Confernce will focus on topics related to Internet of Things (IoT), Modern reverse engineering, Vulnerability research and exploitation, Penetration testing and security assessment, Malware analysis and new trends in malicious codes, Forensics, IT crime & law enforcement, Privacy issues: LOPPSI, HADOPI, Low-level hacking (console security & mobile devices), Risk management and ISO 27001, BYOD, Social Engineering, but don't hesitate to submit your research paper if your topic of research is not in the list.
They have opened registration for speakers and trainers to share their experience. The time limit for the speaker is 45min + 10min of Q&A, you can fill and send it to cfp@hackinparis.com. All submissions will be reviewed by the program committee. Authors will be notified of acceptance of their talk.
For registration details please visit the website (https://hackinparis.com/). The last date for submitting the application is March 6th, 2017.
Here is the whole schedule of the program:
* November 16th - CFP/CFT announced
* March 6th - Submission deadline
* March 13th - Booking opening
* March 26th - Talks & Trainings program announcement
* June 19th to 23rd - Hack In Paris
* June 24th to 25th - Nuit Du Hack
The 6th edition of Hack In Paris was held in France, at la Maison De la Chimie, Paris, and was attended by more than 400 attendees around the world.
Hack In Paris attendees aims to discover the realities of hacking, and its consequences for companies. The program includes state of the art IT security, industrial espionage, penetration testing, physical security, forensics, malware analysis techniques and countermeasures.
Mobile Chipset
Qualcomm and HackerOne Partner on Bounty Program
by Tom Spring November 18, 2016 , 12:45 pm
Qualcomm kicked off its first bug bounty program Thursday, opening the
door for white hat hackers to find flaws in a dozen Snapdragon mobile
chipsets and related software. Rewards for the invite-only bug bounty
program top $15,000 each.
HackerOne will facilitate Qualcomm’s bounty program; the chipmaker is
hoping to secure millions of smartphones running Snapdragon silicon,
including phones sold by Samsung, LG, HTC and Google.
Related Posts
Army Bug Bounty Building New Relationships with Hackers
November 14, 2016 , 12:03 pm
Google Releases Supplemental Patch for Dirty Cow Vulnerability
November 8, 2016 , 1:38 pm
GitLab Patches Command Execution Vulnerability
November 3, 2016 , 2:50 pm
Eligible Snapdragon products include eight mobile processors, four LTE
modems and additional related silicon technologies and software. The bug
bounty program will be administered through the Qualcomm Technologies
business unit in conjunction with HackerOne. The program, Qualcomm
claims, is the first of its kind for a major silicon vendor.
“With Qualcomm Technologies’ vulnerability rewards program they will
continue to build vital relationships with the external security
researcher community and supplement the great work their internal
security team is doing,” said Alex Rice, chief technology officer for
HackerOne in a prepared statement.
Qualcomm joins a number of high-profile and recently launched bug-bounty
programs. Earlier this month the Department of Defense awarded a
contract to HackerOne to bolster the cyber security of the U.S. Army’s
digital assets. That complemented another investment by the U.S.
government with Synack, which was picked to create a bug-bounty platform
for the IRS. HackerOne also had a high profile Hack the Pentagon bug
bounty program which ran from April 18 to May 12 earlier this year.
Qualcomm and HackerOne said that 40 security researchers have been
invited to participate. The bounty program includes a list of chipset
models eligible for submissions, along with software components that
include Linux kernel code (part of “Android for MSM”) and WLAN and
Bluetooth firmware.
At the top range of the bounty program are $15,000 rewards for critical
bugs tied to Snapdragon cellular modems. Rewards of $9,000 are tied to
‘critical’ Trusted Execution Environment, or TEE, and bootloader
vulnerabilities. Security vulnerabilities rated ‘high’ payout between
$5,000 and $4,000. Vulnerabilities considered ‘medium’ and ‘low range’
offer rewards of $2,000 to $1,000.
Not eligible, are issues tied to OEM modifications, some denial of
service issues and bugs tied to PC software such as USB drivers,
according to HackerOne. Qualcomm said the rewards program is effective
starting November 17.
