posted by organizer: atrox || 2254 views || tracked by 2 users: [display]

ROOTS 2022 : Reversing and Offensive-oriented Trends Symposium


When Nov 17, 2022 - Nov 18, 2022
Where Vienna, Austria
Submission Deadline Aug 26, 2022
Notification Due Oct 3, 2022
Final Version Due Oct 15, 2022
Categories    computer science   security   communications

Call For Papers

Reversing and Offensive-oriented Trends Symposium 2022 (ROOTS)
co-located with DeepSec 2022 November 17/18, Vienna, Austria

Call for Papers

The Reversing and Offensive-oriented Trends Symposium is -again- co-located with the DeepSec conference in its sixth year. ROOTS solicits contributions that focus on theorems and root shells: In security, two things you absolutely cannot argue with.
Security is hard to define. Most often, security is defined by its absence. For scientists, this is particularly unsatisfactory. A lack of definition increases the difficulty to find suitable quantitive and qualitative models. Even though the overall landscape is blurry at best; exploitation, reverse engineering, and offensive techniques have their place. ROOTS aims to explore this territory.

The first European symposium of its kind, ROOTS aims to provide an industry-friendly academic platform to discuss trends in exploitation, reversing, offensive techniques, and effective protections. Submissions should provide novel attack forms, describe novel reversing techniques, or effective deployable defenses. Submissions can also provide a comprehensive overview of the state-of-the-art, and pinpoint promising areas that have not received appropriate attention in the past.

Topics of interest include but are not limited to:

- New exploitation techniques and methodologies
- New reverse engineering techniques and methodologies
- The science of (in)security
- The role of exploitation in the science of security
- The role of reverse engineering in the science of security
- Novel approaches to security scalability, in the actual world or in simulated environments (CTF)
- New unintended programming and execution models (“weird machines”)
wherein the program is encoded in data, metadata, descriptors, etc.
- Automated code analysis and semantic understanding
- Formal models of exploitation and formal methods for exploitation
- Systematization of knowledge in exploitation
- Systematization of knowledge in reverse engineering
- Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.
- Reverse engineering of trending platforms and architectures: embedded systems, IoT, cloud, SDNs, etc.
- Exploitation perspectives on emerging trust models: SGX, enclaves, blockchains, etc.

Important dates

Submission deadline: August 26 (anywhere in the world)
Author notification: October 03
Camera-ready papers due: October 15
Workshop and DeepSec: November 17/18

Program Chairs

Adrian Dabrowski, CISPA Helmholz Center for Information Security
René Pfeiffer, DeepSec


Patroklos Argyroudis, CENSUS S.A.
Jean-Philippe Aumasson, Taurus
Sergey Bratus, Dartmouth College
Mariano Graziano, Cisco Talos
Felicitas Hetzelt, TU Berlin
Martina Lindorfer, University of Technology, Vienna
Georg Merzdovnik, SBA Research
Sebastian Neuner, Google LLC
Marcus Niemietz, Niederrhein University of Applied Sciences
Konrad Rieck, TU Braunschweig
Michael Schwarz, CISPA Helmholtz Center for Information Security
Juraj Somorovsky, Paderborn University
Alexios Voulimeneas, KU Leuven
Edgar Weippl, University of Vienna

Submission and Details


Related Resources

ESOCC 2023   European Conference on Service-Oriented and Cloud Computing
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
HOST 2023   IEEE International Symposium on Hardware Oriented Security and Trust (Submission Window 2)
ACM-EI/Scopus-ITCC 2023   2023 3rd International Conference on Information Technology and Cloud Computing (ITCC 2023) -EI Compendex
IJANS 2023   International Journal on AdHoc Networking Systems
AIIoT 2023   International Conference on Artificial Intelligence and IoT
TyphoonCon 2023   TyphoonCon 2023 - All Offensive Security Conference
IEEE Xplore-Ei/Scopus-CCCAI 2023   2023 International Conference on Communications, Computing and Artificial Intelligence (CCCAI 2023) -EI Compendex
TyphoonCon 2023   TyphoonCon 2023 - All Offensive Security Conference workshops
ACM-Ei/Scopus-CNIOT 2023   2023 4th International Conference on Computing, Networks and Internet of Things (CNIOT 2023) -EI Compendex