From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id C9B657EE25 for ; Sun, 27 Oct 2013 19:20:47 +0100 (CET) Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=pra; client-ip=209.85.213.43; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=mailfrom; client-ip=209.85.213.43; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-yh0-f43.google.com) identity=helo; client-ip=209.85.213.43; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="postmaster@mail-yh0-f43.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Al4DAG5YbVLRVdUrlGdsb2JhbABZgkN8qxGUIoEcFg4BAQEBBwsLCRIqgiYBBQgCExAoCwYCBQUUAwJPGRsBBQEBGwIEHAIFh3cFCJlplQOJFI4WgUaELAOJP4VahRGEJ49UQYMTgVyBSg X-IPAS-Result: Al4DAG5YbVLRVdUrlGdsb2JhbABZgkN8qxGUIoEcFg4BAQEBBwsLCRIqgiYBBQgCExAoCwYCBQUUAwJPGRsBBQEBGwIEHAIFh3cFCJlplQOJFI4WgUaELAOJP4VahRGEJ49UQYMTgVyBSg X-IronPort-AV: E=Sophos;i="4.93,581,1378850400"; d="scan'208,217";a="39030533" Received: from mail-yh0-f43.google.com ([209.85.213.43]) by mail2-smtp-roc.national.inria.fr with ESMTP/TLS/RC4-SHA; 27 Oct 2013 19:20:41 +0100 Received: by mail-yh0-f43.google.com with SMTP id v1so2359615yhn.16 for ; Sun, 27 Oct 2013 11:20:45 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:references:in-reply-to:subject:date :message-id:mime-version:content-type:thread-index:content-language; bh=9IzBUTxoEWJvKfUvqDZWaM4/iD7zVwKsQXqe8R7h3q0=; b=GfBJ1WCwVCtNsaxczaVAkT2UWp7tY+OfFKE9OHTPXDcVE8gXwy4GfcpKQNLRBHafd+ 0qpYglAlAMyjoGZfERtNRuMl4OBVRGl9bvxnZYtadp/OvcB6RNq3HXuEy5whDcZdqrno mAAFw3ihgbU+4Nj2+XncSkFTbI81xPG2qxguwEDVgO5ghxezhTLzFIAAdkAS8ugU0sXh BO2ASLuMyXGijW58TXTcWsCbra/izU4NyE8gOEzegKZ2E/Nd5ixzri2mDAUCNOg4k8fC rXVR6zkzd7ONbXQL+64HjXw9Fsa0EPItPw0PDiOznX3W4fwy7/LFNkoUtbkEVzR7+nuG twbw== X-Gm-Message-State: ALoCoQk7LHuxbVtXcCXDiXd1VGV3DK4ebOhVd3YkO15I6CKGABDDes4oHfIcSTED7KoblXQRfNhs X-Received: by 10.236.61.194 with SMTP id w42mr12567870yhc.2.1382898045255; Sun, 27 Oct 2013 11:20:45 -0700 (PDT) Received: from ZION (173-21-70-194.client.mchsi.com. [173.21.70.194]) by mx.google.com with ESMTPSA id m68sm27157003yhj.22.2013.10.27.11.20.44 for (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sun, 27 Oct 2013 11:20:44 -0700 (PDT) From: "Todd McDonald" To: References: <037801ced33e$1948af30$4bda0d90$@southalabama.edu> <03c301ced33f$e8b21b70$ba165250$@southalabama.edu> <03e001ced340$3050c350$90f249f0$@southalabama.edu> In-Reply-To: <03e001ced340$3050c350$90f249f0$@southalabama.edu> Date: Sun, 27 Oct 2013 13:20:44 -0500 Message-ID: <03f301ced341$4096e950$c1c4bbf0$@southalabama.edu> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_03F4_01CED317.57C1F2C0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQKPB0SoQIqSKQpaYx6Rg0jzlCQW+AHuFquTAdvY0ZiYaiRioA== Content-Language: en-us Subject: [Caml-list] EXTENDED DEADLINE: Program Protection and Reverse Engineering Workshop (PPREW '14) This is a multipart message in MIME format. ------=_NextPart_000_03F4_01CED317.57C1F2C0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Please, find below the extended call for papers for PPREW 2014. Apologies for any duplicates you may receive. Best regards, Todd McDonald, PPREW 2014 co-chair ============================================================================ ============= CALL FOR PAPERS Extended Submission Deadline: 8 November 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 2014) Collocated with Symposium on Principles of Programming Languages (POPL 2014) The US Grant, San Diego, CA January 25, 2014 http://www.pprew.org Important Dates: *********************** Paper Submission: November 8, 2013 Author Notification: December 1, 2013 Camera Ready: December 20, 2013 Workshop Aims: *************** Program protection and reverse engineering are dualisms of good and