posted by user: sadegh_rk || 1103 views || tracked by 2 users: [display]

PAVeTrust 2022 : 2nd Workshop on Program Analysis and Verification on Trusted Platforms

FacebookTwitterLinkedInGoogle

Link: https://www.acsac.org/2022/workshops/pavetrust/
 
When Dec 6, 2022 - Dec 6, 2022
Where Austin, TX, United States
Submission Deadline Oct 14, 2022
Notification Due Nov 20, 2022
Final Version Due Nov 29, 2022
Categories    formal methods   cybersecurity
 

Call For Papers

Trusted Execution Environments (TEEs) are now commonplace with implementations like Intel SGX and AMD SEV widely available. This technology offers new guarantees, such as integrity and confidentiality for running applications, that are not typically available in (untrusted) conventional platforms. Therefore, TEEs are being rapidly adopted by security-focused companies intending to harden their systems to provide such guarantees.

This workshop intends to explore the interplay between TEE-based implementations of a Trusted Third Party (TTP) and program analysis and system verification. It should provide a venue where academics and practitioners interested in these topics come together to debate the connection between these two areas. We are especially interested in promoting:

(A) the application of formal methods, and more specifically of program analysis and system verification, to the specification and/or analysis of the trusted stack executing these TEE-hardened applications - this stack might include CPU microcode, firmware code, Operating System (OS) code, protocols for provisioning and attestation, and the application itself - and

(B) innovative applications of TEEs to execute formal methods technologies (such as program analysers/verifiers).

While the frameworks proposed in the context of (A) should help the adoption of TEE-based technologies by increasing the community's confidence on the security of TEE-based systems, the applications arising in the context of (B) should introduce analysis frameworks that enjoy non-conventional properties such as confidentiality of the analysed systems and trustworthiness of the analysis outcome. It should be possible to deliver object code to users who know that the corresponding sources have passed agreed verification procedures, without the users seeing the sources or having to have trust in other parties.

=================
Submission Guidelines
=================

We invite the submission of short papers presenting original work on topics (A) and (B) above. The accepted papers will have to be presented by one of the authors at the workshop. Papers should be submitted as a PDF file of a maximum of 8 2-column pages, excluding well-marked references and appendices limited to 3 pages. Submissions must be generated using the 2-column ACM acmart template available at https://www.acm.org/publications/proceedings-template, using the [sigconf, anonymous] options. All submissions must be anonymous (i.e., papers should not contain author names or affiliations, or obvious citations).

Related Resources

HICSS 2026   Hawaii International Conference on System Sciences Mini Track: AI-Driven Program Analysis and Software Synthesis: Transforming Modern Software Engineering
Ei/Scopus-MLBDM 2025   2025 5th International Conference on Machine Learning and Big Data Management (MLBDM 2025)
WPTE 2025   11th International Workshop on Rewriting Techniques for Program Transformations and Evaluation
NLPCL 2025   6th International Conference on Natural Language Processing and Computational Linguistics
WTSC 2025   9th Workshop on Trusted Smart Contracts
IEEE TPS 2025   IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
SETTA 2025   11th Symposium on Dependable Software Engineering: Theories, Tools and Applications
ICITA 2025   19th International Conference on Information Technology and Applications
AIEAAP 2026   HICSS 2026 Minitrack AI Ecosystems: Assistants, Agents and Platforms
CAV 2025   37th International Conference on Computer Aided Verification