N

HITCON 2024

Call for proposals

[CMT] August 23-24 2024 Onsite in
Humanities and Social Sciences Building, Academia Sinica
[ENT] October 30 2024 Onsite in Songshan Cultural and Creative Park

About HITCON CMT 2024 & HITCON ENT 2024

Hacks in Taiwan Conference (HITCON), a technology-orientated cybersecurity conference annually held in Taiwan, is dedicated to bringing the latest and the most in-depth technologies and practices to the security community.

Over the years, we have invited worldwide speakers and congregations to participate in these grand events. Also, we provide this avenue for the community to exchange technical research, bleeding-edge hacking technology, and a relatively wide range of corporate security issues.

This year, HITCON will be divided into community and enterprise conferences. In the community conference (CMT), we will focus more on the essence of technology, hacking techniques and hacker mindset, and connect with domestic and foreign cybersecurity communities to cultivate the hacker community culture. In the enterprise conference (ENT), we will focus more on the practicalities of technology, defense techniques and security management, and connect with domestic and foreign cybersecurity communities to cultivate cyber security.

1. HITCON 2024 theme

20 Years of HITCON: Mind Meld Hacker Spirit from Human to AI

HITCON celebrates its 20th anniversary, marking two decades of evolution from an underground gathering to a prominent hacker conference. Over the years, it has burgeoned into a thriving hub for the cybersecurity community, fostering rich and vibrant communities around the world. The journey has witnessed the emergence of new technologies such as mobile, cloud computing, and cyber warfare. Despite these advancements, the core essence of the hacker spirit, commitment to research, innovation, discovery, hacking everything, and securing the cyberspace, remains unaltered, serving as the guiding force behind our discussions and explorations.

In recent years, the emergence of artificial intelligence (AI) has brought about a paradigm shift in cybersecurity. As we integrate AI into our daily hacking missions, we are faced with the challenge of aligning its capabilities with our values and objectives. Aligning AI with the hacker spirit becomes paramount, ensuring that our endeavors remain rooted in ethical and principled hacking practices. This Mind Melding of AI with the hacker spirit represents a new frontier in cybersecurity.

2. The Call for Papers

We welcome submissions on any information security-related topics. This year's submissions are divided into three categories: HITCON CMT presentation sessions, HITCON ENT presentation sessions and HITCON CMT Hacking 101(tutorial sessions), and you can decide which direction your submission is best suited for. However, the review committee may adjust the session type based on the content of your submission. We suggest a presentation session length of 40 minutes, including Q&A, while a tutorial session is 80 minutes, including Q&A.

Additionally, since HITCON receives a large number of high-quality submissions every year, if your submission has too little information, such as a short or non-specific description, or if you do not include presentation slides or supporting materials, it may be difficult for the review committee to compare your submission with others, which may result in missing out on a great opportunity. Therefore, we suggest that you provide detailed and specific submission information in the submission system to facilitate the review process.

Reviewing Rules

Since this year's HITCON conference is expected to be held in-person, live presentations are the preferred option for both domestic and foreign speakers. If you have any concerns or difficulties, please feel free to let us know.

The review process for this year's conference will begin during the submission period and will be conducted on a first-come, first-served basis. This means that your submission may be accepted before the submission deadline if the majority of the submissions are of high quality. Chance of ending the Call for Papers early if the quality of submissions is extraordinary. We remind those who are interested in submitting session proposals to complete their submissions as soon as possible.

