Msg-ing all [CypherPunks] disruption operators: CFP - WOOT '17
The USENIX Workshop on Offensive Technologies (WOOT) aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners in all areas of computer security. Offensive security has changed from a hobby to an industry. No longer an exercise for isolated enthusiasts, offensive security is today a large-scale operation managed by organized, capitalized actors. Meanwhile, the landscape has shifted: software used by millions is built by startups less than a year old, delivered on mobile phones and surveilled by national signals intelligence agencies. In the field's infancy, offensive security research was conducted separately by industry, independent hackers, or in academia. Collaboration between these groups could be difficult. Since 2007, the USENIX Workshop on Offensive Technologies (WOOT) has aimed to bring those communities together. WOOT '17 will feature a Best Paper Award and a Best Student Paper Award. Topics Computer security exposes the differences between the actual mechanisms of everyday trusted technologies and their models used by developers, architects, academic researchers, owners, operators, and end users. While being inherently focused on practice, security also poses questions such as "what kind of computations trusted systems are and aren't capable of?," which harken back to fundamentals of computability. State-of-the-art offense explores these questions pragmatically, gathering material for generalizations that lead to better models and more trustworthy systems. WOOT provides a forum for high-quality, peer-reviewed work discussing tools and techniques for attack. Submissions should reflect the state of the art in offensive computer security technology, exposing poorly understood mechanisms, presenting novel attacks, or surveying the state of offensive operations at scale. WOOT '17 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer reviewed and shepherded as appropriate. Submission topics include but are not limited to: https://www.usenix.org/conference/woot17/call-for-papers
On Fri, May 19, 2017 at 09:36:26AM -0700, Razer wrote:
WOOT '17 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer reviewed and shepherded as appropriate.
Submission topics include but are not limited to: https://www.usenix.org/conference/woot17/call-for-papers
Not joking. This is opportunity to troll another set of people. Something like "Security, privacy and society are fucked up beyond repair" by Academic Cypherpunks Incorporated. There are about 10 days left before submission.
On 05/20/2017 04:38 AM, Georgi Guninski wrote:
On Fri, May 19, 2017 at 09:36:26AM -0700, Razer wrote:
WOOT '17 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer reviewed and shepherded as appropriate.
Submission topics include but are not limited to: https://www.usenix.org/conference/woot17/call-for-papers Not joking. This is opportunity to troll another set of people. Something like "Security, privacy and society are fucked up beyond repair" by Academic Cypherpunks Incorporated.
There are about 10 days left before submission.
I'm still trying to figure out exactly what "shepherded as appropriate" implies. Rr
On 05/20/2017 10:43 AM, Razer wrote:
On 05/20/2017 04:38 AM, Georgi Guninski wrote:
On Fri, May 19, 2017 at 09:36:26AM -0700, Razer wrote:
WOOT '17 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer reviewed and shepherded as appropriate.
Submission topics include but are not limited to: https://www.usenix.org/conference/woot17/call-for-papers Not joking. This is opportunity to troll another set of people. Something like "Security, privacy and society are fucked up beyond repair" by Academic Cypherpunks Incorporated.
There are about 10 days left before submission.
I'm still trying to figure out exactly what "shepherded as appropriate" implies.
I can't come up with an interpretation other than "shall be managed to assure that our pre-determined agenda and message is not disrupted." The end product shall be naughty enough to attract attention but no Sacred Cows shall be molested during its production, and nobody's grant money jeopardized by the content of presentations, publications or press notices. "Disruptive" has long been Corporate duckspeak promoting "hot new products and business opportunities." The most disruptive trend I have seen in network security over the past year or so is the high visibility of security contracting businesses whose major products include propaganda: If you want to attribute an insider threat problem to an external actor, hire Norse, Crowdstrike or a similar firm and tell them what you "think" they are going to find. Their reports, suitable for quoting in press releases, will meet or exceed your expectations. Security Fiction in service to propaganda objectives is the Big Thing just now. Even Bruce Schneier has jumped on this bandwagon: "Obama decided not to make the accusation public before the election so as not to be seen as influencing the election." This refers to a propaganda campaign kicked off on October 7, 2016, by the DHS press release attributing the DNC mail leak to Russian Hacking. Want to introduce disruptive new security concepts and products? "If you can think of anything better to do with your time than sit listening to this recorded message, please replace the handset and go make something happen." - Little Boots, intro track, Working Girl. :o)
participants (3)
-
Georgi Guninski
-
Razer
-
Steve Kinney