Black Hat is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat
Asia 2020

Please note that all call for submissions information presented on this page pertains to Black Hat Asia 2020.

Important Dates

Call for Papers Opens: September 9, 2019
Call for Papers Closes: October 28, 2019
*Notification to Authors: Week of January 20, 2020
*Subject to change.


Submit proposals by completing a submission form on the Call for Papers (CFP) server at All applicants must read and agree to the Call for Papers Submission Requirements prior to making a submission. All submissions must be received on or before October 28, 2019 at 11:59 PM Pacific Time.

What are the Black Hat Briefings?

The Black Hat Briefings were created 21 years ago to provide computer security professionals a place to learn the very latest in information security risks, research, and trends. Presented by the brightest in the industry, the Briefings cover everything from critical information infrastructure to widely used enterprise computer systems to the latest InfoSec research and development and everything in between. The Briefings are vendor-neutral, allowing the presenters to speak candidly about real problems and potential solutions across both the public and private sectors.

Session Formats

  • Briefings: 25 and 50-minute presentations

Track Descriptions

A complete list of Black Hat Asia 2020 tracks follows.

Click or press a track title for more information.

Applied Security


The Applied Security track is comprised of topics and techniques that should be immediately actionable to attendee environments upon returning from Black Hat. Topics should still be cutting edge, but shouldn't require a PhD and a custom lab environment to plan and deploy. Focus on areas of security and technology that are new, or trending up within the industry, and how someone new to that subject matter might introduce that technology or practice into their organization.



The Community track aims to provide a forum for idea sharing and discussion on relevant issues impacting the InfoSec community. Topics may include but are not limited to careers, legal issues, diversity, inclusion, attribution, substance abuse, mental health, burn out, security awareness, and work-life balance. Talks in this track should provide insights and solutions to help individuals new to InfoSec as well as those with years of experience and the talks do not need to be technical in nature. Community track talks should help affect change for the InfoSec community and session formats for this track are more open and flexible – panels, fireside chats, etc.



The Cryptography track aims to do for cryptography what Black Hat's Exploit Development track does for software security: to be the industry's premiere venue for practical, real-world advances in cryptography informed by an attacker's sensibility. A Black Hat Cryptography Track talk will almost always be backed up with running code. We prize offensive cryptography and cryptanalysis, but will host defensive and research cryptography when rooted in a context of real-world attacks. We're an especially good place to send new vulnerabilities in cryptographic protocols like TLS, cryptographic hardware like HSMs and smart cards, and cryptographic primitives like SHA-1.

Data Forensics and Incident Response


The DFIR track will be comprised of topics and techniques used to assist defenders in responding to varied security incidents. These topics may include, but aren't limited to, identification of compromised systems, digital evidence collection, network, host and malware analysis, threat intelligence, and threat hunting. Focus should be on techniques and procedures that can help defenders understand how an attack unfolded, if and when a breach occurred, and how it can be prevented in the future.



Enterprise track submissions should be attractive to security practitioners and leaders operating corporate security at a large scale; thousands of hosts, users, and applications. Topic areas include securely managing the platforms and environments found in enterprises such as large data centers, Active Directory, and SANs as well as enterprise scale processes such as patching, security orchestration and bug bounty programs.

Exploit Development


Exploit Development submissions are welcome across a wide array of technologies and targets from servers to mobile devices. We are particularly interested in innovative and novel approaches that cover new exploit delivery mechanisms, code execution techniques, focus on new targets, or defeat existing exploit mitigations such as ACG or CFG. Submissions shouldn't be constrained to memory safety issues but these often resonate well with our audience.

Hardware / Embedded


The Hardware / Embedded track is centered around attacks on hardware, firmware, and embedded devices. We're also interested in the security (and insecurity) of things like exotic hardware, autonomous vehicles, IoT, robotics, medical devices, voting machines, and other unique hardware-centric targets. Purpose-built, modded, or otherwise hacked hardware that solves (or creates) new security problems is pretty cool, too.

