[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Msg-ing all [CypherPunks] disruption operators: CFP - WOOT '17

The USENIX Workshop on Offensive Technologies (WOOT) aims to present a
broad picture of offense and its contributions, bringing together
researchers and practitioners in all areas of computer security.
Offensive security has changed from a hobby to an industry. No longer an
exercise for isolated enthusiasts, offensive security is today a
large-scale operation managed by organized, capitalized actors.
Meanwhile, the landscape has shifted: software used by millions is built
by startups less than a year old, delivered on mobile phones and
surveilled by national signals intelligence agencies.

In the field's infancy, offensive security research was conducted
separately by industry, independent hackers, or in academia.
Collaboration between these groups could be difficult. Since 2007, the
USENIX Workshop on Offensive Technologies (WOOT) has aimed to bring
those communities together.

WOOT '17 will feature a Best Paper Award and a Best Student Paper Award.


Computer security exposes the differences between the actual mechanisms
of everyday trusted technologies and their models used by developers,
architects, academic researchers, owners, operators, and end users.
While being inherently focused on practice, security also poses
questions such as "what kind of computations trusted systems are and
aren't capable of?," which harken back to fundamentals of computability.
State-of-the-art offense explores these questions pragmatically,
gathering material for generalizations that lead to better models and
more trustworthy systems.

WOOT provides a forum for high-quality, peer-reviewed work discussing
tools and techniques for attack. Submissions should reflect the state of
the art in offensive computer security technology, exposing poorly
understood mechanisms, presenting novel attacks, or surveying the state
of offensive operations at scale.

WOOT '17 accepts papers in both an academic security context and more
applied work that informs the field about the state of security practice
in offensive techniques. The goal for these submissions is to produce
published works that will guide future work in the field. Submissions
will be peer reviewed and shepherded as appropriate.

Submission topics include but are not limited to: