From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 8CBE67EE4B for ; Tue, 8 Oct 2013 20:19:06 +0200 (CEST) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=pra; client-ip=209.85.213.51; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=mailfrom; client-ip=209.85.213.51; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-yh0-f51.google.com) identity=helo; client-ip=209.85.213.51; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="postmaster@mail-yh0-f51.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: ArsBAPdLVFLRVdUzm2dsb2JhbABZDoMxRgEBwlEWDgEBAQEBBgsLCRQogiwIAhMdGwsGAgUFFAVoGwEFAQEcAQQcAgWHdgyZPYMElSeJFI4DhWkDiTmFW4UQhCSPTkGED12BSg X-IPAS-Result: ArsBAPdLVFLRVdUzm2dsb2JhbABZDoMxRgEBwlEWDgEBAQEBBgsLCRQogiwIAhMdGwsGAgUFFAVoGwEFAQEcAQQcAgWHdgyZPYMElSeJFI4DhWkDiTmFW4UQhCSPTkGED12BSg X-IronPort-AV: E=Sophos;i="4.90,1057,1371074400"; d="scan'208";a="29563931" Received: from mail-yh0-f51.google.com ([209.85.213.51]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/RC4-SHA; 08 Oct 2013 20:19:05 +0200 Received: by mail-yh0-f51.google.com with SMTP id 29so980893yhl.38 for ; Tue, 08 Oct 2013 11:19:04 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-type:content-transfer-encoding:thread-index :content-language; bh=xcBdDHS7yRFxYKuaqRCYjdGf5LEVxuQ1XD38GYgXLhg=; b=GthngFKpNRXSCbsjexuhh1ecq+A/OzPqbhRaNjduE06p8J40cHSz7zC7DKOB1JWfPJ BjcRaqOX3A92x0IbZWZKoGMiexT0EpNv1XtwrerAfuJWOzEHKdIKOdwAnMK0g73qnGZy JM54QI6a1DoM5qhR+y1ubIrRRdA0eSKyFv+dxOt8elsoIKOqAnm3bTZItA2+qQWQiVt5 3P7Fi5clDwpLetNEEIszUymxpWa24vqhs67TP1eBLFxsiie2s3bk2irBiGGUXxIzQ1lS Gqc39HZvzeRMnLg3Dort+VSGkGF891iYwLO4ILpvhocxzUWpkeQK0ITbhm7JoZ3LM6j3 EFxQ== X-Gm-Message-State: ALoCoQl2rNXz/2s9+2nnAy+nyDQXpvVIArRB5URlmwZkrIlRY/ocXLQoLU6qkaWo3MFTfcnIkkzP X-Received: by 10.236.73.1 with SMTP id u1mr1847118yhd.91.1381256343892; Tue, 08 Oct 2013 11:19:03 -0700 (PDT) Received: from ZION (173-21-70-194.client.mchsi.com. [173.21.70.194]) by mx.google.com with ESMTPSA id 48sm54045546yhq.11.1969.12.31.16.00.00 (version=TLSv1 cipher=RC4-SHA bits=128/128); Tue, 08 Oct 2013 11:19:02 -0700 (PDT) From: "Todd McDonald" To: Date: Tue, 8 Oct 2013 13:19:03 -0500 Message-ID: <0ada01cec452$dea94280$9bfbc780$@southalabama.edu> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: Ac7EUlZ/VQ8UN2uWQaCVe7otmPAUOQ== Content-Language: en-us Subject: [Caml-list] CFP: Program Protection and Reverse Engineering Workshop Please, find below the call for papers for PPREW 2014. Please forward these to anyone you think may be interested. Apologies for any duplicates you may receive. Best regards, Todd McDonald, PPREW 2014 co-chair CALL FOR PAPERS ============================================================= 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 2014) Collocated with Symposium on Principles of Programming Languages (POPL 2014) The US Grant, San Diego, CA January 25, 2014 Website: http://www.pprew.org ============================================================= Important Dates: *********************** Paper Submission: October 25, 2013 Author Notification: November 15, 2013 Camera Ready: December 15, 2013 Workshop Aims: *********************** Program protection and reverse engineering are dualisms of good and evil. Beneficial uses of reverse engineering abound: malicious software needs to be analyzed and understood in order to prevent their spread and to assess their functional footprint; owners of intellectual property (IP) at times need to recover lost or unmaintained designs. Conversely, malicious reverse engineering allows illegal copying and subversion and designers can employ obfuscation and tamper-proofing on IP to target various attack vectors. In this sense, protecting IP and protecting malware from detection and analysis is a double-edged sword: depending on the context, the same techniques are either beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become analysis methods that support reverse engineering for illegal activity. PPREW invites papers on practical and theoretical approaches for program protection and reverse engineering used in beneficial contexts, focusing on analysis/deobfuscation of malicious code and methods/tools that hinder reverse engineering. Ongoing work with preliminary results, theoretical approaches, tool-based methods, and empirical studies on various methods are all appropriate. Studies on either hardware/circuit based methods or software/assembly based mechanisms are within scope of the workshop. We expect the workshop to provide exchange of ideas and support for cooperative relationships among researchers in industry and academia. Topics of interest include, but are not limited to the following: - Obfuscation / Deobfuscation - Tamper-proofing / Hardware-based protection - Theoretical proofs for exploitation or protection - Software watermarking / Digital fingerprinting - Reverse engineering tools and techniques - Side channel analysis and vulnerability mitigation - Program / circuit slicing - Information hiding and discovery - Theoretical analysis frameworks: o Abstract Interpretation o Term Rewriting Systems o Machine Learning o Large Scale Boolean Matching - Component / Functional Identification - Program understanding - Source code (static/dynamic) analysis techniques Publication: *********************** Accepted papers will be published in the ACM Digital Library. Submission Guidelines: *********************** Original, unpublished manuscripts of up to 12-pages including figures and references must follow the ACM proceedings format. SIGPLAN conference paper templates are available for LaTeX and Word at http://www.sigplan.org/Resources/Author (use the 9 pt template). Submissions must be in PDF. See workshop website (http://www.pprew.org) for more details. Submitted papers must adhere to the SIGPLAN Re-publication Policy and the ACM Policy on Plagiarism. Concurrent submissions to other conferences, workshops, journals, or similar forums of publication are not allowed. Submissions that do not meet these guidelines may not be considered. Steering Committee: *********************** J. Todd McDonald, University of South Alabama, USA Mila Dalla Preda, University of Verona, Italy Arun Lakhotia, University of Louisiana-Lafayette, USA Roberto Giocabazzi, University of Verona, Italy Program Committee: *********************** Saumya Debray, University of Arizona, USA Jean-Yves Marion, INPL, France Sylvain Guilley, TELECOM-ParisTech, France Jack Davidson, University of Virginia, USA Mathias Payer, University of California-Berkeley, USA Andy King, University of Kent, UK Guillaume Bonfante, Loria, France Natalia Stakhanova, University of New Brunswick, Canada