CHRISTMAS ISLANDS PATENT APPLICATION 20142329 RECON 2014 February 17th, 2014 BACKGROUND [FIELD OF INVENTION] - REcon 2014 is a computer security conference for reverse engineers, hackers, and enthusiasts. - This patent lays claim to all security conferences and gatherings of hackers where 50% or more of the attendance consists of reverse engineers. [DESCRIPTION OF RELATED ART] - Presently there are many awesome security conferences, but REcon is the only one we know of that is dedicated to reverse engineering. Reversing is our jam. - Numerous other security conferences exist that are worthy of props. Our conference refines the art with a strong focus on the topic of reverse engineering and features highly technical talks. + + + + + + + + + \ / + _ - _+_ - ,__ _=. .:. /=\ _|===|_ ||::| | | _|. | | | | | | __===_ -=- ||::| |==| | | __ |.:.| /\| |:. | | | | .|| : |||::| | |- |.:|_|. :__ |.: |--|==| | .| |_ | ' |. ||. |||:.| __|. | |_|. | |.|...||---| |==| | | | |_--. || |||. | | | | |. | | |::.||: .| |==| | . : |=|===| :|| . ||| .| |:.| .| | | | |:.:|| . | |==| | |=|===| . |' | | | | | | | |' : . | ; ; ' | ' : ` : ' . ' . . : ' . . ` . . ' . [FIG. 1] SUMMARY REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. The conference offers a single track of presentations over the span of three days along with technical training sessions held before the presentation dates. Technical training varies in length between two and four days. REcon 2014 is almost here and we have another great line up of trainings and shenanigans. This year we feel the need to patent our unique brand of awesome before someone else tries to take it away from us. DETAILED DESCRIPTION REcon is an event defined by our attendees, speakers, and trainers. The attendees have always been, and will always be, those looking to learn something new, share ideas, and unwind in a welcoming environment. The trainers are the best in their fields. This year we are bringing together a great set of trainings. - Reversing telecom platforms for security: applied hacking on legacy monolithic MSC and HLR to modular ATCA's reversing by Philipe Langlois (2 days: 25-26 June) - Introduction to USB Emulation with the Facedancer by Travis Goodspeed and Sergey Bratus (2 days: 25-26 June) - The Exploit Laboratory: Red Team by Saumil Shah (2 days: 23-24 June) - The Exploit Laboratory: Master by Saumil Shah (2 days: 25-26 June) - Reverse Engineering Malware by Nicolas Brulez (4 days: 23-26 June) - iOS 7 Kernel Exploitation Training by Stefan Esser (4 days: 23-26 June) - Keep It Synple Stupid - Utilizing Programmable Logic for Hardware Reverse-Engineering by Dmitry Nedospasov and Thorsten Schroeder (4 days: 23-26 June) - Windows Internals for Reverse Engineers by Alex Ionescu (4 days: 23-26 June) The speakers define the conference and we invite you to submit for this year's REcon CFP. The conference features a single track of talks. Some guidelines for talks are: - 30 to 60 minute presentations, or longer, we are flexible - We are open to proposals for workshops that would occur alongside talks - Trainings of 2, 3 or 4 days focused on reversing and/or exploitation - There will be time for five to ten minute informal lightning talks during the REcon party The conference talks in the following fields are encouraged: - Hardware reverse engineering - Software reverse engineering - Protocol reverse engineering - Finding vulnerabilities and writing exploits - Novel data visualization for hackers and reverse engineers - Bypassing security and software protections - Attacks on cryptography in hardware and software - Techniques for any of the above on new or interesting architectures - Wireless hacking (We aren't talking about wifi here) ++ Anything else elite ++ The more description you provide, the more you are able to claim as your