Call For Papers is OPEN
RSTCON aims to reset the cybersecurity conference experience and target critical infrastructure such as transportation, energy, and manufacturing, as well as the sensors, systems, and architectures they rely on. RSTCON is an open forum to share, demonstrate, and discuss novel findings. Whether you’re deep in academic theory or on the front lines keeping critical systems running, this conference is your arena for bold ideas, real-world solutions, and the spirited conversations that spark progress. RSTCON connects cutting-edge researchers and practitioners with critical infrastructure ahead of potential conflicts that promise to disrupt businesses and lives.
Reset Group solicits papers and presentations on novel research, exploitation, analytical methods, and tooling as well as impeccable learning opportunities. We encourage those with deep specialty knowledge of systems, protocols, and hardware in critical infrastructure to share so we can move forward in lockstep.
Research Competition
On suggestion by our colleagues (names to follow) RSTCON will be hosting a research competition. Details TBD.
Important Dates
- CFP Announced: Feb 11th, 2025
- CFP Closes: Sept 1st, 2025
- Notifications: Sept 15th, 2025
- Presentations: Oct 24-26th, 2025
Late submissions will be considered on a case-by-case basis; coordinate with cfp@rstcon.org.
Scope and Topics
RSTCON focuses on critical infrastructure and its enabling systems. RSTCON is not limited to OT/ICS devices and Embedded Systems. The security of critical infrastructure often relies upon adjacent IT systems. Talks may directly or indirectly relate to the security of critical infrastructure and focus technologies. Examples of our focus technologies (non-exhaustive):
Topic | Examples |
---|---|
System Security | OS, web/mgmt Interfaces, mobile systems, distributed systems |
Hardware Security | architectures, side-channels, cyber-physical systems, embedded systems |
Network Security | intrusion/anomaly detection/prevention, infrastructure, DoS, ICS protocols (Modbus, CAN, DNP3, etc.) |
Wireless Security | DSP, WiFi, Bluetooth, cellular, GPS |
Security Analysis | network/protocol analysis, detecting novel attacks/techniques, automated analysis (hardware, binary, source code), fuzzing, forensics and enabling diagnostics |
Cryptography | cryptanalysis of existing protocols, implementation analysis, new protocols with relevant applications |
Submission Guidelines
Anyone with a unique and relevant presentation idea should submit! Presentations are welcome from hackers, engineers, leaders, and industry experts alike.
General Requirements
RSTCON is all about substance. We request your assistance in helping us ensure that we can focus on the substance of your submission over the form. All submissions will be emailed to cfp@rstcon.org.
All emails will have an attached TXT or PDF document presenting the following information in order:
- Presentation Title
- Presenter Names
- Presentation Topics (1-5 topics your presentation addresses)
- Affected Technologies (optional)
- Abstract (200 words or fewer)
- Presenter Biographies (100 words or fewer per presenter)
- Detailed Description (describe your research and how you will present it)
- Desired Time Slot (20 or 50 minute presentation)
- Why does this presentation belong at RSTCON?
- Where else has this content been presented?
Code and demonstration artifacts are not required for submission but are encouraged.
If your submission includes attacks on live systems that you or your organization do not own, please include a clearly defined section or appendix discussing alternative approaches considered and why they were discarded. Simply stating that other people did it previously is insufficient.
Papers
Papers submitted should be no more than 15 pages excluding references and additional artifacts. Please attach your completed paper to the email. You do not need to complete the Detailed Description section of the submission document, rather, cite the attached paper.
Presentations
Spend sufficient time on the Detailed Description. Assertions are insufficient. You must demonstrate knowledge of concepts invoked in your presentation. Tell us how you plan to present; a complete outline of everything you plan to cover and how you plan to cover it. Available presentation slots:
- 50-minute presentation
- Standard format: present your works
- 20-minute presentation
- Standard format: present your works; or
- Discussion format: spend 10 minutes presenting a position and 10 minutes on discussion/debate
Depending on the quantity and quality of presentations we receive, we may request that your presentation be delivered as a “fire talk.” Often referred to as a “lightning talk,” RSTCON has co-opted the late and beloved ShmooCon’s terminology. Fire talks will be 5-7 minutes and will be in standard format.
Review Process
Upon receipt of your submission, the review team will:
- Confirm that it is on topic and meets our submission requirements
- Assign reviewers based on the presentation topics you indicated
- Review your submission and may reach out for questions and concerns
- Notify the submitter of acceptance or rejection
Publication Details
Reset Group believes in freely sharing knowledge to advance any scientific field. Papers and presentations accepted to and delivered at RSTCON will, with the consent of the authors, be provided to the public for free through the RSTCON website.
Contact Information
Reset Group staff and other reviewing volunteers will receive all communications through cfp@rstcon.org. Questions you have may be addressed to the same, and someone on the review committee will respond.