Great to have you here!
As a community, we encourage knowledge sharing and collaboration, which is why we have an always-open Call for Papers.
We encourage all application security practitioners or security researchers to contribute to the DefCamp blog and show their work to the world.
Technical presentations are very appreciated
We encourage you to apply with your findings and research! Check out the topics of interest below and if you still have second thoughts on the subject, drop us a line.
Cybersecurity has become vital for businesses
we’ve included this category of articles to offer the DefCamp audience information on trends and statistics from the market as well as good practices, guides and methodologies.
Topics of Interest
/ Web Application Security – from language to frameworks and exploits.
/ Hardware – application bypass, hardware hacking basics, and defeating “secure” hardware.
/ Physical Security – badging applications, lock picking, physical access control, physical lock forensics and long range key duplication involving software.
/ Forensics – application, physical memory forensics, solid state disk forensics and network forensics.
/ Critical Infrastructure Security – SCADA, routing, satellite, Cloud and GSM.
/ Android/iPhone/Windows Mobile research
/ Reverse Engineering Malware and Malware Analysis
/ Rootkit Detection, Techniques, and Defenses
/ Exploitation Tactics
/ Cloud Security / Assessing Cloud Security
/ Legal Issues around EULA and related topics
/ Industry Panels
/ Critical Infrastructure Security
/ Applications of Cryptographic Techniques
/ Next Generation Exploit and Exploit Mitigation Techniques
/ NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security
/ Articles on specific topics related to:
- Security trends and patterns the researcher noticed and supports through strong arguments
- New and relevant infosec statistics and infographics
- Best practices and methodologies in cybersecurity and how they’re evolving to adapt to the new environment we operate in.