posted by organizer: atrox || 5539 views || tracked by 5 users: [display]

ROOTS 2021 : Reversing and Offensive-oriented Trends Symposium


When Nov 18, 2021 - Nov 19, 2021
Where Vienna, Austria
Submission Deadline Aug 31, 2021
Notification Due Oct 6, 2021
Final Version Due Oct 22, 2021
Categories    computer science   security   communications

Call For Papers

The Reversing and Offensive-oriented Trends Symposium, an academic workshop, is again co-located with the DeepSec conference in its fifth year. ROOTS solicits contributions that focus on theorems and root shells: In security, two things you absolutely cannot argue with.
Security is hard to define. Most often, security is defined by its absence. For scientists, this is particularly unsatisfactory. A lack of definition increases the difficulty to find suitable quantitive and qualitative models. Even though the overall landscape is blurry at best; exploitation, reverse engineering, and offensive techniques have their place. ROOTS aims to explore this territory.

The first European symposium of its kind, ROOTS aims to provide an industry-friendly academic platform to discuss trends in exploitation, reversing, offensive techniques, and effective protections. Submissions should provide novel attack forms, describe novel reversing techniques, or effective deployable defenses. Submissions can also provide a comprehensive overview of the state-of-the-art, and pinpoint promising areas that have not received appropriate attention in the past.

Topics of interest include but are not limited to:

- New exploitation techniques and methodologies
- New reverse engineering techniques and methodologies
- The science of (in)security
- The role of exploitation in the science of security
- The role of reverse engineering in the science of security
- Novel approaches to security scalability, in the actual world or in simulated environments (CTF)
- New unintended programming and execution models (“weird machines”)
wherein the program is encoded in data, metadata, descriptors, etc.
- Automated code analysis and semantic understanding
- Formal models of exploitation and formal methods for exploitation
- Systematization of knowledge in exploitation
- Systematization of knowledge in reverse engineering
- Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.
- Reverse engineering of trending platforms and architectures: embedded systems, IoT, cloud, SDNs, etc.
- Exploitation perspectives on emerging trust models: SGX, enclaves, blockchains, etc.

PC & Publisher
Program Chairs: René Pfeiffer (DeepSec), Adrian Dabrowski (University of California, Irvine)
General chair: Edgar Weippl (Universität Wien, SBA Research)

Program & Review Committee
Patroklos Argyroudis (CENSUS S.A.)
Jean-Philippe Aumasson (Kudelski Security, Switzerland)
Sergey Bratus (Dartmouth College)
Martina Lindorfer (University of Technology, Vienna)
Georg Merzdovnik (SBA Research)
Marius Muench (VU Amsterdam)
Sebastian Neuner (Google LLC)
Marcus Niemietz (Ruhr-University Bochum)
Konrad Rieck (TU Braunschweig)
Sebastian Schinzel (Münster University of Applied Sciences)
Juraj Somorovsky (Paderborn University)
Alexios Voulimeneas (KU Leuven)
Stefano Zanero (Politecnico di Milano)

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
ECOOP 2022   European Conference on Object-Oriented Programming
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
ICSOC 2021   The 19th International Conference on Service-Oriented Computing
ACM-EI/Scopus-ACAI 2021   2021 4th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2021)
JNLE-NLPOCO 2021   Journal of Natural Language Engineering - Special Issue on NLP Approaches to Offensive Content Online
RiE 2022   13th International Conference on Robotics in Education
SCC 2021   2021 International Conference on Services Computing-Special Track
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
CCSEA 2022   12th International Conference on Computer Science, Engineering and Applications