From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 2E4FE7EEBF for ; Mon, 29 Jun 2015 19:44:32 +0200 (CEST) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=pra; client-ip=209.85.160.171; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=mailfrom; client-ip=209.85.160.171; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-yk0-f171.google.com) identity=helo; client-ip=209.85.160.171; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="postmaster@mail-yk0-f171.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BxAgA8g5FVlKugVdFbgkWBIF+rFoc6jDkBCYJEhHNMAQEBAQEBEgEBAQEHCwsJHzCEKQgCCAsLBSgLBgIFBRQFaBsBBQEBHAEEHAIFEogNBQiiaYMxPjGcQwGFLAEBAQcBAQEBAR0Kj20EgwkMQYExBYcDhUY3hCeCWQQBgQODVYJYhHuWGjWBFReEJ1GBA4FFAQEB X-IPAS-Result: A0BxAgA8g5FVlKugVdFbgkWBIF+rFoc6jDkBCYJEhHNMAQEBAQEBEgEBAQEHCwsJHzCEKQgCCAsLBSgLBgIFBRQFaBsBBQEBHAEEHAIFEogNBQiiaYMxPjGcQwGFLAEBAQcBAQEBAR0Kj20EgwkMQYExBYcDhUY3hCeCWQQBgQODVYJYhHuWGjWBFReEJ1GBA4FFAQEB X-IronPort-AV: E=Sophos;i="5.15,371,1432591200"; d="scan'208,217";a="138301499" Received: from mail-yk0-f171.google.com ([209.85.160.171]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/RC4-SHA; 29 Jun 2015 19:44:30 +0200 Received: by ykdy1 with SMTP id y1so121368004ykd.2 for ; Mon, 29 Jun 2015 10:44:28 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-type:thread-index:content-language; bh=5gaLTKRanLncczi1/6vIra2IjsgaTzPFcXHN/1qGVCY=; b=ASvyLAdUEexJ/krBQwGtJbLwXT++BHCn86uQLMtglBlYD0+UVpXvgTyg9PQft7GmBX GMGLGocjSq4C+awTKayCUdnKN7TlEg1UlVc7NNJy+lHJyvELCNCfVE+I7eZIDGpN/HHz SubcJi82GRRm16zV6GtAsPVkeqkMsNQsPVPRbUv/+lCHaF8mXPac1u6O0hdldYlQEvXL pabKD29ldIQruOXIhWKt/31kIQmymjYRNCS8mbUUSE15M9gcNpXnPZfzbMLV6sjzcj9L UTU9sY22dwUBC5acZ8evyQZNEI1dEq9Gj60StybNXL5nJPI480SdsMFWcFgZh7YKuFga d1cg== X-Gm-Message-State: ALoCoQmVmREtffZ/dt0YqWKcQh71MOo35JzXyj3PRwMdB3xt9P7Qgz2sup6WUcvPJN+zQZOYVRzg X-Received: by 10.170.41.18 with SMTP id 18mr19890113ykj.29.1435599868585; Mon, 29 Jun 2015 10:44:28 -0700 (PDT) Received: from BANGOR (173-21-70-194.client.mchsi.com. [173.21.70.194]) by mx.google.com with ESMTPSA id b131sm31497906ywc.18.2015.06.29.10.44.27 for (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 29 Jun 2015 10:44:28 -0700 (PDT) From: "Todd McDonald" To: Date: Mon, 29 Jun 2015 12:44:30 -0500 Message-ID: <007d01d0b293$408d8ee0$c1a8aca0$@southalabama.edu> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_007E_01D0B269.57B8E670" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdCykzVcE6oQ6K5lRSWKqhwZUaJqYw== Content-Language: en-us Subject: [Caml-list] Call for Papers - 5th Program Protection and Reverse Engineering Workshop This is a multipart message in MIME format. ------=_NextPart_000_007E_01D0B269.57B8E670 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable CALL FOR PAPERS=20=20 -----------------------------------------------------------------=20 5th Program Protection and Reverse Engineering Workshop (PPREW-5) Hilton Los Angeles/Universal City Los Angeles, CA December 08, 2015 Website: http://www.pprew.org =20=20 Co-Located with: Annual Computer Security Applications Conference (ACSAC) 2015 Website: https://www.acsac.org/ ----------------------------------------------------------------- =20 Important Dates: *********************** Paper Submission: September 1, 2015 Author Notification: October 19, 2015 Camera Ready: November 20, 2015 Workshop: December 8, 2015 =20 Workshop Aims: ***************=20 Program protection and reverse engineering techniques both find their practical use in malware research and analysis as well as legitimate protection schemes for intellectual property and=20 commercial software. Program protection techniques vary widely=20 from the use of obfuscation, tamper-proofing, watermarking,=20 virtualization, and an array of methods to frustrate disassembly,=20 debugging, and decompilation. Reverse engineering of low-level=20 constructs such as machine code or gate-level circuit definitions=20 through static and dynamic analysis is geared to recover higher=20 levels of abstract information to determine a program's function=20 as well as to classify it with existing similar code (which is=20 typically malicious). Both program protection and reverse=20 engineering techniques are utilized for legitimate and illegal=20 purposes. Theoretically, protection is seen as impossible in the general case but the promise of mathematically based=20 transformations with rigorous cryptographic properties is an area=20 of active interest. Given enough time and resources, reverse=20 engineering and