Human Factors


The Human Factors track focuses on people in security: how their decisions can affect the security of the organization, and how engineering and technology can help. This includes the way people make decisions and how to influence those decisions as an attacker or defender. It also includes how to reduce their decision load and the organizational (and potentially economic) factors that surround those decisions. This track welcomes submissions that detail techniques on the social influencing of people to act against their interest as well as innovative ways to strengthen technology and other solutions to decrease harm. This track is not about career development, BOFH stories, simple ploys like buying a UPS outfit, or sploits to make the browser draw a fake UI.

Internet of Things


This track examines offensive and defensive research into the devices, frameworks and applications of the "Internet of things." Sensors, actuators, wireless smart devices all fall into this area including any type of vulnerability or defensive mechanism, hardware and/or software. Submissions that focus on the specific peculiarities of IoT (communication, integration, smart devices) are of interest. If your target is an IoT device but the hack or defensive mechanism is related mostly to a cryptographic operation or to the underlying operating system, you may wish to select one of those tracks as primary and/or secondary. If you are discussing an IoT device of primarily industrial use, please consider the Smart Grid and Industrial Security track.



The Malware track focuses on both the defensive and offensive aspects of malware development. The defensive malware talks are centered around current malware; analysis, detection, remediation, and technical discussions on decent or broken functionality within anti-malware tools. The offensive malware talks are centered around; malware development, novel execution techniques, and obfuscation. We are most interested in talks that detail prevailing malicious attacks or new techniques on both the offensive and defensive side of malware development without a product pitch.



The mobile track encompasses everything related to mobile devices (largely phones). The main aim for talks in this track should be to cover a feature, technique, concept or research result that first and foremost applies to mobile devices. Submissions where mobile devices/OSes are only one of the many use cases or affected targets are generally not suitable for this track.

Network Defense


Talks in this track should tackle network defense issues related to protecting users or assets. Traditionally, this includes the vast array of NIDS, HIDS, IPS, SEIM, Firewalls, VPNs, etc., as well as the hardware components, like routers, switches, Wi-Fi and so on. Cloud computing networks and more exotic networks, like CAN Bus, ad-hoc networking and so on are included. We are looking specifically for novel means of deployment, detection, correlation, or protection of attacks that is both unique and ideally practical for use in protecting networks. Attendees of Network Defense track talks should walk away with ideas on how to defend themselves and a better understanding of the threat landscape with ideas on areas to research.

Platform Security


This track focuses on security issues affecting the full system platform stack (firmware, hypervisor, and operating system) of computing platforms powering everything from embedded systems, to modern desktops, to the cloud. The track focuses on topics such as: software attacks against modern Windows, macOS/iOS, and Linux; hypervisor and firmware vulnerabilities in Xen, Hyper-V, or UEFI; security-coprocessor issues in the Intel Management Engine, Apple Secure Enclave, or ARM TrustZone; microarchitectural attacks such as Meltdown/Spectre and hardware-enabled attacks such as Rowhammer. This track also encourages presentations on novel defenses that feasibly mitigate presently known or unknown instances of these classes of attacks -- especially if these defenses can scale and/or have scaled to effectively protect various ranges of platforms ranging from mobile phones to cloud-scale infrastructure with acceptable power, performance, and compatibility impact.



Well-intentioned policy decisions at every level can have profound impacts on the effectiveness of security practices and technologies. This track covers technical, organizational, political or economic policies, as well as technical standards, laws affecting security (intentionally or not) and defined norms of behavior. We are interested in submissions that address security issues that can't be addressed at the level of the individual, as well as policies that affect individuals in unforeseen ways. This track welcomes submissions with data about security impacts of policy on attackers and defenders (e.g. SDLC), real-world security impacts resulting from unintended consequences of policy choices, novel and innovative best practices in areas of broad security concern but with insufficient research or documentation, new, effective, metrics for tracking and assessing the practical effectiveness of security programs, countermeasures, and testing, and proposed policies that mitigate new and emergent security threats and those requiring urgent or unusual inter-organizational coordination. The Policy track is not for general complaints about nation-state adversaries, the state of security, or retrospective reviews of problems without proposed solutions.

