VB2021 call for papers - now open, to all!

Posted by    on   Jan 19, 2021

2020 proved to be an extraordinary – in the true sense of the word – year for everyone, and 2021 has already thrown some curveballs in the short few weeks since it began. Nevertheless, we are cautiously optimistic about the year ahead and, whilst keeping a careful eye on the global health and travel situation, planning and arrangements for VB2021 are going ahead: for an in-person event, in Prague, Czech Republic, from 6 to 8 October 2021.

VB2021-withdate-325.jpg

We are now inviting submissions from those wishing to present papers at VB2021.

Of course, we are aware that the situation over the coming months is uncertain, and for that reason we are making plans to accommodate presentations at VB2021 that are given remotely as well as those that can be given in person – so don't hesitate to submit, regardless of whether or not you know at this stage whether you'll be able to travel to Prague!

We welcome submissions on all aspects of digital security, from the very technical to the more general, whether you are an experienced speaker or a first-time presenter.

The VB Conference has a broad focus, but has always concentrated on analysing and preventing real-world attacks: from malware analyses to APT campaign investigations; from tools that help with research to new detection methods; from attacks against the BIOS to research into global infection rates. We also very much welcome 'out-of-the-box' submissions.

We are particularly interested in hearing from speakers who can share their experience from the real world, who are employed by businesses, governments or NGOs and tasked with securing systems and fending off attacks.

The deadline for submissions is 21 March 2021.

You can find more details about the call for papers here, or go directly to the Extranet where you can submit a paper.

Should you have any queries about the call for papers, if you have an idea that doesn't fit the standard format, or just want to talk over your proposal prior to submitting, please don't hesitate to email us at conference@virusbulletin.com.

We look forward to hearing from you!

 

 

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

VB2021 localhost call for papers: a great opportunity

VB2021 localhost presents an exciting opportunity to share your research with an even wider cross section of the IT security community around the world than usual, without having to take time out of your work schedule (or budget) to travel.

New article: Excel Formula/Macro in .xlsb?

In a follow-up to an article published last week, Kurt Natvig takes us through the analysis of a new malicious sample using the .xlsb file format.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.