posted by user: marco_guarnieri || 2970 views || tracked by 2 users: [display]

PLAS 2021 : 16th Workshop on Programming Languages and Analysis for Security

FacebookTwitterLinkedInGoogle

Link: https://plas21.software.imdea.org
 
When Dec 7, 2021 - Dec 7, 2021
Where Virtual
Submission Deadline Oct 22, 2021
Notification Due Nov 12, 2021
Categories    security   programming languages
 

Call For Papers

--------------------------------------------------------------------------

PLAS 2021 Call for Papers
16th Workshop on Programming Languages and Analysis for Security (PLAS 2021)

https://plas21.software.imdea.org
Virtual Event
December 7, 2021

--------------------------------------------------------------------------

Important Dates

Paper submission: October 22, 2021 (AoE)
Author notification: November 12, 2021 (AoE)
Workshop date: December 7, 2021

--------------------------------------------------------------------------

PLAS provides a forum for exploring and evaluating the use of programming language and program analysis techniques for promoting security in the complete range of software systems, from compilers to machine-learned models and smart contracts. The workshop encourages proposals of new, speculative ideas, evaluations of new or known techniques in practical settings, and discussions of emerging threats and problems. We also host position papers that are radical, forward-looking, and lead to lively and insightful discussions influential to the future research at the intersection of programming languages and security.

The scope of PLAS includes, but is not limited to:

- Language-based techniques for detecting and eliminating side-channel vulnerabilities
- Programming language techniques and verification applied to security in other domains (e.g. adversarial learning and smart contracts)
- Software isolation techniques (e.g., SFI and sandboxing) and compiler-based hardening techniques (e.g, secure compilation).
- Compiler-based security mechanisms (e.g. security type systems) or runtime-based security mechanisms (e.g. inline reference monitors)
- Techniques for discovering and detecting security vulnerabilities, including program (binary) analysis and fuzzing- Automated introduction and/or verification of security enforcement mechanisms
- Language-based verification of security properties in software, including verification of cryptographic protocols
- Specifying and enforcing security policies for information flow and access control
- Model-driven approaches to security
- Security concerns for Web programming languages
- Language design for security in new domains such as cloud computing and IoT
- Applications, case studies, and implementations of these techniques

--------------------------------------------------------------------------

Call for Papers

We invite both short papers and long papers. For short papers, we especially encourage the submission of position papers that are likely to generate lively discussion as well as short papers covering ongoing and future work.

- Short papers should be at most 2 pages long, plus as many pages as needed for references. Papers that present radical, open-ended and forward-looking ideas are particularly welcome in this category. Authors submitting papers in this category must prepend the phrase "Short Paper:" to the title of the submitted paper.

- There is no page limit on long papers. Papers in this category are expected to have relatively mature content. Papers that present promising preliminary and exploratory work, or recently published work are particularly welcome in this category. Long papers may receive longer talk slots at the workshop than short papers, depending on the number of accepted submissions.

*NEW THIS YEAR* The workshop has no published workshop proceedings and there is no restriction on paper format other than the page limits as stated above. Presenting a paper (either short or long) at the workshop should not preclude submission to or publication in other venues that are before, concurrent, or after the workshop. Papers presented at the workshop will be made available to workshop participants only.

--------------------------------------------------------------------------

Program Committee

Owen Arden (UC Santa Cruz)
Aslan Askarov (Aarhus University)
Stefano Calzavara (Università Ca’ Foscari Venezia)
Dana Drachsler Cohen (Technion)
Klaus von Gleissenthal (Vrije Universiteit Amsterdam)
Marco Guarnieri (IMDEA Software, Co-Chair)
Andrew Hirsch (Max Planck Institute for Software Systems)
Toby Murray (University of Melbourne)
Joe Near (University of Vermont)
Marco Patrignani (CISPA)
Hernán Ponce de León (Bundeswehr University Munich)
Jian Xiang (Harvard University)
Danfeng Zhang (Penn State University, Co-Chair)

--------------------------------------------------------------------------

Related Resources

ASPLOS 2025   The ACM International Conference on Architectural Support for Programming Languages and Operating Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
OOPSLA 2025 Round 2 2025   Conference on Object-Oriented Programming Systems, Languages, and Applications (Round 2)
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
TASE 2025   19th International Symposium on Theoretical Aspects of Software Engineering
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
SLE 2025   1st CfP: SLE 2025 - 18th ACM SIGPLAN International Conference on Software Language Engineering
OOPSLA 2025 Round 1 2025   Conference on Object-Oriented Programming Systems, Languages, and Applications (Round 1)