What: DEFCON THIRTEEN CFP
When: The Call for Papers will close on June 1, 2005
How: complete the Call for Papers form and send to talks at defcon dot org
Papers and presentations are now being accepted for DEFCON THIRTEEN, the conference your mother warned you about. DEFCON will take place in Las Vegas, NV, USA July 29-31, 2005
Now is the time to prepare and submit your DEFCON presentation.
What we look for
Last year, we eliminated ‘tracks’, and were pleased to receive a diverse selection of submissions: from hacking your car, your brain, and CIA sculptures to hacking the vote, Bluetooth, and DNS hacks.
What are we looking for then, if we don't have tracks? We are looking for the presentation that you've never seen before and have always wanted to see. We are looking for the presentation that the con-goer wouldn't ask for, but blows their minds when they attend it.
We are looking for and always give preference to: unique research, new tool releases, 'Ø day' attacks, highly technical material, social commentaries, and groundbreaking material of any kind.
Subject matters that we have traditionally covered in the past and will continue to accept papers on include: trojans, worms, malware, intelligent agents, protocol exploits, application security, web security, database hacking, privacy issues, criminal law, civil law, international law/treaties, prosecution perspectives, 802.11X, bluetooth, cellular telephony protocols, privacy, identity theft, identity creation, fraud, social implications of technology, media/film presentations, firmware hacking, hardware hacking, embedded systems hacking, smartcard technologies, credit card and financial instrument technologies, surveillance, countersurveilance, UFO's, peer2peer technologies, reputation systems, copyright infringement, anti-copyright infringement enforcement and technologies, critical infrastructure issues, physical security, social engineering, academic security research, PDA and cell phone security, EMP/HERF weaponry, TEMPEST technologies, corporate espionage, IDS and IDS evasion. This list is not intended to limit possible topics, merely to give examples of topics that have interested us in the past.
This year we are continuing the Twelve Hundred Second Spotlight: A Twelve Hundred Second Spotlight is a shorter presentation (about twenty minutes) that doesn't warrant a full 50 or 110 minute talk. The Twelve Hundred Second Spotlight is designed for those who don't have enough material for a full talk, but still have a valuable contribution to make. This is to ensure that great ideas that can be presented quickly don't fall through the cracks merely because they didn't justify a full length talk. Examples of a Twelve Hundred Second Spotlight include research, announcements, group presentations, projects needing volunteers or testers, requests for comments, updates on previously given talks, quick demonstrations, et cetera. Presenters will get a speaker badge which entitles them to free admittance to DEFCON, but we will be unable to pay a Honorarium for the Twelve Hundred Second Spotlight.
Remember being attacked by flying meat? Do you remember thick accented Germans trying to convince you to attack critical infrastructure from? Do you remember extravagant vaporware releases by a stage filled with posses? We do, and sans projectiles raw meat; we want to encourage such shenanigans again this year. We are calling on all “hacker groups” (you know who you are, and the FBI has a nifty file with your name on it) to present at DEFCON, to discuss what you're up to, what your mission is, to discuss any upcoming or past projects, and to discuss parties/conferences you are throwing. We do humbly request that all gang warfare be relegated to electronic attacks, and not fall over into meatspace.
To submit a speech, complete the DEFCON 13 Call for Papers form.
We are going to continue last year's goal of increasing the quality of the talks by screening people and topics. I realize you guys are speaking for basically free, but some talks are better than others. Some people put in a bit more effort than others. I want to reward the people who do the work by making sure there is room for them.
After a completed CFP form is received, speakers will be contacted if there are any questions about their presentations. If your talk is accepted you can continue to modify and evolve it up until the last minute, but don't deviate from your accepted presentation.
Talks that are more technical or reveal new vulnerabilities are of more interest than a review of firewall technologies and will be given more consideration, as will original content or research that have been created for DEFCON and has not been seen before.
If you are selected we will mail you with information on deadlines for when we need your presentation, to be burnt on the CDROM, as well as information for the printed program.
This year we will have two rounds of speaker acceptance. This is to encourage people to submit as early as possible. If you see the schedule online start to fill, do not worry if you have not heard from us yet, as we are still in the process of selection.
Barring a disaster of monstrous proportions, speaker selection will be completed no later July 1. The sooner you submit, the better chance you have of the reviewers to give your presentation the full consideration it warrants. If you wait until the last minute to submit, you have less of a chance of being selected.
Go to the DEFCON 13 Call for Papers form