Qualcomm’s bug bounty program comes on the heels of this summer’s
revelation of four massive vulnerabilities, dubbed Quadrooter, which
impacted over 900 million smartphones running Qualcomm chipsets.
Security research firm Check Point discovered the vulnerabilities and
said they could allow an attacker to elevate privileges on top Android
handsets and give an attacker complete control over targeted devices. In
October, Google released the last in a series of patches addressing the
vulnerabilities.
See more at: Qualcomm and HackerOne Partner on Bounty Program https://wp.me/p3AjUX-vKy
See more at: Qualcomm and HackerOne Partner on Bounty Program https://wp.me/p3AjUX-vKy
Mobile Chipset
Qualcomm and HackerOne Partner on Bounty Program
by Tom Spring November 18, 2016 , 12:45 pm
Qualcomm kicked off its first bug bounty program Thursday, opening the
door for white hat hackers to find flaws in a dozen Snapdragon mobile
chipsets and related software. Rewards for the invite-only bug bounty
program top $15,000 each.
HackerOne will facilitate Qualcomm’s bounty program; the chipmaker is
hoping to secure millions of smartphones running Snapdragon silicon,
including phones sold by Samsung, LG, HTC and Google.
Related Posts
Army Bug Bounty Building New Relationships with Hackers
November 14, 2016 , 12:03 pm
Google Releases Supplemental Patch for Dirty Cow Vulnerability
November 8, 2016 , 1:38 pm
GitLab Patches Command Execution Vulnerability
November 3, 2016 , 2:50 pm
Eligible Snapdragon products include eight mobile processors, four LTE
modems and additional related silicon technologies and software. The bug
bounty program will be administered through the Qualcomm Technologies
business unit in conjunction with HackerOne. The program, Qualcomm
claims, is the first of its kind for a major silicon vendor.
“With Qualcomm Technologies’ vulnerability rewards program they will
continue to build vital relationships with the external security
researcher community and supplement the great work their internal
security team is doing,” said Alex Rice, chief technology officer for
HackerOne in a prepared statement.
Qualcomm joins a number of high-profile and recently launched bug-bounty
programs. Earlier this month the Department of Defense awarded a
contract to HackerOne to bolster the cyber security of the U.S. Army’s
digital assets. That complemented another investment by the U.S.
government with Synack, which was picked to create a bug-bounty platform
for the IRS. HackerOne also had a high profile Hack the Pentagon bug
bounty program which ran from April 18 to May 12 earlier this year.
Qualcomm and HackerOne said that 40 security researchers have been
invited to participate. The bounty program includes a list of chipset
models eligible for submissions, along with software components that
include Linux kernel code (part of “Android for MSM”) and WLAN and
Bluetooth firmware.
At the top range of the bounty program are $15,000 rewards for critical
bugs tied to Snapdragon cellular modems. Rewards of $9,000 are tied to
‘critical’ Trusted Execution Environment, or TEE, and bootloader
vulnerabilities. Security vulnerabilities rated ‘high’ payout between
$5,000 and $4,000. Vulnerabilities considered ‘medium’ and ‘low range’
offer rewards of $2,000 to $1,000.
Not eligible, are issues tied to OEM modifications, some denial of
service issues and bugs tied to PC software such as USB drivers,
according to HackerOne. Qualcomm said the rewards program is effective
starting November 17.
Qualcomm’s bug bounty program comes on the heels of this summer’s
revelation of four massive vulnerabilities, dubbed Quadrooter, which
impacted over 900 million smartphones running Qualcomm chipsets.
Security research firm Check Point discovered the vulnerabilities and
said they could allow an attacker to elevate privileges on top Android
handsets and give an attacker complete control over targeted devices. In
October, Google released the last in a series of patches addressing the
vulnerabilities.
See more at: Qualcomm and HackerOne Partner on Bounty Program https://wp.me/p3AjUX-vKy
See more at: Qualcomm and HackerOne Partner on Bounty Program https://wp.me/p3AjUX-vKy
No comments:
Post a Comment