posted by organizer: mianni || 2275 views || tracked by 2 users: [display]

WASP 2023 : Workshop on Attacks and Software Protection @ ESORICS 2023


When Sep 28, 2023 - Sep 29, 2023
Where The Hague, The Netherlands
Submission Deadline Jul 9, 2023
Notification Due Jul 30, 2023
Final Version Due Aug 20, 2023
Categories    security   privacy   attacks   MALWARE

Call For Papers


In today’s digital age, the need for software protection is crucial more than ever. With cyber attacks becoming increasingly sophisticated and pervasive, obfuscation and other forms of software protection are of interest not only to legitimate software developers seeking to safeguard their code and intellectual property, but also to malware writers seeking to create new viruses able to evade antivirus detection and to attackers in general, with the goal to steal sensitive information, compromise code integrity, or insert backdoors into targeted systems. Software protection is a complex and interdisciplinary field that intersects with many different fields such as cryptography, networks, computer architecture, operating systems, programming languages and compilers. The Workshop on Attacks and Software Protection (WASP) will provide a meeting point dedicated to exploring and advancing the latest research and techniques in software attacks, analysis and protection both from the offensive and the defensive perspective. WASP will focus on new models and techniques to defend software from tampering, reverse engineering, and piracy, as well as the development of new analysis techniques and new attack strategies that highlight the need for more complete defenses.

We invite submissions of original research papers on topics related to software attacks and protection. Possible topics include, but are not limited to:

- Software attacks and defenses
- Program Analysis
- Symbolic Execution
- Reverse Engineering
- Malware Analysis
- Software Obfuscation and De-obfuscation
- Software Watermarking and Fingerprinting
- Software Tampering and Anti-Tampering
- Software Piracy
- Software Steganography
- Software Similarity Analysis
- Authorship Attribution and Plagiarism Detection
- Side Channel Attacks
- Software Attestation
- Anti-Debugging and Anti-Simulation
- Machine and Deep Learning for Software Attack, Analysis and Protection
- IoT Software Attack and Defenses
- Hardware-based Software Protection
- Trusted Execution Environments, Trusted Platform Modules and Secure Elements
- Digital Rights Management
- Cloud Software Protection

* Submission Details

All accepted papers will be published in the Springer LNCS series. Extended versions of selected paper will also be invited to a Special Issue (more info will be published soon).

Submitted papers must not substantially overlap with previously published or currently under review papers for journals or conferences. The only accepted format for submission is pdf. All submissions must be written in English and follow the LNCS template available here, with a maximum length of 14 pages excluding appendices and bibliography, and 16 pages total. Appendices should be well-marked, but it’s not mandatory for the committee to review them. The review process is single-blind. Failure to comply with these guidelines may lead to rejection without considering the content’s quality. If accepted, authors must agree to the Springer LNCS copyright and present their papers at the workshop.

Submission site:

Related Resources

CheckMATE 2024   Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks @ ACM CCS 2024
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
NYC-2024-NS 2024   New York Annual Conference on Network Security 2024
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ESORICS 2024   European Symposium on Research in Computer Security
ARIA 2024   11th International Conference on Artificial Intelligence & Applications
RAID 2024   The 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
STM 2024   20th International Workshop on Security and Trust Management (co-located with ESORICS 2024)