Scope and Topics

  • Test-of-Time Security Technology
  • Artificial Intelligence (AI) Hacking: Data Science for Security, Machine Learning (ML) & AI for Security, Hacking ML & AI, ML&AI Reasoning and Interpretation, Adversarial Machine Learning
  • Exploit & Vulnerability: Red Team, Exploit Development, Exploiting Memory-safe Language, Fuzzer, Wormable Vulnerability, Web AppSec
  • Security in the Cyberwar: Security issues related to Cyberwar
  • Malware: Malware Analysis, Malware Development, Ransomware, APT/Cybercrime, Reverse Engineering
  • Blue Team: Digital Forensics, Incident Response, Security Operation Process and Automation, Detection Engineering, SOAR, Detection as Code
  • Cloud Security: IAM in the cloud infra, Penetration & Vulnerability Discovery in Cloud Environment
  • Privacy and Data Protection: Encryption, Key Management, Post Quantum Cryptography, Side Channel Attack
  • Blockchain Security: Web3, Cryptocurrency, DeFi
  • IoT Hacking & Security: IoT security, IoT Protection, IoT Hacking & Exploit, IIoT security, Hardware Reversing Engineering, Radio Hacking, Cyber Physical Security (CPS)
  • Communication Hacking: Telecommunications Hacking, Communications Satellite, 5G/6G Security & Radio Hacking
  • Talent Education and Security Community: CTF, Cyber Range, Experience of Security Community, Legal and Social Aspect of Information Security
  • Enterprise Security: Cyber Security Framework, Cyber Defense Verifications, Breach Attack Simulation, Patch Management, Cloud Security, Infrastructure Governance, PSIRT
  • Cyber Security Maturity Measurement: Security Risk Measurement, Defense Performance Analysis, PSIRT Maturity, CSIRT/SOC Maturity
  • Supply Chain Security: Supply Chain Risk Management, DevOpsSec, SLSA, SBOM
  • Vulnerability Management: Vulnerable Disclosure Procedure, Vulnerability Discovery, Vulnerability Prioritization
  • Security Compliance: Automatic and Continuous Compliance

Submission Option

  • Future Star
    • Due to the increasing professionalism of the papers submitted to the HITCON conference and the growing number of submissions received, this year we have set up the "Future Star" program to encourage students to submit their work and provide them with a platform to present their research.
  • Bounty House
    • Bounty House is a mysterious program that lasts for about 20-40 minutes. The speaker's name is not disclosed, and recording is strictly prohibited on-site. This program allows the speaker to talk about the exciting process of discovering vulnerabilities and discuss interesting incidents in the cybersecurity field.

3. Delivery Preference

  • Please create an account and submit the proposal through CFP Website (https://cfp2024.hitcon.org/) before the deadline
  • Speakers should come onsite and present the research,
  • All correspondence and queries should be sent to [email protected] with the headline "HITCON CMT 2024"

4. Important Dates

Call for Papers Opened: April 22, 2024

Call for Papers Closed: June 9, 2024 (Any Time Zone)

Notification to Submitters: June 23, 2024

Event Dates:

  • HITCON CMT August 23 - August 24, 2024
  • HITCON ENT October 30, 2024

5. Speaker Benefits

HITCON CMT 2024

  • For speakers in Taiwan, HITCON will provide a speaker fee of $400 USD and invite to attend the VIP party and City Tour. During the conference, daily lunch, snacks, and drinks will be provided, as well as exquisite souvenirs as a memento.
  • For overseas speakers, HITCON will provide a speaker fee of USD 400 and a transportation subsidy of USD 200, and invite to attend the VIP Party and City Tour. Lunch, snacks, and beverages will be provided daily during the conference, as well as exquisite souvenirs as a memento.

HITCON ENT 2024

  • For speakers in Taiwan, HITCON will provide a speaker fee of $400 USD and an invitation to attend the VIP party. Accommodation for two nights (29 Oct and 30 Oct), daily lunch, snacks, and drinks will be provided during the conference, along with exquisite souvenirs as mementos.
  • For overseas speakers, HITCON will provide a speaker fee of $600 USD and an invitation to attend the VIP party. Accommodation for two nights (29 Oct and 30 Oct), daily lunch, snacks, and drinks will be provided during the conference, along with exquisite souvenirs as mementos.

Bugs or wheels? Feedback and support here.

More on contact [email protected]

If you have any privacy or security concern when contacting the HITCON Committee,you can communicate with us through the use of following PGP public key:
Key ID: C60BC4E7 Fingerprint = B3D9 D201 7ABB BD1B 6235 1133 6521 FDFD C60B C4E7 The public key is available at:PublicKey Download