Reverse Engineering


"Reverse engineering is the process of extracting the knowledge or design blueprints from anything man-made and reproducing it or reproducing anything based on the extracted information." — Eldad Eilam

Talks in the Reverse Engineering Track may include subjects such as vulnerability discovery, data visualization, advanced exploitation techniques, bypassing security and software protections, and reverse engineering of hardware, software, and protocols.

Security Development Lifecycle


The Security Development Lifecycle track, or SDL track, focuses on practical presentations that help developers build more secure software and hardware in both waterfall and agile development models. Talks are welcomed in any of the seven phases of SDL; Training, Requirements, Secure Design, Implementation, Verification, Release, or Response. We are most interested in talks which identify new techniques or tools in the field of secure development practices and presentations which leverage objective data or case studies to provide actionable recommendations attendees can apply to improve their product security.

Smart Grid and Industrial Security


The Smart Grid and Industrial Security track focuses on the security of SCADA, industrial automation, power transport and generation. The track also covers related subject areas like solar, microgrids, EV charging, as well as oil, water, and gas distribution. We are most interested in submissions that approach the already known problem spaces in SCADA and industrial in new and unique ways, or talks that point out unusual and unexpected attack vectors that haven't been explored.

Web AppSec


Talks in this track should specifically tackle web-based issues that work over ports 80/443 and the like. This usually implies issues in web-servers (Apache, Nginx, IIS, etc.), browsers (Internet Explorer/Edge, Chrome, Safari, Firefox, etc.) and web technologies (AJAX, Flash, HTML5, SSL/TLS, etc.). This track can also include issues related to how web based programming languages (Java, C#, PHP, Python, Ruby, etc.) process/handle web transactions (SQL Injection, Command Injection, Cross Site Scripting, pivoting, exfiltration, etc.) and additionally how browsers can be tricked into performing otherwise nefarious activities. Attendees of Web AppSec track talks should walk away with one or more new attack ideas or increased knowledge of the existing web attack surface area/landscape or equivalently useful knowledge.

Back to top


Sample Submissions

Click here to see samples of accepted submissions that received positive reviews.

Submission Requirements

  1. Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
  2. Black Hat does not accept product or vendor-related pitches. Black Hat will disqualify any product or vendor pitch.
  3. Black Hat will disqualify incomplete submissions; complete your submission in its entirety.
  4. Your submission should clearly detail the concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
  5. Submissions that highlight new research, tools, vulnerabilities, etc. will be given priority.
  6. Submissions that include White Papers will also be given priority.
  7. Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.
  8. Each submission must include detailed biographies of the proposed speaking team.
  9. Submitters will be contacted directly if Review Board members have any questions about a submission.
  10. If you have any questions regarding your submission, please email them to

Coordinated/Responsible Disclosure

Black Hat strongly supports and encourages coordinated/responsible disclosure. To this end, Black Hat has a strong partnership with the Electronic Frontier Foundation (EFF) to provide pro-bono legal consultations to security researchers on the legality of any research or data they plan to present at the event.

If you have questions about the legal implications of your security research or presentation, contact Electronic Frontier Foundation at

Review Board & Content Selection

The Black Hat Asia Regional Review Board is comprised of 21 of the industry's most credible and distinguished security professionals and thought leaders throughout various areas of the information security community. The Review Board advises Black Hat on reviewing and programming conference content and providing unparalleled insight into the research community.

Black Hat strives to deliver one of the most empirical content selection processes in the industry. All submissions are vetted thoroughly by the Black Hat Review Board. Each submission is reviewed for uniqueness, overall content expertise, and accuracy before any selections are made. Through the course of this dynamic review process, Black Hat Review Board members will frequently ask researchers for clarity on any areas of question in their submission(s) – whether it be about the uniqueness or audacity of claims made. The best submissions come with academic-grade papers, proof-of-concept code, and/or video demonstrations of the work done. Of note, Black Hat does not support pay-for-play Briefings. The Black Hat Briefings are, and always have been, independently selected based on quality of content and area of expertise rather than sponsorship.

