Registration »

Call for Papers

CFP Terms »


Black Hat DC 2010 //call for papers

Hyatt Regency Crystal City • Jan 31 - Feb 3

The Black Hat DC 2010 Briefings CFP
will close on December 1, 2009.

Official terms list for Black Hat DC 2010

Submit proposals by completing the submissions form on the CFP server at We strongly suggest that you submit earlier than later since we will close the CFP early if we receive enough quality submissions to fill the slots.

In 2008 Black Hat introduced CrowdSourcing to the Black Hat CFP process. Paid delegates can log into our CFP database, read and review proposed presentations and share their ratings and comments with Black Hat. Your ratings help us create the show you want to attend, and even helps to focus presentations as they're being created. We've always said that our delegates make Black Hat the experience it is, and we're glad to have the opportunity to extend their influence on the final product. The official FAQ for this new feature is located here: CFP FAQ.


The Black Hat Briefings was created to fill the need for computer security professionals to better understand the security risks to information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals and having them speak candidly about the problems businesses and Governments face as well as potential solutions to those problems. No gimmicks - just straight talk by people who make it their business to know the information security space.


Black Hat does not accept product or vendor related pitches. If your talk is a thinly-veiled advertisement for a new product or service your company is offering, please do not apply.

  1. All presentations must be submitted by the original authors.

  2. We currently only accept submissions by original authors of the presentations. PR firms, Speaking relation firms, and all other parties who are not direct authors of submitted presentations ARE NOT ALLOWED to submit materials on behalf of speakers or presenters. We require direct contact with presenters to expedite questions from the reviewers and to fulfill Speaker Obligations as detailed on the Call for Papers Terms and Conditions.

    You MAY NOT submit presentations if you are a third party that wishes to submit materials on behalf of a potential speaker. Only original authors of presentations may submit for the Call for Papers.

  3. Decide which conference you would be able to present at.

  4. Speakers who are chosen to speak at one are not automatically chosen to speak at another. Selecting the event that you are speaking at will determine if you will meet the deadlines for the event. You are currently on the Black Hat DC 2010 CFP page.

  5. Decide what key subjects/topics your presentation will cover and select the appropriate track.

  6. This is intended to help us place your talk in the appropriate subject and topic category. Because of the unique nature of this conference, the combining of some of the best hackers with security professionals, there will be an emphasis on where the rubber meets the road. What works, what doesn't, and what to do about it. Even if your research/presentation does not match a suggested topic you should still submit. Talks are sometimes clustered around topics.

    Black Hat DC 2010 suggested (but not limited to) topics are*:

    • Audit and Attack
    • Application Security
    • Bots 'n Stuff
    • Forensics & anti-Forensics
    • Hardware reversing and subversion
    • The Infrastructure
    • OTA Mobility and Wireless
  7. Understand the different time constraints.

  8. Generally, talks will be 75 minutes. It is expected the speaker will budget time for audience participation and Q&A within this time frame.

  9. Submit a presentation.

  10. Please submit all prospective proposals by completing the submissions form on the CFP server at

    Speakers may submit more than one proposal but each proposal must be submitted via separate submissions. Create an account at, verify your email address, and away you go.

    You MAY NOT submit presentations if you are a third party that wishes to submit materials on behalf of a potential speaker. Only original authors of presentations may submit for the Call for Papers.

    Submissions are due no later than December 1, 2009.

  11. Submit supporting material.

  12. Please submit any additional materials after completing the online submission form. Additional materials may include but not be limited to items such as white papers, code, demos, proof of concept, references, resume, etc that may enable us to help decide whether your topic would be appropriate. Materials should also be sent along to: cfp at

If you experience problems with, send email to cfp [at] and we will work to resolve the problem.


Talks will be reviewed through a voting process. Submissions get rated on a one to seven scale by each of the reviewers in four areas, and the resulting scores are added up. Those submissions in each category with the highest scores are considered first. In the case of topic overlap a lesser scoring submission may be selected to keep variety in the program. As the complexity and specialization of submissions grow more reviewers are added to the process.

People submitting a talk proposal will get email notification that Black Hat has received the proposal generally within 48-72 hours of receipt of the submission. Once selection has been completed you will receive in email a confirmation of acceptance or rejection.

Speakers will be contacted if there are any questions about their presentations. If your talk is accepted, you can continue to modify and evolve it up until the materials due date, at which time it is frozen for the printed materials and CD ROM.

All presentations must be vendor neutral (no sales pitches for services or products are permitted). Presentations which demonstrate proprietary tool(s) must provide a copy of the tool(s) for distribution on the Black Hat CD and web site. All sources of information, software, etc should be properly cited.

Things that get our attention:

  • Talks that are more technical or reveal new vulnerabilities are of more interest than a review of material covered many times before. We are striving to create a high-end technical conference and any talk that helps reach this goal will be given extra attention.
  • Original content or research that has been created specifically for Black Hat and has not been seen before always gets extra priority as well as demonstrations involving new material, or a new way of presenting information to the attendees.
  • Submissions with detailed bibliographies acknowledging prior work in the space, distinguishing or highlighting how your presentation is different. I believe this is important to help move the security community to a more professional and respected position, as well as make all of our work easier to reference for those seeking to understand prior art.