de-obfuscation is assumed to be achievable. =20=20 PPREW invites papers on program protection and reverse engineering=20 used in legitimate contexts, with particular focus on studies and=20 experiments that explore the boundary of practical methods and=20 their theoretical limits. The workshop is intended to provide a=20 discussion forum for researchers that are exploring theoretical=20 definitions and frameworks, implementing and using practical=20 methods and empirical studies, and those developing new tools=20 or techniques in this unique area of security. We expect the=20 workshop to provide exchange of ideas and support for cooperative=20 relationships among researchers in industry, academia,=20 and government. =20=20 Topics of interest include, but are not limited, to the following: - Obfuscation / Deobfuscation (polymorphism) - Tamper-proofing / Hardware-based protection - Theoretic proofs for exploitation or protection - Software watermarking / Digital fingerprinting - Reverse engineering tools and techniques - Side channel analysis and vulnerability mitigation - Program / circuit slicing - Information hiding and discovery - Virtualization for protection and/or analysis - Forensic and anti-forensic protection - Moving target and active cyber defense - Theoretic analysis frameworks: o Abstract Interpretation o Homomorphic Encryption o Term Rewriting Systems o Machine Learning o Large Scale Boolean Matching - Component / Functional Identification - Program understanding - Source code (static/dynamic) analysis techniques =20=20=20 Submission Guidelines:=20=20=20 ***********************=20=20=20 Original, unpublished manuscripts of up to 12-pages including=20 figures and references must follow the ACM SIG proceedings format.=20 SIGPLAN conference paper templates are available for LaTeX and=20 Word at: =20 http://www.acm.org/sigs/publications/proceedings-templates. =20=20 Submissions must be in PDF. =20=20=20=20 Submitted papers must adhere to the SIGPLAN Re-publication Policy=20 and the ACM Policy on Plagiarism. Concurrent submissions to other=20 conferences,workshops, journals, or similar forums of publication=20 are not allowed. Submissions that do not meet these guidelines may=20 not be considered. =20 The URL for submission is through Easy Chair: https://easychair.org/conferences/?conf=3Dpprew4 =20 Publication: ******************** For accepted papers, at least one author must register for, attend,=20 and make a presentation at PPREW in order for the paper to appear=20 in the workshop proceedings. Proceedings will be published through=20 ACM International Conference Publication Series (ICPS) and will=20 appear in the ACM Digital Library. =20=20=20 Program Chairs:=20=20 ******************** =95Mila Dalla Preda, University of Verona, Italy =95Natalia Stakhanova, University of New Brunswick, Canada =20=20=20 General Chair: ******************** =95J. Todd McDonald, University of South Alabama, USA =20=20=20 Program Committee: ******************** =95Todd Andel, University of South Alabama, USA =95Guillaume Bonfante, Loria, France =95Lorenzo Cavallaro, Royal Holloway, University of London, UK =95Mihai Christodorescu, Qualcomm-IBM Research, USA =95Jack Davidson, University of Virginia, USA =95Bjorn De Sutter, University of Ghent, Belgium =95Saumya Debray, University of Arizona, USA =95Jose M. Fernandez, Ecole Polytechnique de Montreal, Canada =95Yuan Xiang Gu, IRDETO, Canada =95Sylvain Guilley, TELECOM-ParisTech and Secure-IC S.A.S., France =95Thorsten Holz, Ruhr-Universit=E4t Bochum, Germany =95Johannes Kinder, Royal Holloway, University of London, UK =95Andy King, University of Kent, UK =95Sergio Maffeis, Imperial College London, UK =95Frederico Maggi, Politecnico di Milano, Italy =95William Mahoney, University of Nebraska Omaha, USA =95Jean-Yves Marion, INPL, France =95Isabella Mastroeni, Universita' di Verona, Italy =95Mizuhito Ogawa, JIST, Japan =95Mathias Payer, Purdue University, USA =95Stacy Prowell, Oak Ridge National Lab, USA =95William Robinson, Vanderbilt University, USA =95Axel Simon, Technische Universit=E4t M=FCnchen, Germany =95Clark Thomborson, University of Auckland, New Zealand =20=20=20 Steering Committee: ******************** =95Arun Lakhotia, University of Louisiana-Lafayette, USA =95Roberto Giacobazzi, University of Verona, Italy =95J. Todd McDonald, University of South Alabama, USA =95Mila Dalla Preda, University of Verona, Italy ------=_NextPart_000_007E_01D0B269.57B8E670 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

