Black Hat Briefings Digital Self Defense
Call for Papers
Papers and presentations are now being accepted for the Black Hat Europe 2004 Briefings. Papers and requests to speak will be received and reviewed from now until March 15, 2004.

Submit by completing the submissions form.

WHAT IS THE BLACK HAT BRIEFINGS?

The Black Hat Briefings fills the need for computer security professionals to better understand the security risks and potential threats to their information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals who present candidly about the problems businesses and individuals face and their solutions to those problems. No gimmicks— just straight talk by people who make it their business to explore the ever-changing security space.

IF YOU WANT TO SUBMIT, PLEASE NOTE:
Black Hat does not accept product or vendor related pitches. If your talk is a thinly-veiled advertisement for a new product or service your company is offering, please do not apply.

If you want to present a "101" level course on a new technology or to introduce the attendees to a new issue, please label your submission as such. For example, a person talking about an overview of anonymous networking technologies would call their talk something like "Anonymous Networking 101: An overview of technologies used to obfuscate your network behavior", etc.


SUBMISSION REQUIREMENTS

#1 Decide which show you would be able to present at.
You must choose to speak at Black Hat Europe 2004. Speakers who are chosen to speak at one are not automatically chosen to speak at another Black Hat. You are currently on the Black Hat Europe 2004 CFP page.
The goal: To assure that presenters will be ready with completed materials.

#2 Decide what key subjects/topics your presentation will cover and select the appropriate track.
This is intended to help us place your talk in the appropriate subject/topic category. Because of the unique nature of this conference, the combining of some of the best hackers with security professionals, there will be an emphasis on where the rubber meets the road. What works, what doesn't, and what to do about it.
The goal: To assure diversity in the topic and presentation selections.

We are looking for presentations on the following topics*:

  • The European perspective on Privacy, Anonymity, and DRM.
  • Infrastructure security issues surrounding SQL, PKI, AD, and other enterprise deployments.
  • Interesting security issues surrounding mobile Symbian, WinCe, Palm, and Java devices.
  • Smart Cards, IKeys, TCA, and the issues of increasing your assurance through trusted hardware.
  • Security issues with patch management and the mobile user.
  • Inside-out attacks, where the threat becomes the internal user who has run malicious code.
  • Techniques and technologies to help defend against Ø-Day attacks.
  • Ø-Day attacks. What is the current cutting edge of attack research and bug finding techniques?

*note: schedule is subject to change. If selected, please be aware that you must be available to speak on either day.

#3 Understand the different time constraints.
Generally, talks will be 75 minutes or 90 minutes. It is expected the speaker will budget time for audience participation and Q&A.
The goal: Create lively and challenging interaction with the audience.

#4 Submit a presentation.
Submit proposals by completing the submissions form.

Speakers may submit more than one proposal but each proposal must be submitted via separate submissions forms. Completed forms should be sent to cfp at blackhat.com

Submissions are due no later than 25 March 2004

#5 Submit supporting material. Submit any additional materials (in Microsoft Word '95, '97 or 2000, Power Point '95, '97 or 2000, Adobe Acrobat .PDF or plain text) after completing the submissions form. Additional materials may include but not be limited to items such as white papers, code, demos, proof of concept, references, resume, etc that may enable us to to help decide whether your topic would be appropriate. Materials should also be sent along to: cfp at blackhat.com

Submissions & supporting materials are due no later than 25 March 2004.

Note: although we will make a reasonable attempt to accommodate speakers' request for equipment/services, we cannot and will not guarantee the availability of such items. In the case that special equipment/services or additional equipment/services is requested, the speaker is expected to bear such costs themselves. Every speaker is expected to make presentations from their own machines.

PLEASE DO NOT WAIT TO SUBMIT

Presentations are selected and evaluated in the order received. If you want to present on a topic, let us know early even if you turn your materials in right at the deadline. This helps us plan and select topics. Don't hold off until the last minute.


SELECTION CRITERIA
Talks will be reviewed through a voting process. Submissions get rated on a one to five scale by each of the reviewers, and the resulting scores are added up. Those submissions in each category with the highest scores are selected. In the case of topic overlap a lesser scoring submission may be selected to keep variety in the program.

People submitting a talk proposal will get email notification that Black Hat has received the proposal generally within 48 hours of receipt of the submission. Once selection has been completed you will receive in email a confirmation of acceptance or rejection.

Speakers will be contacted if there are any questions about their presentations. If your talk is accepted, you can continue to modify and evolve it up until the materials due date, at which time it is frozen for the printed materials and CD ROM.

All presentations must be vendor neutral (no sales pitches for services or products are permitted). Presentations which demonstrate proprietary tool(s) must provide a copy of the tool(s) for distribution on the Black Hat CD and website. All sources of information, software, etc should be properly cited.

Things that get our attention:
Talks that are more technical or reveal new vulnerabilities are of more interest than a review of material covered many times before. We are striving to create a high-end technical conference and any talk that helps reach this goal will be given extra attention.