Note: By speaking at the Black Hat Briefings you are granting Black Hat permission to reproduce, distribute, advertise and show your presentation including but not limited to, printed and/or electronic ads, fliers, mailers, etc.


To meet the goals outlined above, Black Hat expects several things from selected speakers.

If you are going to announce or demonstrate a new tool as the primary focus of your talk, that tool must be made available for the conference CD ROM. We don't want a room full of people all excited about what you have demonstrated only to learn the tool is $12,000 and not available to the general public.

Your completed materials for the printed conference proceedings and CD ROM MUST be submitted by the date specified on the CFP Letter of Acceptance or you will be dropped as a speaker and an alternative will be put in your place.

Black Hat expects speakers to be available during the lunches and reception in order to meet and mingle with the attendees. Attendees want to meet the presenters and ask questions, so if you cannot do so, for example because of a business commitment, please let us know when you submit your materials.

Assume that the attendees already understand the basic concepts regarding your topic. For example, if you are talking about cryptography, assume that everyone knows the difference between public key vs. secret key algorithms. Black Hat strives to be known as a more technical security conference, and as such, expect more high-level details from their speakers. If you must err in one direction or the other, err on the side of more technical.

In your presentation please include a reference to all of the tool(s), law(s), web site(s) or publication(s) you refer to. This bibliography will greatly help attendees who wish to learn more about your subject, but are not sure where to start.

The content you provide for the conference CD ROM should include a copy of all the RFCs, White Papers, and/or tools referenced in your presentation. Attendees really like this, and we do too.

If you are performing a demonstration we expect you to provide all the necessary equipment. We will only provide an internet connection, power, and AV equipment as detailed in the Presentation Resources section.

If your presentation discusses a problem, also present suggested solutions. If no solutions exist please explain why they are not possible or practical and what you think the impact will be. If you present a solution to a new problem also explain what the weaknesses to the solution are, as well as their impact on the problem.


Each presenter is responsible for bringing their own laptop, with US Power Supply/converter and VGA-ready output to run their presentation from. No loaner machines will be available.

We can accommodate most requests if it enhances your presentation and they are made at least four weeks before the show. Current tools we can make available to speakers include LCD projectors, microphones, video switch boxes, white boards and network access.

Black Hat currently provides a single LCD projector, 1 screen and a wired microphone. If necessary a second projector or a video A/B switch can be arranged.

There will be internet connectivity should you need network access to demonstrate any aspect of your presentation.

Please forward any additional resource questions to cfp [at]


There are several categories of speakers based on the type of presentation delivered.

Category 1 Speaker:

If you have never presented at Black Hat before, and you are selected to present, Black Hat will pay for one presenter's coach class roundtrip airfare and one hotel room for three nights at the official Black Hat venue hotel and a speaking honorarium of $500 USD.

Category 2 Speaker:

If you have spoken before at Black Hat you will receive one presenter's roundtrip coach class airfare, one hotel room for three nights at the official Black Hat venue hotel, and a speaking honorarium of $1,000 USD.

If you have been specifically invited to speak, you fall into the second category.

Category 3 Speaker:

If you are selected for the "Turbo Talks" track you will only receive entrance to the Briefings. As a "Turbo Talks" presenter, you WILL NOT receive a speaking honorarium or compensation for hotel or travel. Please note that Turbo Talk track will NOT be offered at DC 2010.

Category 4 Speaker:

If you work for a company that is also an official Black Hat sponsor, we are unable to offer any compensation for travel, accommodations or honorarium. If you wish to speak as an individual and not represent your company in any way you can become a Category 2 speaker. Just make sure it is OK with your company before doing this!

Speakers who are asked to participate in a panel but who also present on a topic will not be paid an additional honorarium.

Speakers who are asked to present on separate topics at the same conference will earn an honorarium for each presentation. Only the original airfare and hotel room will be covered (no additional rooms, room nights or travel expenses will be provided or reimbursed).

Full conference passes are given to those who actively participate as speakers on accepted presentations. These passes are non-transferable. Co-workers, PR persons, etc who wish to attend the session or conference must register and pay the appropriate conference fees.

Once you have been accepted, you will be contacted by us to make hotel and travel arrangements. Please make sure that you include a valid email address and telephone number where you can be reached.

Remuneration will be contingent upon the submission and completion of the following items:

  • Submission of the white paper AND presentation. The presentation may be submitted by January 31 however the white paper must be received by the materials deadline of January 8. The white paper is required. It is NOT optional.
  • Submission of a completed and signed W8 or W9 and Speaker Agreement. Unsigned tax forms are not acceptable. If we don't get these we can't pay you.
  • Submission of the appropriate receipts for travel and hotel within 30 days (if applicable).


The Black Hat DC 2010 Briefings & Training Conference will take place January 31 to February 3 at the Hyatt Regency Crystal City. The Briefings that you would be speaking at take place on the last two days, February 2 and 3. Please see the Black Hat DC 2010 Briefings pages for more information on hotel, venue, schedules, etc (coming soon).


Please visit for previous conference archives, information, and speeches. Updated announcements will be posted to newsgroups, security mailing lists, and the Black Hat web site when available.

Thank you for your time!

Jeff Moss, Director