CALL FOR PAPERS= =A0

-----------------------------------= ------------------------------

5th Prog= ram Protection and Reverse Engineering Workshop (PPREW-5)

Hilton Los Angeles/Universal City

Los Angeles, CA

December 08= , 2015

Website: http://www.pprew.org

=A0

Co-= Located with:

Annual Computer Security A= pplications Conference (ACSAC) 2015

Webs= ite: https://www.acsac.org/

------------= -----------------------------------------------------

 

Important Dates:

***********************

Paper Submission: September 1, 2015

Author Notification: October 19, 2015

Camera Ready: November 20, 2015

Workshop: December 8, 2015

&nb= sp;

Workshop Aims:

***************

Program protec= tion and reverse engineering techniques both find

their practical use in malware research and analysis as well as

legitimate protection schemes for intelle= ctual property and

commercial software.= Program protection techniques vary widely

from the use of obfuscation, tamper-proofing, watermarking, =

virtualization, and an array of methods to frustra= te disassembly,

debugging, and decompil= ation. Reverse engineering of low-level

constructs such as machine code or gate-level circuit definitions

through static and dynamic analysis is geared t= o recover higher

levels of abstract inf= ormation to determine a program's function

as well as to classify it with existing similar code (which is

typically malicious). Both program protection a= nd reverse

engineering techniques are u= tilized for legitimate and illegal

purp= oses. Theoretically, protection is seen as impossible in the

=

general case but the promise of mathematically based <= o:p>

transformations with rigorous cryptograp= hic properties is an area

of active int= erest. Given enough time and resources, reverse

engineering and de-obfuscation is assumed to be achievable.

=A0

PPREW = invites papers on program protection and reverse engineering

used in legitimate contexts, with particular focus on= studies and

experiments that explore t= he boundary of practical methods and

th= eir theoretical limits. The workshop is intended to provide a

discussion forum for researchers that are exploring = theoretical

definitions and frameworks,= implementing and using practical

metho= ds and empirical studies, and those developing new tools

or techniques in this unique area of security. We expect = the

workshop to provide exchange of ide= as and support for cooperative

relation= ships among researchers in industry, academia,

and government.

