| |||||||||||
PPREW 2015 : 5th Program Protection and Reverse Engineering Workshop | |||||||||||
Link: http//www.pprew.org | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
CALL FOR PAPERS
----------------------------------------------------------------- 5th Program Protection and Reverse Engineering Workshop (PPREW-5) Hilton Los Angeles/Universal City Los Angeles, CA December 08, 2015 Website: http://www.pprew.org Co-Located with: Annual Computer Security Applications Conference (ACSAC) 2015 Website: https://www.acsac.org/ ----------------------------------------------------------------- Important Dates: *********************** Paper Submission: September 1, 2015 Author Notification: October 19, 2015 Camera Ready: November 20, 2015 Workshop: December 8, 2015 Workshop Aims: *************** Program protection and reverse engineering techniques both find their practical use in malware research and analysis as well as legitimate protection schemes for intellectual property and commercial software. Program protection techniques vary widely from the use of obfuscation, tamper-proofing, watermarking, virtualization, and an array of methods to frustrate disassembly, debugging, and decompilation. Reverse engineering of low-level constructs such as machine code or gate-level circuit definitions through static and dynamic analysis is geared to recover higher levels of abstract information to determine a program's function as well as to classify it with existing similar code (which is typically malicious). Both program protection and reverse engineering techniques are utilized for legitimate and illegal purposes. Theoretically, protection is seen as impossible in the general case but the promise of mathematically based transformations with rigorous cryptographic properties is an area of active interest. Given enough time and resources, reverse engineering and de-obfuscation is assumed to be achievable. PPREW invites papers on program protection and reverse engineering used in legitimate contexts, with particular focus on studies and experiments that explore the boundary of practical methods and their theoretical limits. The workshop is intended to provide a discussion forum for researchers that are exploring theoretical definitions and frameworks, implementing and using practical methods and empirical studies, and those developing new tools or techniques in this unique area of security. We expect the workshop to provide exchange of ideas and support for cooperative relationships among researchers in industry, academia, and government. Topics of interest include, but are not limited, to the following: - Obfuscation / Deobfuscation (polymorphism) - Tamper-proofing / Hardware-based protection - Theoretic proofs for exploitation or protection - Software watermarking / Digital fingerprinting - Reverse engineering tools and techniques - Side channel analysis and vulnerability mitigation - Program / circuit slicing - Information hiding and discovery - Virtualization for protection and/or analysis - Forensic and anti-forensic protection - Moving target and active cyber defense - Theoretic analysis frameworks: o Abstract Interpretation o Homomorphic Encryption o Term Rewriting Systems o Machine Learning o Large Scale Boolean Matching - Component / Functional Identification - Program understanding - Source code (static/dynamic) analysis techniques Submission Guidelines: *********************** Original, unpublished manuscripts of up to 12-pages including figures and references must follow the ACM SIG proceedings format. SIGPLAN conference paper templates are available for LaTeX and Word at: http://www.acm.org/sigs/publications/proceedings-templates. Submissions must be in PDF. Submitted papers must adhere to the SIGPLAN Re-publication Policy and the ACM Policy on Plagiarism. Concurrent submissions to other conferences,workshops, journals, or similar forums of publication are not allowed. Submissions that do not meet these guidelines may not be considered. The URL for submission is through Easy Chair: https://easychair.org/conferences/?conf=pprew4 Publication: ******************** For accepted papers, at least one author must register for, attend, and make a presentation at PPREW in order for the paper to appear in the workshop proceedings. Proceedings will be published through ACM International Conference Publication Series (ICPS) and will appear in the ACM Digital Library. Program Chairs: ******************** •Mila Dalla Preda, University of Verona, Italy •Natalia Stakhanova, University of New Brunswick, Canada General Chair: ******************** •J. Todd McDonald, University of South Alabama, USA Program Committee: ******************** •Todd Andel, University of South Alabama, USA •Guillaume Bonfante, Loria, France •Lorenzo Cavallaro, Royal Holloway, University of London, UK •Mihai Christodorescu, Qualcomm-IBM Research, USA •Jack Davidson, University of Virginia, USA •Bjorn De Sutter, University of Ghent, Belgium •Saumya Debray, University of Arizona, USA •Jose M. Fernandez, Ecole Polytechnique de Montreal, Canada •Yuan Xiang Gu, IRDETO, Canada •Sylvain Guilley, TELECOM-ParisTech and Secure-IC S.A.S., France •Thorsten Holz, Ruhr-Universität Bochum, Germany •Johannes Kinder, Royal Holloway, University of London, UK •Andy King, University of Kent, UK •Sergio Maffeis, Imperial College London, UK •Frederico Maggi, Politecnico di Milano, Italy •William Mahoney, University of Nebraska Omaha, USA •Jean-Yves Marion, INPL, France •Isabella Mastroeni, Universita' di Verona, Italy •Mizuhito Ogawa, JIST, Japan •Mathias Payer, Purdue University, USA •Stacy Prowell, Oak Ridge National Lab, USA •William Robinson, Vanderbilt University, USA •Axel Simon, Technische Universität München, Germany •Clark Thomborson, University of Auckland, New Zealand Steering Committee: ******************** •Arun Lakhotia, University of Louisiana-Lafayette, USA •Roberto Giacobazzi, University of Verona, Italy •J. Todd McDonald, University of South Alabama, USA •Mila Dalla Preda, University of Verona, Italy |
|