Call for Papers

Great to have you here!

As a community, we encourage knowledge sharing and collaboration, which is why we have an always-open Call for Papers.

We encourage all application security practitioners or security researchers to contribute to the DefCamp blog and show their work to the world.

Be the next DefCamp Superstar

First, submit a preview of your paper not exceeding 500 words on our online CFP for review. Documents may include videos and pictures, as well as a more extensive version of the research in a different download-able format. White paper and/or slides are a plus.

SUBMIT YOUR PRESENTATION

Technical presentations are very appreciated

We encourage you to apply with your findings and research! Check out the topics of interest below and if you still have second thoughts on the subject, drop us a line

Cybersecurity has become vital for businesses

we’ve included this category of articles to offer the DefCamp audience information on trends and statistics from the market as well as good practices, guides and methodologies. 

Topics of Interest

/ Web Application Security – from language to frameworks and exploits.

/ Hardware – application bypass, hardware hacking basics, and defeating “secure” hardware.

/ Physical Security – badging applications, lock picking, physical access control, physical lock forensics and long range key duplication involving software.

/ Forensics – application, physical memory forensics, solid state disk forensics and network forensics.

/ Critical Infrastructure Security – SCADA, routing, satellite, Cloud and GSM.

/ Android/iPhone/Windows Mobile research

/ Reverse Engineering Malware and Malware Analysis

/ Rootkit Detection, Techniques, and Defenses

/ Exploitation Tactics

/ Cloud Security / Assessing Cloud Security

/ Legal Issues around EULA and related topics

/ Industry Panels

/ Critical Infrastructure Security

/ Applications of Cryptographic Techniques

/ Next Generation Exploit and Exploit Mitigation Techniques

/ NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security

/ Articles on specific topics related to:

  • Security trends and patterns the researcher noticed and supports through strong arguments
  • New and relevant infosec statistics and infographics
  • Best practices and methodologies in cybersecurity and how they’re evolving to adapt to the new environment we operate in.

Here’s what happened last time.