=A0 <= /p>

Topics of interest include, but are not limited, to= the following:

- Obfuscation / Deobfusc= ation (polymorphism)

- Tamper-proofing /= Hardware-based protection

- Theoretic p= roofs for exploitation or protection

- S= oftware watermarking / Digital fingerprinting

- Reverse engineering tools and techniques

- Side channel analysis and vulnerability mitigation

- Program / circuit slicing

- Information hiding and discovery

- Virtualization for protection and/or analysis

- Forensic and anti-forensic protection

- Moving target and active cyber defense

- Theoretic analysis frameworks:

o Abstract Interpretation

o Hom= omorphic Encryption

o Term Rewriting Sy= stems

o Machine Learning

=

o Large Scale Boolean Matching

- Component / Functional Identification

- Program understanding

- S= ource code (static/dynamic) analysis techniques

=A0=A0

Submission Guidelines:= =A0=A0

***********************=A0=A0

Original, unpublished manuscripts of up t= o 12-pages including

figures and refere= nces must follow the ACM SIG proceedings format.

SIGPLAN conference paper templates are available for LaTeX and

Word at:

 

http://www.acm.org/sigs/public= ations/proceedings-templates.

=A0 <= /o:p>

Submissions must be in PDF.

=A0=A0=A0

Submitted p= apers must adhere to the SIGPLAN Re-publication Policy

and the ACM Policy on Plagiarism. Concurrent submissions to= other

conferences,workshops, journals,= or similar forums of publication

are n= ot allowed. Submissions that do not meet these guidelines may

not be considered.

 

The URL for submission is throu= gh Easy Chair:

https://easychair.org/con= ferences/?conf=3Dpprew4

 

Publication:

*= *******************

For accepted papers,= at least one author must register for, attend,

and make a presentation at PPREW in order for the paper to appear =

in the workshop proceedings. Proceeding= s will be published through

ACM Interna= tional Conference Publication Series (ICPS) and will

appear in the ACM Digital Library.

=A0=A0

Program Chairs:=A0

********************

•Mila Dalla Preda, University of Verona, Italy

•Natalia Stakhanova, University of New Brun= swick, Canada

=A0=A0

General Chair:

********= ************

•J. Todd McDonald, Un= iversity of South Alabama, USA

=A0=A0

Program Committee:

********************

•= ;Todd Andel, University of South Alabama, USA

•Guillaume Bonfante, Loria, France

•Lorenzo Cavallaro, Royal Holloway, University of London, UK

•Mihai Christodorescu, Qualcomm-IBM= Research, USA

•Jack Davidson, Uni= versity of Virginia, USA

•Bjorn De= Sutter, University of Ghent, Belgium

&#= 8226;Saumya Debray, University of Arizona, USA

•Jose M. Fernandez, Ecole Polytechnique de Montreal, Canada

•Yuan Xiang Gu, IRDETO, Canada<= /o:p>

•Sylvain Guilley, TELECOM-ParisTech and= Secure-IC S.A.S., France

•Thorste= n Holz, Ruhr-Universit=E4t Bochum, Germany

•Johannes Kinder, Royal Holloway, University of London, UK

•Andy King, University of Kent, UK

•Sergio Maffeis, Imperial College London= , UK

•Frederico Maggi, Politecnico= di Milano, Italy

•William Mahoney= , University of Nebraska Omaha, USA

R= 26;Jean-Yves Marion, INPL, France

•= ;Isabella Mastroeni, Universita' di Verona, Italy

•Mizuhito Ogawa, JIST, Japan

•Mathias Payer, Purdue University, USA

•Stacy Prowell, Oak Ridge National Lab, USA

<= p class=3DMsoNormal>•William Robinson, Vanderbilt University, USA

•Axel Simon, Technische Universit=E4t= M=FCnchen, Germany

•Clark Thombor= son, University of Auckland, New Zealand

=A0=A0

Steering Committee:<= /p>

********************

•Arun Lakhotia, University of Louisiana-Lafayette, USA

•Roberto Giacobazzi, University of Verona, = Italy

•J. Todd McDonald, Universit= y of South Alabama, USA

•Mila Dall= a Preda, University of Verona, Italy

= ------=_NextPart_000_007E_01D0B269.57B8E670--