posted by user: wikiterjusa || 870 views || tracked by 3 users: [display]

PPREW 2015 : 5th Program Protection and Reverse Engineering Workshop


Link: http//
When Dec 8, 2015 - Dec 8, 2015
Where Hilton Los Angeles/Universal City
Submission Deadline TBD
Categories    obfuscation   reverse engineering   MALWARE   program analysis

Call For Papers

5th Program Protection and Reverse Engineering Workshop (PPREW-5)
Hilton Los Angeles/Universal City
Los Angeles, CA
December 08, 2015

Co-Located with:
Annual Computer Security Applications Conference (ACSAC) 2015

Important Dates:
Paper Submission: September 1, 2015
Author Notification: October 19, 2015
Camera Ready: November 20, 2015
Workshop: December 8, 2015

Workshop Aims:
Program protection and reverse engineering techniques both find
their practical use in malware research and analysis as well as
legitimate protection schemes for intellectual property and
commercial software. Program protection techniques vary widely
from the use of obfuscation, tamper-proofing, watermarking,
virtualization, and an array of methods to frustrate disassembly,
debugging, and decompilation. Reverse engineering of low-level
constructs such as machine code or gate-level circuit definitions
through static and dynamic analysis is geared to recover higher
levels of abstract information to determine a program's function
as well as to classify it with existing similar code (which is
typically malicious). Both program protection and reverse
engineering techniques are utilized for legitimate and illegal
purposes. Theoretically, protection is seen as impossible in the
general case but the promise of mathematically based
transformations with rigorous cryptographic properties is an area
of active interest. Given enough time and resources, reverse
engineering and de-obfuscation is assumed to be achievable.

PPREW invites papers on program protection and reverse engineering
used in legitimate contexts, with particular focus on studies and
experiments that explore the boundary of practical methods and
their theoretical limits. The workshop is intended to provide a
discussion forum for researchers that are exploring theoretical
definitions and frameworks, implementing and using practical
methods and empirical studies, and those developing new tools
or techniques in this unique area of security. We expect the
workshop to provide exchange of ideas and support for cooperative
relationships among researchers in industry, academia,
and government.

Topics of interest include, but are not limited, to the following:
- Obfuscation / Deobfuscation (polymorphism)
- Tamper-proofing / Hardware-based protection
- Theoretic proofs for exploitation or protection
- Software watermarking / Digital fingerprinting
- Reverse engineering tools and techniques
- Side channel analysis and vulnerability mitigation
- Program / circuit slicing
- Information hiding and discovery
- Virtualization for protection and/or analysis
- Forensic and anti-forensic protection
- Moving target and active cyber defense
- Theoretic analysis frameworks:
o Abstract Interpretation
o Homomorphic Encryption
o Term Rewriting Systems
o Machine Learning
o Large Scale Boolean Matching
- Component / Functional Identification
- Program understanding
- Source code (static/dynamic) analysis techniques

Submission Guidelines:
Original, unpublished manuscripts of up to 12-pages including
figures and references must follow the ACM SIG proceedings format.
SIGPLAN conference paper templates are available for LaTeX and
Word at:

Submissions must be in PDF.

Submitted papers must adhere to the SIGPLAN Re-publication Policy
and the ACM Policy on Plagiarism. Concurrent submissions to other
conferences,workshops, journals, or similar forums of publication
are not allowed. Submissions that do not meet these guidelines may
not be considered.

The URL for submission is through Easy Chair:

For accepted papers, at least one author must register for, attend,
and make a presentation at PPREW in order for the paper to appear
in the workshop proceedings. Proceedings will be published through
ACM International Conference Publication Series (ICPS) and will
appear in the ACM Digital Library.

Program Chairs:
•Mila Dalla Preda, University of Verona, Italy
•Natalia Stakhanova, University of New Brunswick, Canada

General Chair:
•J. Todd McDonald, University of South Alabama, USA

Program Committee:
•Todd Andel, University of South Alabama, USA
•Guillaume Bonfante, Loria, France
•Lorenzo Cavallaro, Royal Holloway, University of London, UK
•Mihai Christodorescu, Qualcomm-IBM Research, USA
•Jack Davidson, University of Virginia, USA
•Bjorn De Sutter, University of Ghent, Belgium
•Saumya Debray, University of Arizona, USA
•Jose M. Fernandez, Ecole Polytechnique de Montreal, Canada
•Yuan Xiang Gu, IRDETO, Canada
•Sylvain Guilley, TELECOM-ParisTech and Secure-IC S.A.S., France
•Thorsten Holz, Ruhr-Universität Bochum, Germany
•Johannes Kinder, Royal Holloway, University of London, UK
•Andy King, University of Kent, UK
•Sergio Maffeis, Imperial College London, UK
•Frederico Maggi, Politecnico di Milano, Italy
•William Mahoney, University of Nebraska Omaha, USA
•Jean-Yves Marion, INPL, France
•Isabella Mastroeni, Universita' di Verona, Italy
•Mizuhito Ogawa, JIST, Japan
•Mathias Payer, Purdue University, USA
•Stacy Prowell, Oak Ridge National Lab, USA
•William Robinson, Vanderbilt University, USA
•Axel Simon, Technische Universität München, Germany
•Clark Thomborson, University of Auckland, New Zealand

Steering Committee:
•Arun Lakhotia, University of Louisiana-Lafayette, USA
•Roberto Giacobazzi, University of Verona, Italy
•J. Todd McDonald, University of South Alabama, USA
•Mila Dalla Preda, University of Verona, Italy

Related Resources

TMPA 2017   4th International Conference on Tools and Methods for Program Analysis
ICIEM 2016   International Conference on Integrated Environmental Management for Sustainable Development
IWPE 2017   3rd IEEE International Workshop on Privacy Engineering
IEEE eCrime 2017   eCrime 2017 - Symposium on Electronic Crime (IEEE)
EPE 2016   2016 International Conference and Exposition on Electrical and Power Engineering
LOPSTR 2016   26th International Symposium on Logic-Based Program Synthesis and Transformation
WCSE 2017   7th International Workshop on Computer Science and Engineering --Scopus & Ei compendex
S.ARCH 2017   The 4th International Conference on Architecture
PSPC 2017   10th Annual Poverty and Social Protection Conference
EEETEM 2017   The Third International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics