Recon 2014 Call For Papers - June 27 - 29, 2014 - Montreal, Quebec





CHRISTMAS ISLANDS PATENT APPLICATION                            20142329
RECON 2014                                           February 17th, 2014


                               BACKGROUND
[FIELD OF INVENTION]

 - REcon 2014 is a computer security conference for reverse engineers,
   hackers, and enthusiasts.

 - This patent lays claim to all security conferences and gatherings of
   hackers where 50% or more of the attendance consists of reverse
   engineers.

[DESCRIPTION OF RELATED ART]

 - Presently there are many awesome security conferences, but REcon is
   the only one we know of that is dedicated to reverse engineering.
   Reversing is our jam.

 - Numerous other security conferences exist that are worthy of props.
   Our conference refines the art with a strong focus on the topic of
   reverse engineering and features highly technical talks.


   +                    +                     +         +
                                  +                  +           +
           +                                             +
                                        \ /
                       +     _        - _+_ -                   ,__
         _=.    .:.         /=\       _|===|_                  ||::|
        |  |    _|.        |   |     | |   | |     __===_  -=- ||::|
        |==|   |  |  __    |.:.|   /\| |:. | |    |   | .|| : |||::|
        |  |-  |.:|_|. :__ |.: |--|==| |  .| |_   | ' |. ||.  |||:.|
      __|. | |_|. | |.|...||---|  |==| |   | | |_--.     ||   |||. |
     |  |  |   |. | | |::.||: .|  |==| | . : |=|===|    :|| . ||| .|
     |:.| .|   |  | | |:.:|| . |  |==| |     |=|===| .   |'   | |  |
     |     |      |   |   |'           :   .   |   ;     ;    '    |
     '     :      `   :   '            .       '  .      .         :
     '     .                                             .
     `                .                .                           '
                           .

                                                                [FIG. 1]

                                SUMMARY
REcon is a computer security conference with a focus on reverse
engineering and advanced exploitation techniques.  It is held annually
in Montreal, Canada.

The conference offers a single track of presentations over the span
of three days along with technical training sessions held before
the presentation dates.  Technical training varies in length between
two and four days.

REcon 2014 is almost here and we have another great line up of trainings
and shenanigans.  This year we feel the need to patent our unique brand
of awesome before someone else tries to take it away from us.


                         DETAILED DESCRIPTION
REcon is an event defined by our attendees, speakers, and trainers.

The attendees have always been, and will always be, those looking to
learn something new, share ideas, and unwind in a welcoming environment.

The trainers are the best in their fields.  This year we are bringing
together a great set of trainings.

 - Reversing telecom platforms for security: applied hacking on legacy
   monolithic MSC and HLR to modular ATCA's reversing by Philipe
   Langlois (2 days: 25-26 June)
 - Introduction to USB Emulation with the Facedancer by Travis
   Goodspeed and Sergey Bratus (2 days: 25-26 June)
 - The Exploit Laboratory: Red Team by Saumil Shah (2 days: 23-24 June)
 - The Exploit Laboratory: Master by Saumil Shah (2 days: 25-26 June)
 - Reverse Engineering Malware by Nicolas Brulez (4 days: 23-26 June)
 - iOS 7 Kernel Exploitation Training by Stefan Esser (4 days: 23-26 
   June)
 - Keep It Synple Stupid - Utilizing Programmable Logic for Hardware
   Reverse-Engineering by Dmitry Nedospasov and Thorsten Schroeder
   (4 days: 23-26 June)
 - Windows Internals for Reverse Engineers by Alex Ionescu (4 days:
   23-26 June)


The speakers define the conference and we invite you to submit for this
year's REcon CFP. The conference features a single track of talks. Some
guidelines for talks are:
 - 30 to 60 minute presentations, or longer, we are flexible
 - We are open to proposals for workshops that would occur alongside
   talks
 - Trainings of 2, 3 or 4 days focused on reversing and/or exploitation
 - There will be time for five to ten minute informal lightning talks
   during the REcon party

The conference talks in the following fields are encouraged:
 - Hardware reverse engineering
 - Software reverse engineering
 - Protocol reverse engineering
 - Finding vulnerabilities and writing exploits
 - Novel data visualization for hackers and reverse engineers
 - Bypassing security and software protections
 - Attacks on cryptography in hardware and software
 - Techniques for any of the above on new or interesting architectures
 - Wireless hacking (We aren't talking about wifi here)
                       ++ Anything else elite ++

The more description you provide, the more you are able to claim as your
invention.

       +---------------------------------------------------------+
       |                                                         |
       |             +----------+                                |
       |             + Research |<-----------------+             |
       |             +----------+                  |             |
       |                  +                        |             |
       |                  |                        |             |
       |                  v                        |             |
       |           +---------------+               |             |
       |     +----+| Submit to CFP |               |             |
       |     |     +---------------+               |             |
       |     |                                     |             |
       |     |                                     |             |
       |     v                                     |             |
       |  +------+     +------------+      +--------+---------+  |
       |  | Meet |+--->| Share Ideas |---->| Create New Ideas |  |
       |  +------+     +----+-------+      +--------+---------+  |
       |     ^            |                        |             |
       |     |            |                        |             |
       |     |            |                        |             |
       |     +------------+<-----------------------+             |
       +---------------------------------------------------------+
                                    |
                                   ???
                                    |
                                    v
                          +--------------------+
                          |  Change the world  |
                          +--------------------+
                                                                [FIG. 2]


[SUBMITTING]
Please send your submission to cfp2014 at recon.cx in plain text format.
You may send additional supporting documentation in other formats.

Please include:
 - Speaker name(s) and/or handle
 - Contact information, e-mail, and cell phone (optional)
 - Presentation title
 - Length of presentation
 - Description of the presentation
 - Brief biography
 - If available, presentation supporting materials (website, code,
   paper, slides, outline, ...)
 - And why it is cool, or why you want to present it
 - Let us know if you need help with a Canadian visa (So we can start
   the procedure early)
 - Whether your employer will pay for your travel or you need assistance
   from us

Get back to us soon:
 - First round of CFP to end March 31
 - First speakers/talks to be announced week of April 7
 - CFP closes April 30, 2014, Recon 2014 speakers/talks announced May 5

                               OUR CLAIMS
 - To be accessible in some capacity to everyone who wants to be a part
   of it
 - To try to have the best party of any security conference
 - To keep the event small and encourage people to meet and talk
 - Provide the best reverse engineering training by the top minds in the
   the field
 - To continue to mock stupid things including, and not limited to,
   patents
 - This patent is unique and original. This is due entirely to no one
   being douchie enough to try and patent their conference. Yet.


                               ADDENDUM
REcon is an annual computer security conference located in Montreal,
Canada. We are claiming this patent as a mockery of the patent system,
which we feel is absurd, and in part because we are out of witty CFP
ideas. Besides, patents reveal enough to take the fun of reversing away.


You can also email your response with PGP to hfortier recon cx:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
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=RH/N
-----END PGP PUBLIC KEY BLOCK-----