evil. Beneficial uses of reverse engineering abound: malicious software needs to be analyzed and understood in order to prevent their spread and to assess their functional footprint; owners of intellectual property (IP) at times need to recover lost or unmaintained designs. Conversely, malicious reverse engineering allows illegal copying and subversion and designers can employ obfuscation and tamper-proofing on IP to target various attack vectors. In this sense, protecting IP and protecting malware from detection and analysis is a double-edged sword: depending on the context, the same techniques are either beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become analysis methods that support reverse engineering for illegal activity. PPREW invites papers on practical and theoretical approaches for program protection and reverse engineering used in beneficial contexts, focusing on analysis/deobfuscation of malicious code and methods/tools that hinder reverse engineering. Ongoing work with preliminary results, theoretical approaches, tool-based methods, and empirical studies on various methods are all appropriate. Studies on either hardware/circuit based methods or software/assembly based mechanisms are within scope of the workshop. We expect the workshop to provide exchange of ideas and support for cooperative relationships among researchers in industry and academia. Topics of interest include, but are not limited to the following. - Obfuscation / Deobfuscation - Tamper-proofing / Hardware-based protection - Theoretical proofs for exploitation or protection - Software watermarking / Digital fingerprinting - Reverse engineering tools and techniques - Side channel analysis and vulnerability mitigation - Program / circuit slicing - Information hiding and discovery - Theoretical analysis frameworks: o Abstract Interpretation o Term Rewriting Systems o Machine Learning o Large Scale Boolean Matching - Component / Functional Identification - Program understanding - Source code (static/dynamic) analysis techniques Submission Guidelines: *********************** Original, unpublished manuscripts of up to 12-pages including figures and references must follow the ACM proceedings format. SIGPLAN conference paper templates are available for LaTeX and Word at http://www.sigplan.org/Resources/Author (use the 9 pt template). Submissions must be in PDF. See workshop website ( http://www.pprew.org) for more details. Submitted papers must adhere to the SIGPLAN Re-publication Policy and the ACM Policy on Plagiarism. Concurrent submissions to other conferences, workshops, journals, or similar forums of publication are not allowed. Submissions that do not meet these guidelines may not be considered. All accepted papers will appear in formal proceedings published in the ACM Digital Library Workshop Steering Committee: ****************************** Mila Dalla Preda, University of Verona, Italy J. Todd McDonald, University of South Alabama, USA Arun Lakhotia, University of Louisiana-Lafayette, USA Roberto Giocabazzi, University of Verona, Italy Program Committee: ****************************** Jack Davidson, University of Virginia, USA Saumya Debray, University of Arizona, USA Jean-Yves Marion, Ecole Nationale Superieure des Mines de Nancy (INPL), France Sylvain Guilley, TELECOM-ParisTech, France Natalia Stakhanova, University of New Brunswick, Canada Mathias Payer, University of California-Berkeley, USA Andy King, University of Kent, UK Stacy Prowell, Oak Ridge National Laboratory, USA Guillaume Bonfante, Loria, France ------=_NextPart_000_03F4_01CED317.57C1F2C0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Please, find = below the extended call for papers for PPREW 2014.

