posted by user: wikiterjusa || 3109 views || tracked by 3 users: [display]

PPREW 2015 : 5th Program Protection and Reverse Engineering Workshop

FacebookTwitterLinkedInGoogle

Link: http//www.pprew.org
 
When Dec 8, 2015 - Dec 8, 2015
Where Hilton Los Angeles/Universal City
Submission Deadline TBD
Categories    obfuscation   reverse engineering   MALWARE   program analysis
 

Call For Papers

CALL FOR PAPERS
-----------------------------------------------------------------
5th Program Protection and Reverse Engineering Workshop (PPREW-5)
Hilton Los Angeles/Universal City
Los Angeles, CA
December 08, 2015
Website: http://www.pprew.org

Co-Located with:
Annual Computer Security Applications Conference (ACSAC) 2015
Website: https://www.acsac.org/
-----------------------------------------------------------------

Important Dates:
***********************
Paper Submission: September 1, 2015
Author Notification: October 19, 2015
Camera Ready: November 20, 2015
Workshop: December 8, 2015

Workshop Aims:
***************
Program protection and reverse engineering techniques both find
their practical use in malware research and analysis as well as
legitimate protection schemes for intellectual property and
commercial software. Program protection techniques vary widely
from the use of obfuscation, tamper-proofing, watermarking,
virtualization, and an array of methods to frustrate disassembly,
debugging, and decompilation. Reverse engineering of low-level
constructs such as machine code or gate-level circuit definitions
through static and dynamic analysis is geared to recover higher
levels of abstract information to determine a program's function
as well as to classify it with existing similar code (which is
typically malicious). Both program protection and reverse
engineering techniques are utilized for legitimate and illegal
purposes. Theoretically, protection is seen as impossible in the
general case but the promise of mathematically based
transformations with rigorous cryptographic properties is an area
of active interest. Given enough time and resources, reverse
engineering and de-obfuscation is assumed to be achievable.

PPREW invites papers on program protection and reverse engineering
used in legitimate contexts, with particular focus on studies and
experiments that explore the boundary of practical methods and
their theoretical limits. The workshop is intended to provide a
discussion forum for researchers that are exploring theoretical
definitions and frameworks, implementing and using practical
methods and empirical studies, and those developing new tools
or techniques in this unique area of security. We expect the
workshop to provide exchange of ideas and support for cooperative
relationships among researchers in industry, academia,
and government.

Topics of interest include, but are not limited, to the following:
- Obfuscation / Deobfuscation (polymorphism)
- Tamper-proofing / Hardware-based protection
- Theoretic proofs for exploitation or protection
- Software watermarking / Digital fingerprinting
- Reverse engineering tools and techniques
- Side channel analysis and vulnerability mitigation
- Program / circuit slicing
- Information hiding and discovery
- Virtualization for protection and/or analysis
- Forensic and anti-forensic protection
- Moving target and active cyber defense
- Theoretic analysis frameworks:
o Abstract Interpretation
o Homomorphic Encryption
o Term Rewriting Systems
o Machine Learning
o Large Scale Boolean Matching
- Component / Functional Identification
- Program understanding
- Source code (static/dynamic) analysis techniques

Submission Guidelines:
***********************
Original, unpublished manuscripts of up to 12-pages including
figures and references must follow the ACM SIG proceedings format.
SIGPLAN conference paper templates are available for LaTeX and
Word at:

http://www.acm.org/sigs/publications/proceedings-templates.

Submissions must be in PDF.

Submitted papers must adhere to the SIGPLAN Re-publication Policy
and the ACM Policy on Plagiarism. Concurrent submissions to other
conferences,workshops, journals, or similar forums of publication
are not allowed. Submissions that do not meet these guidelines may
not be considered.

The URL for submission is through Easy Chair:
https://easychair.org/conferences/?conf=pprew4

Publication:
********************
For accepted papers, at least one author must register for, attend,
and make a presentation at PPREW in order for the paper to appear
in the workshop proceedings. Proceedings will be published through
ACM International Conference Publication Series (ICPS) and will
appear in the ACM Digital Library.

Program Chairs:
********************
•Mila Dalla Preda, University of Verona, Italy
•Natalia Stakhanova, University of New Brunswick, Canada

General Chair:
********************
•J. Todd McDonald, University of South Alabama, USA

Program Committee:
********************
•Todd Andel, University of South Alabama, USA
•Guillaume Bonfante, Loria, France
•Lorenzo Cavallaro, Royal Holloway, University of London, UK
•Mihai Christodorescu, Qualcomm-IBM Research, USA
•Jack Davidson, University of Virginia, USA
•Bjorn De Sutter, University of Ghent, Belgium
•Saumya Debray, University of Arizona, USA
•Jose M. Fernandez, Ecole Polytechnique de Montreal, Canada
•Yuan Xiang Gu, IRDETO, Canada
•Sylvain Guilley, TELECOM-ParisTech and Secure-IC S.A.S., France
•Thorsten Holz, Ruhr-Universität Bochum, Germany
•Johannes Kinder, Royal Holloway, University of London, UK
•Andy King, University of Kent, UK
•Sergio Maffeis, Imperial College London, UK
•Frederico Maggi, Politecnico di Milano, Italy
•William Mahoney, University of Nebraska Omaha, USA
•Jean-Yves Marion, INPL, France
•Isabella Mastroeni, Universita' di Verona, Italy
•Mizuhito Ogawa, JIST, Japan
•Mathias Payer, Purdue University, USA
•Stacy Prowell, Oak Ridge National Lab, USA
•William Robinson, Vanderbilt University, USA
•Axel Simon, Technische Universität München, Germany
•Clark Thomborson, University of Auckland, New Zealand

Steering Committee:
********************
•Arun Lakhotia, University of Louisiana-Lafayette, USA
•Roberto Giacobazzi, University of Verona, Italy
•J. Todd McDonald, University of South Alabama, USA
•Mila Dalla Preda, University of Verona, Italy

Related Resources

ICoIV 2024   2024 International Conference on Intelligent Vehicles (ICoIV 2024)
ATVA 2024   22nd International Symposium on Automated Technology for Verification and Analysis
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ACIE 2024   CPS--2024 4th Asia Conference on Information Engineering (ACIE 2024)
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
NLE Special Issue 2024   Natural Language Engineering- Special issue on NLP Approaches for Computational Analysis of Social Media Texts for Online Well-being and Social Order
CFEEE 2024   2024 International Conference on Frontiers of Energy and Environment Engineering (CFEEE 2024)
ICSE 2025   The 47th International Conference on Software Engineering (Second Cycle)
JCCME 2024   2024 International Joint Conference on Civil and Marine Engineering(JCCME 2024)
ICISPP--Ei 2024   2024 5th International Conference on Information Security and Privacy Protection (ICISPP 2024)