From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail1-relais-roc.national.inria.fr (mail1-relais-roc.national.inria.fr [192.134.164.82]) by sympa.inria.fr (Postfix) with ESMTPS id 2D9E57EDD9 for ; Mon, 8 Oct 2012 15:52:16 +0200 (CEST) X-IronPort-AV: E=Sophos;i="4.80,554,1344204000"; d="scan'208";a="176283977" Received: from sympa.inria.fr ([193.51.193.213]) by mail1-relais-roc.national.inria.fr with ESMTP; 08 Oct 2012 15:52:16 +0200 Received: by sympa.inria.fr (Postfix, from userid 20132) id 17FD87EDDA; Mon, 8 Oct 2012 15:52:16 +0200 (CEST) To: caml-list@inria.fr Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT From: X-Mailer: Sympa 6.1.7 Date: Mon, 8 Oct 2012 15:52:15 +0200 (CEST) Subject: [Caml-list] EXTENDED DEADLINE: Program Protection and Reverse Engineering Workshop (PPREW '13) CALL FOR PAPERS (Extended Submission Deadline: 11 October) 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 2013) Co-Located with Symposium on Principles of Programming Languages (POPL 2013) Parco dei Principi Hotel, Rome, Italy January 26, 2013 http://www.pprew.org Sponsored by the Digital Asset Protection Association (DAPA) Important Dates: *********************** Paper Submission: October 11, 2012 Author Notification: November 1, 2012 Camera Ready: November 13, 2012 Workshop Aims: *************** Program protection and reverse engineering are dualisms of good and evil. Beneficial uses of reverse engineering abound: malicious software needs to be analyzed and understood in order to prevent their spread and to assess their functional footprint; owners of intellectual property (IP) at times need to recover lost or unmaintained designs. Conversely, malicious reverse engineering allows illegal copying and subversion and designers can employ obfuscation and tamper-proofing on IP to target various attack vectors. In this sense, protecting IP and protecting malware from detection and analysis is a double-edged sword: depending on the context, the same techniques are either beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become analysis methods that support reverse engineering for illegal activity. PPREW invites papers on practical and theoretical approaches for program protection and reverse engineering used in beneficial contexts, focusing on analysis/deobfuscation of malicious code and methods/tools that hinder reverse engineering. Ongoing work with preliminary results, theoretical approaches, tool-based methods, and empirical studies on various methods are all appropriate. Studies on either hardware/circuit based methods or software/ assembly based mechanisms are within scope of the workshop. We expect the workshop to provide exchange of ideas and support for cooperative relationships among researchers in industry and academia. Topics of interest include, but are not limited to the following. - Obfuscation / Deobfuscation - Tamper-proofing / Hardware-based protection - Theoretical proofs for exploitation or protection - Software watermarking / Digital fingerprinting - Reverse engineering tools and techniques - Side channel analysis and vulnerability mitigation - Program / circuit slicing - Information hiding and discovery - Theoretical analysis frameworks: o Abstract Interpretation o Term Rewriting Systems o Machine Learning o Large Scale Boolean Matching - Component / Functional Identification - Program understanding - Source code (static/dynamic) analysis techniques Best Paper Awards: ********************** There will be a best paper award to acknowledge the scientific quality of the best contribution. Workshop Keynote Addresses: ******************************* PPREW-2013 is fortunate to have two industry leaders address the workshop: Andrew Wajs, Chief Technology Officer of Irdeto Dr. Mihai Christodorescu, IBM Research Submission Guidelines: *********************** Original, unpublished manuscripts of up to 12-pages including figures and references must follow the ACM proceedings format. SIGPLAN conference paper templates are available for LaTeX and Word at http://www.sigplan.org/Resources/Author (use the 9 pt template). Submissions must be in PDF. See workshop website (http://www.pprew.org) for more details. Submitted papers must adhere to the SIGPLAN Re-publication Policy and the ACM Policy on Plagiarism. Concurrent submissions to other conferences, workshops, journals, or similar forums of publication are not allowed. Submissions that do not meet these guidelines may not be considered. All accepted papers will appear in formal proceedings published by ACM Press. Workshop Co-Chairs: ******************** J. Todd McDonald, University of South Alabama, USA Mila Dalla Preda, University of Bologna, Italy Program Committee: ****************************** Saumya Debray, University of Arizona, USA Bjorn De Sutter, University of Ghent, Belgium Sergio Maffeis, Imperial College London, UK Stefano Zanero, Unversity of Milano, Italy Jean-Yves Maryon, Ecole Nationale Superieure des Mines de Nancy (INPL), France Sylvain Guilley, TELECOM-ParisTech, France Clark Thomborson, University of Auckland, New Zealand Mihai Christodorescu, IBM, USA Natalia Stakhanova, University of New Brunswick, Canada Johannes Kinder, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland Andy King, University of Kent, UK Christopher Kruegel, University of California, USA Yuan Xiang Gu, IRDETO, Canada Moti Yung, Google, USA Juan Caballero, IMDEA Software, Spain