WOOT '11 is co-located with the 20th USENIX Security Symposium (USENIX Security '11), which will take place August 10–12, 2011. WOOT this year will feature a Best Paper Award and a Best Student Paper Award.

Topics
Computer security is unique among systems disciplines in that practical details matter and concrete case studies keep the field grounded in practice. WOOT provides a forum for high-quality, peer-reviewed papers discussing tools and techniques for attack. Submissions should reflect the state of the art in offensive computer security technology, either surveying previously poorly known areas or presenting entirely new attacks.
WOOT accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will inform future work in the field. Submissions will be peer-reviewed and shepherded as appropriate.

Submission topics include but are not limited to:

Vulnerability research (software auditing, reverse engineering)
Penetration testing
Exploit techniques and automation
Network-based attacks (routing, DNS, IDS/IPS/firewall evasion)
Reconnaissance (scanning, software, and hardware fingerprinting)
Malware design and implementation (rootkits, viruses, bots, worms)
Denial-of-service attacks
Web and database security
Weaknesses in deployed systems (VoIP, telephony, wireless, games)
Practical cryptanalysis (hardware, DRM, etc.)

For industry researchers: Did you just give a cool talk at SOURCE Boston? Got something interesting planned for Black Hat or DEFCON? This is exactly the type of work we'd like to see at WOOT. Please submit. It will also give you a chance to have your work reviewed and to receive suggestions and comments from some of the best researchers in the world.

Related Resources

USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
USENIX ATC 2025   The 2025 USENIX Annual Technical Conference
MathSJ 2025   Applied Mathematics and Sciences: An International Journal
OSDI 2025   The 19th USENIX Symposium on Operating Systems Design and Implementation
Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
AIAT 2025   2025 5th International Conference on Artificial Intelligence and Application Technologies (AIAT 2025)
NTIJ 2025   Nanoscience and Technology: An International Journal