Back to top

Speaker Benefits

Briefings Speaker
(25 minute)
  • Open to all Speakers
  • Employer logo only on two slides: Introduction and Biography
  • Speaking Honorarium:
    • Speaking honorarium of $500 USD for one speaker
    • One Briefings pass per Speaker(s)
    • Two passes for students; nominated by Speaker
Briefings Speaker
(50 minute)
  • Open to Speakers who have never presented at Black Hat
  • Employer logo only on two slides: Introduction and Biography
  • Speaking Honorarium:
    • Speaking honorarium of $500 USD for one Speaker
    • Coach-class round-trip airfare for one Speaker, cap of $1,500 USD
    • One hotel room for three nights for one Speaker
    • One Briefings pass per Speaker(s)
    • Two passes for students; nominated by Speaker
Veteran Briefings Speaker
(50 minute)
  • Open to previous Black Hat Speakers (Trainer or Briefings Speaker) or specifically invited to speak by Black Hat
  • Employer logo only on two slides: Introduction and Biography
  • Speaking Honorarium:
    • Speaking honorarium of $1,000 USD for one Speaker
    • Coach-class round-trip airfare for one Speaker, cap of $1,500 USD
    • One hotel room for three nights for one Speaker
    • One Briefings pass per Speaker(s)
    • Two passes for students; nominated by Speaker

Terms and Conditions

By submitting a proposal via the Black Hat Call for Papers system, submitters selected to speak understand and agree to the Terms as detailed in this section.

  1. By speaking at a Black Hat conference, Speakers grant Black Hat permission to record, reproduce, distribute, advertise, and show a Speaker's presentation including but not limited to, conference proceedings and materials, audio, video, printed and/or electronic ads, fliers, mailers, etc.
  2. Researchers and research teams should be aware of the following guidelines regarding the number of researchers permitted to present on stage for each type of Briefing session. Speaking team members must be included in the CFP submission prior to the close of the CFP.
    • 25-minute Briefing – 1 speaker per team
    • 50-minute Briefing – 2 speakers per team
  3. Full conference passes (Briefings passes) are given only to those who actively participate as Speakers on accepted presentations.
    • Conference passes are non-transferable.
    • Co-workers, PR representatives, etc. must register and pay the appropriate fees.
  4. The Black Hat Review Board will have access to all submissions and materials.
    • Review Board access to submissions is provisioned under NDA with Black Hat and UBM Tech.
    • Reviews, Acceptances and/or Declines are conducted on a rolling basis.
    • All correspondence and queries should be sent to
    • Prospective Speakers should not directly contact any Black Hat Review Board member regarding the status of submission(s) or feedback.
  5. Black Hat will provide one projector, one screen, one wired Ethernet connection and one wired microphone (if applicable) for the on-site presentation. Speakers are responsible for providing all other necessary equipment, including laptops and machines for their presentation.
  6. If the presentation is deemed to be a work of plagiarism or a blatant vendor pitch, Black Hat may revoke the Speaker's honorarium and the Speaker will not be considered for future speaking opportunities.
  7. Black Hat believes the InfoSec community should be truly open for everyone. As such, Black Hat is committed to providing a friendly, safe and welcoming environment for all, regardless of gender, sexual orientation, disability, ethnicity, or religion. Speakers are required to follow the Black Hat Code of Conduct
  8. Black Hat reserves the right to change scheduled speaking times as necessary. While every effort will be made to honor assigned times, Speakers may be called upon to present at any time during the conference.
  9. Black Hat reserves the right to rescind an accepted submission without reason.

Additional Event Information

Please visit for previous conference archives, information, and talks. Updated announcements about Black Hat Asia 2020 will be posted to newsgroups, security mailing lists, and the Black Hat website when available.

We reserve the right to change or modify our Terms, dates and/or content of this page at any time without prior notice.

Thank you for your time!
The Black Hat Team

Back to top




Sign up to receive information about upcoming Black Hat events including Briefings, Trainings, speakers, and important event updates.


Sustaining Partners