invention. +---------------------------------------------------------+ | | | +----------+ | | + Research |<-----------------+ | | +----------+ | | | + | | | | | | | v | | | +---------------+ | | | +----+| Submit to CFP | | | | | +---------------+ | | | | | | | | | | | v | | | +------+ +------------+ +--------+---------+ | | | Meet |+--->| Share Ideas |---->| Create New Ideas | | | +------+ +----+-------+ +--------+---------+ | | ^ | | | | | | | | | | | | | | +------------+<-----------------------+ | +---------------------------------------------------------+ | ??? | v +--------------------+ | Change the world | +--------------------+ [FIG. 2] [SUBMITTING] Please send your submission to cfp2014 at recon.cx in plain text format. You may send additional supporting documentation in other formats. Please include: - Speaker name(s) and/or handle - Contact information, e-mail, and cell phone (optional) - Presentation title - Length of presentation - Description of the presentation - Brief biography - If available, presentation supporting materials (website, code, paper, slides, outline, ...) - And why it is cool, or why you want to present it - Let us know if you need help with a Canadian visa (So we can start the procedure early) - Whether your employer will pay for your travel or you need assistance from us OUR CLAIMS - To be accessible in some capacity to everyone who wants to be a part of it - To try to have the best party of any security conference - To keep the event small and encourage people to meet and talk - Provide the best reverse engineering training by the top minds in the the field - To continue to mock stupid things including, and not limited to, patents - This patent is unique and original. This is due entirely to no one being douchie enough to try and patent their conference. Yet. ADDENDUM REcon is an annual computer security conference located in Montreal, Canada. We are claiming this patent as a mockery of the patent system, which we feel is absurd, and in part because we are out of witty CFP ideas. Besides, patents reveal enough to take the fun of reversing away. You can also email your response with PGP to hfortier recon cx: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) mQGiBEYBqh8RBADF1NH5vM445mQwvDUs5B/QbqJjweMF3unTrCZLilO0YYb107Y3 9yG/J9sjVMzlHLhFcuhHk0HnG+qvT07G0ltVNesqpOltC874bv9UzKjwLl43CKK4 RO4OqMc5Od2L6CD+6R3yE2teC3sZCJOsdXL14olYr8CenyPWWAxeeyx+swCgzOFf fmTb7UHIQ+vqmunaqndHQGcEAKFyO/F931kNVKJQ0IwNBAF3JcqUDeuvXI8Cv2AC RpoNWJtjtGi7bDYiyP8PTXpOD/ad7q0vGw3JYp70bfXmPKcDMjoCYT063skF630g u9vrnriW9N7U9UTnZWeHKYeUT4i3lIUZgqOmyNNJ/HMAte49y2rJNBK1YQ0EcfD9 9V9aBACyRDFDovDq9elSHr9oqJ/2LkrHDbhVRtlRnx6BnmKeK+IzyO1JutEYcHIA LJL0xrTcJHHk6J1RaXqLMYWg65Yu6eTrqQf/ONrPqD2KziZNIAhbxDj3nBMLK/4A amQEIMNsLL2JGmoLMaIM6TdNCUnJlnJFh9jtKed7puMZI0k9WrQgSHVnbyBGb3J0 aWVyIDxoZm9ydGllckByZWNvbi5jeD6IYAQTEQIAIAUCRgGqHwIbIwYLCQgHAwIE FQIIAwQWAgMBAh4BAheAAAoJECtVaSdG/rS7dAAAn08G2N6SKGdVecVB8Vdl8xHr H6f/AJ9fgtmRXHKV2nsRmwh2tpc/nP3UE7kCDQRGAaofEAgAk2Pm+uXGcsJpxCiM POOTA463WtKmbEB3FqaBD8epKeKi6uHFNlAfmBPIcrRZ5t/SXiVZL9ZSYE1Qjmct 0hnZLf4r21nuJKCkanPA9YHMn4OmAm6SqiEnfcYaMIrn1s4jZREELWdiicHJHrgc HEuV2dM/XYmPV3xnW/h67G0uCc9D9tUDXkVEelJUj6br730Y9KcsYEPoRPpeC88N 9X6lAR/brHVPjwflQbQk8cOXd+Ru/0eld4xGbXhTz6I1lSShIfPLPj2lHwLF4GzA PaaytbbqASOcWuNdeN+Fo9nX9hV4hNlVWAnYGt4kOFiwGlf97yqLe7vdFF2kMHox geI2mwADBgf+LAvj7JqkC/hXGB1IRv1LgZW1XgpxdGWsf+c9LKI0uLhfXgqeD18t U4HM+/ATjLhkkrrJenNO7A4++Yb52DJ/zlTVEUw8puie+IK7aguR3SFolgvRJzD0 QauYdUaZC1C2VnJKRGkzyooZyGj5rmlchgWXjmPrunlhsl+d19OZGwi0Gew3WVu8 PLCVaF/Ql+nywN0NjH88z4urYokn4vUqI9D6pF89VXo2fzndxTiT3181aJvCy/8A btNe74NX8hJgaKiNW1n1giz87u6SNGDmT4h8ROYfs3oU6UWJjkH4a9hTutmRdSMQ pvLG0lRLAUXyYm+ST13/3QbM46c3vpX/iIhJBBgRAgAJBQJGAaofAhsMAAoJECtV aSdG/rS7BJUAnAq7Hd6aP2HmMnzOEhtTCahKRtoLAJ9dS+NexCNS9QkQObTaaPC1 cFZf4g== =RH/N -----END PGP PUBLIC KEY BLOCK-----