CALL FOR PAPERS
IS NOW CLOSED

Welcome to BlueHat IL 2020!

We live in interesting times.
Polarizing, radical ideas spread like wildfire, traversing through the very same medium that carry the muted whispers of dissidents past those many eyes that watch. When the distinction between right and wrong gets blurry, it is the stacks of technology that hold the last line of defense – and it’s our purpose to test their limits. Offense’s the best defense, isn’t it? Want to tell us about it? We’re known for fighting for our freedom as much as we love just straight up groundbreaking security research.
Want to speak up? Rise up? February 5-6, 2020 is your chance. Tel Aviv is waiting.

Important Dates
Call for papers closes
Dec 2, 2019
Notification to authors
By Dec 13, 2019
BlueHat IL
Feb 5-6, 2020

Topics of Interest

Any innovative research in vulnerabilities, exploits, mitigations and defense

How bad are we owned, attacks and war stories

Virtualization, OS, boot, and low level security

Hardware security, CPU bugs, side channels, backdoors, front doors

Advanced web security, identity vulns, authentication

Cloud, networking, or protocol security

Mobile, IoT, or critical infrastructure security

Modern cryptography and attacks

Anything that breaks the internet or the world as we know it

Submission Requirements

01

Submissions may only be entered by researchers / speakers (NO submissions from PR / marketing representatives).

02

BlueHat IL does not accept product or vendor-related pitches.

03

Session length – 30 or 45 min format.

04

No more than 3 speakers permitted to present on stage.

05

Each submission must be completed in its entirety. Incomplete submissions will be disqualified.

06

Your submission should clearly detail the concepts, ideas, findings and solutions you or your speaking team plan to present.

07

Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.

08

Each submission must include detailed biographies of the proposed speaking team.

09

Each submission should acknowledge prior work in the space, distinguishing or highlighting how your presentation is different.

10

Individuals submitting a proposal will receive an email within 48-72 hours of submission confirming their proposal has been received for review.

11

More info on how to submit and speaker travel info can be found in the CFP guidelines PDF.

12

If you have any questions regarding your submission, please write us at bluehati@microsoft.com

Review Board

VIEW

James Forshaw

Security Researcher
Google Project Zero

VIEW

Ophir Harpaz

Security Researcher
Guardicore

VIEW

Hasherezade

Malware Intelligence Analyst
Malwarebytes

VIEW

Bruno Keith

Independent Security Researcher

VIEW

Noam Liran

CTO for Cloud Security Group, Microsoft

VIEW

Amanda Rousseau

Offensive Security Engineer
Red Team, Facebook

VIEW

Tomer Schwartz

Head of MSRC-IL
Microsoft

VIEW

Matt Suiche

Founder @ Comae

VIEW

Tomer Teller

Principal Security PM lead
Windows Cyber Defense, Microsoft

VIEW

David Weston

Partner Director of OS Security, Microsoft

Review Process

01

Submissions that highlight original and innovative research, tools, vulnerabilities, etc. will be given priority.

02

We recommend submitting as early as possible as slots are super limited.

03

Authors will be contacted directly if review board members have any questions about a submission.

04

Once the review process is complete, all authors will receive a confirmation of acceptance or rejection (by Dec 12, 2019).

05

Don’t be bummed if your talk is rejected! We have year-round BlueHat events and may contact you with other options.

06

Regardless of the outcome – we truly appreciate your contribution to BlueHat IL and the security community.