Original content or research that has been created specifically for Black Hat and has not been seen before always gets extra priority as well as demonstrations involving new material, or a new way of presenting information to the attendees.

Note: By speaking at the Black Hat Briefings you are granting Black Hat, Inc. permission to reproduce, distribute, advertise and show your presentation including but not limited to http://www.blackhat.com, printed and/or electronic ads, flyers, mailers, etc.


SPEAKING REQUIREMENTS
To meet the goals outlined above, Black Hat expects several things from selected speakers.

1) If you are going to announce or demonstrate a new tool as the primary focus of your talk, that tool must be made available for the conference CD ROM. We don't want a room full of people all excited about what you have demonstrated only to learn the tool is $12,000 and not available to the general public.

2) Your completed materials for the printed conference proceedings and CD ROM MUST be submitted by the date specified on the CFP Letter of Acceptance or you will be dropped as a speaker and an alternative will be put in your place.

3) Black Hat expects speakers to be available during the lunches and reception in order to meet and mingle with the attendees. If you cannot do so, for example because of a business commitment, please let us know when you submit your materials.

4) Assume that the attendees already understand the basic concepts regarding your topic. For example, if you are talking about cryptography, assume that everyone knows the difference between public key vs. symmetric algorithms. Black Hat strives to be known as a more technical security conference, and as such, expect more high-level details from their speakers. If you must err in one direction or the other, err on the side of more technical.

5) In your presentation please include a reference to all of the tool(s), law(s), web site(s) or publication(s) you refer to. This bibliography will greatly help attendees who wish to learn more about your subject, but are not sure where to start. This is a new requirement for presentations as of 2003.

6) The content you provide for the conference CD ROM should include a copy of all the RFCs, White Papers, and/or tools referenced in your presentation. Attendees really like this, and we do too.

7) If you are performing a demonstration we expect you to provide all the necessary equipment. We will only provide an internet connection, power, and AV equipment as detailed in the Presentation Resources section.

8) If your presentation discusses a problem, also present suggested solutions. If no solutions exist please explain why they are not possible or practical and what you think the impact will be. If you present a solution to a new problem also explain what the weaknesses to the solution are, as well as their impact on the problem.


PRESENTATION RESOURCES
We can accommodate most requests if it enhances your presentation and they are made at least four weeks in advance of the show. Current tools we can make available to speakers include LCD projectors, slide projectors, microphones, video switch boxes, and wireless network access.

Black Hat currently provides 1 lcd projector, 1 screen, microphone, and video switch box. Microphones are always wired since wireless mics can often be interrupted by cell phones.

There may be wireless Internet connectivity in case you need network access to demonstrate any aspect of your presentation. Please be prepared in case internet access is not available.

Each presenter is responsible for bringing their own laptop to run their presentation from.
No loaner machines will be available.

Please forward any additional resource questions to cfp at blackhat.com


REMUNERATION
If you have never presented at Black Hat before, and you are selected to present, Black Hat will pay for one presenter's coach class roundtrip airfare and one hotel room for three nights at the Grand Hotel Krasnapolsky and a speaking honourarium of $500 USD.

If you have spoken before at Black Hat you will receive one presenter's round trip coach class airfare, one hotel room for three nights at the official Black Hat venue hotel, and a speaking honourarium of $1,000 USD.

  1. If you have been specifically invited to speak you fall into the second category.
  2. If you work for a company that is also an official Black Hat sponsor, we are unable to offer any compensation for travel, accommodations or honourarium.
  3. Speakers who are asked to participate in a panel but who also present on a topic will not be paid an additional honourarium.
  4. Speakers who are asked to present on separate topics at the same conference will earn an honourarium for each presentation. Only the original airfare and hotel room will be covered (no additional rooms, room nights or travel expenses will be provided or reimbursed).

Once you have been accepted, you will be contacted by us to make hotel and travel arrangements. Please make sure that you include a valid email address and telephone number (and fax if possible) where you can be reached.


HOTEL INFORMATION
The Black Hat Europe 2004 Briefings & Training Conference will take place 17-20 May 2004 at the Grand Hotel Krasnapolsky. Please see the Europe 2004 Briefings pages for more information on hotel, venue, schedules, etc.


IMPORTANT DATES
25 March 2004: Call for Papers closes for Black Hat Europe 2004. Submit now.
15 April 2004: Conference / Group discount rates at the hotel closes.
15 April 2004: Early Bird Discount Rate for registration closes
17-18 May 2004: Black Hat Europe 2004 Training at the Grand Hotel Krasnapolsky
19-20 May 2004:
Black Hat Europe 2004 Briefings at the Grand Hotel Krasnapolsky


MORE CONVENTION INFORMATION
Please visit http://www.blackhat.com/ for previous conference archives, information, and speeches. Updated announcements will be posted to news groups, security mailing lists, email, and the Black Hat web site when available.

Thank you for your time!

Jeff Moss, Organizer

Black Hat Logo
(c) 1996-2007 Black Hat