Apologies for any duplicates you may receive.

 

Best = regards,

Todd McDonald,

PPREW 2014 co-chair

 

=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D

 

CALL FOR PAPERS

Extended Submi= ssion Deadline: 8 November

3rd ACM SIGPLAN Program Protection and Re= verse Engineering Workshop (PPREW 2014)
Collocated with Symposium on Pri= nciples of Programming Languages (POPL 2014)
The US Grant, San Diego, CA=
January 25, 2014
= http://www.pprew.org

Importan= t Dates:
***********************
Paper Submission:  November 8,= 2013
Author Notification: December 1, 2013
Camera Ready: December 20= , 2013

Workshop Aims:
***************
Program protection and = reverse engineering are dualisms of good and evil. Beneficial uses of rever= se engineering abound: malicious software needs to be analyzed and understo= od in order to prevent their spread and to assess their functional footprin= t; owners of intellectual property (IP) at times need to recover lost or un= maintained designs. Conversely, malicious reverse engineering allows illega= l copying and subversion and designers can employ obfuscation and tamper-pr= oofing on IP to target various attack vectors. In this sense, protecting IP= and protecting malware from detection and analysis is a double-edged sword= : depending on the context, the same techniques are either beneficial or ha= rmful. Likewise, tools that deobfuscate malware in good contexts become ana= lysis methods that support reverse engineering for illegal activity.
PP= REW invites papers on practical and theoretical approaches for program prot= ection and reverse engineering used in beneficial contexts, focusing on ana= lysis/deobfuscation of malicious code and methods/tools that hinder reverse= engineering. Ongoing work with preliminary results, theoretical approaches= , tool-based methods, and empirical studies on various methods are all appr= opriate. Studies on either hardware/circuit based methods or software/assem= bly based mechanisms are within scope of the workshop. We expect the worksh= op to provide exchange of ideas and support for cooperative relationships a= mong researchers in industry and academia.

Topics of interest inclu= de, but are not limited to the following.

- Obfuscation / Deobfuscat= ion
- Tamper-proofing / Hardware-based protection
- Theoretical proof= s for exploitation or protection
- Software watermarking / Digital finge= rprinting
- Reverse engineering tools and techniques
- Side channel a= nalysis and vulnerability mitigation
- Program / circuit slicing
- In= formation hiding and discovery
- Theoretical analysis frameworks:
&nb= sp; o Abstract Interpretation
  o Term Rewriting Systems
  = o Machine Learning
  o Large Scale Boolean Matching
- Component = / Functional Identification
- Program understanding
- Source code (st= atic/dynamic) analysis techniques

Submission Guidelines:
*******= ****************
Original, unpublished manuscripts of up to 12-pages inc= luding figures and references must follow the ACM proceedings format. SIGPL= AN conference paper templates are available for LaTeX and Word at http://www.sigplan.org/Resources/Author (use th= e 9 pt template). Submissions must be in PDF. See workshop website (htt= p://www.pprew.org) for more details.
 
Submitted pap= ers must adhere to the SIGPLAN Re-publication Policy and the ACM Policy on = Plagiarism. Concurrent submissions to other conferences, workshops, journal= s, or similar forums of publication are not allowed. Submissions that do no= t meet these guidelines may not be considered.

All accepted papers w= ill appear in formal proceedings published in the ACM Digital Library
&n= bsp;
Workshop Steering Committee:
******************************
M= ila Dalla Preda, University of Verona, Italy

J. Todd McDonald, University of South Alabama, USA

=

Arun Lakhotia, University = of Louisiana-Lafayette, USA
Roberto Giocabazzi, University of Verona, It= aly

Program Committee:
******************************
Jack Dav= idson, University of Virginia, USA

Saumya Debray, University of Arizona, USAJean-Yves Marion, Ecole Nationale Superieure des Mines de Nancy (INPL), Fr= ance
Sylvain Guilley, TELECOM-ParisTech, France
Natalia Stakhanova, U= niversity of New Brunswick, Canada

Mathias Payer, University of California-Berke= ley, USA
Andy King, University of Kent, UK
Stacy Prowell, Oak Ridge N= ational Laboratory, USA

Guillaume Bonfante, Loria, France=

 

= ------=_NextPart_000_03F4_01CED317.57C1F2C0--