CALL FOR PAPERS
ToorCon is one of the oldest and most respected hacker conferences in the US. Since 2019 we decided to constantly reinvent the conference to make it more fun for everyone. By speaking at ToorCon, you’re agreeing to forever be a part of the ToorCon family. In order to ensure that you have an amazing time, we’re (optionally) putting up all of the Speakers in beach houses near the conference and we have a slew of fun activities planned on the last day for you to connect with other elite hackers and industry peers! If you happen to need help with covering airfare to the event or need any guest tickets, please let us know and we’ll do our best to accommodate your needs.
All we ask is that you bring some of your awesome cutting edge research to our event. All talks at ToorCon this year are 50-minutes in length in a single track on one day (Tuesday, October 12th). If you need more time to present your ideas, we encourage you to submit a whitepaper to us to distribute to all of the attendees ahead of time and we'll have a full day (Wednesday, October 13th) of hands on hacking for you to run demos and go in-depth with the audience (2-4 hour workshops / interactive hacking timeslots). Also, because of the intimate nature of our event, we’ll have a Q&A area set aside for you after your talk where you can do hands-on demonstrations and go in-depth with those who are interested, or just let them get you a beer!
NOTE: To make sure everyone stays safe at the event, we're requiring all staff, speakers, and attendees to show proof of COVID-19 vaccination and a negative test result within 24 hours of the event start. We'll also be providing complementary rapid tests at the event to make it easy for everyone to meet our safety requirements. The event space and activities are open air and have good air circulation so masking requirements will be communicated closer to the event based on local guidelines and event space safety requirements at the time.
ToorCon 2021 Focus
- Hardware Hacking
- Reverse Engineering
- Cryptography
- Malware
- Vulnerability Discovery
- Protocols
- Other Cutting Edge Techniques to Pwn the Gibson
Preference will be given to hardware hacking specific topics, hands-on demos, and talks paired with in-depth workshops. We can’t wait to see what you’ve been hacking on!