From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id 835C17FE36 for ; Wed, 29 Jun 2016 18:05:12 +0200 (CEST) IronPort-PHdr: 9a23:r7cs6xBpC6fUeW5Nc5NPUyQJP3N1i/DPJgcQr6AfoPdwSP7/pMbcNUDSrc9gkEXOFd2CrakV06yP7uuxAiQp2tWoiDg6aptCVhsI2409vjcLJ4q7M3D9N+PgdCcgHc5PBxdP9nC/NlVJSo6lPwWB6kO74TNaIBjjLw09fr2zQd+KyZ3qnLHps7ToICxwzAKnZr1zKBjk5S7wjeIxxbVYF6Aq1xHSqWFJcekFjUlhJFaUggqurpzopM0roGxsvKd1/MdFVeD+fr8kZb1eFjUvdW4vsp7Frx7GGEGz4XcQGkAdvh1OCgzJplmuXIv0uSf9sON51AGBOtDqTbkwUD6r6q4tRRP13nRUfwUl+X3a35QjxJlQpwis8kRy Authentication-Results: mail2-smtp-roc.national.inria.fr; spf=None smtp.pra=jtmcdonald@southalabama.edu; spf=Pass smtp.mailfrom=jtmcdonald@southalabama.edu; spf=None smtp.helo=postmaster@mail-qk0-f196.google.com Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=pra; client-ip=209.85.220.196; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: Pass (mail2-smtp-roc.national.inria.fr: domain of jtmcdonald@southalabama.edu designates 209.85.220.196 as permitted sender) identity=mailfrom; client-ip=209.85.220.196; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-qk0-f196.google.com) identity=helo; client-ip=209.85.220.196; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="postmaster@mail-qk0-f196.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BIBgDT8HNXdMTcVdFagnCBJH2kfY9LgnKEChcBCoI+hGg8EAEBAQEBAQEBEQEKCxQfMYIygiEIAggLEBMBAR4GAgUFCAwFG00bAQUBAQ0PAQQcAgUSiA4OpXiBMT4xilSFKgEBBYgHAVKDBAEBAQcBAQEBGwgQjwGCbQtAgkeOdYoEEQGBWoQtiSiISIVpAo5EMIEPNYJagVNQAYd5gUQBAQE X-IPAS-Result: A0BIBgDT8HNXdMTcVdFagnCBJH2kfY9LgnKEChcBCoI+hGg8EAEBAQEBAQEBEQEKCxQfMYIygiEIAggLEBMBAR4GAgUFCAwFG00bAQUBAQ0PAQQcAgUSiA4OpXiBMT4xilSFKgEBBYgHAVKDBAEBAQcBAQEBGwgQjwGCbQtAgkeOdYoEEQGBWoQtiSiISIVpAo5EMIEPNYJagVNQAYd5gUQBAQE X-IronPort-AV: E=Sophos;i="5.26,547,1459807200"; d="scan'208,217";a="224737619" Received: from mail-qk0-f196.google.com ([209.85.220.196]) by mail2-smtp-roc.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 29 Jun 2016 18:05:10 +0200 Received: by mail-qk0-f196.google.com with SMTP id j2so10695839qkf.1 for ; Wed, 29 Jun 2016 09:05:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=southalabama-edu.20150623.gappssmtp.com; s=20150623; h=from:to:subject:date:message-id:mime-version:thread-index :content-language; bh=s63Ik3nDu9OBm9rkDdJg1YK8ArueFA7hJw+DWfXc0G0=; b=ms4qrgPm2WkL7QWB7DB7D0Lt2HSJqWKDT+4dgQMYv83Y4oOSAAn7XAOtd6b/UJ+Qv1 4MmPJ/iep1OG+BCICGIKAtBF//7Xk7oumG0fP86Ht31cIbP7oZcqwZpP65b6V7yRzvcr fBW35ejd/RzcCIPMNkJ5ALWyn72YV2AoatU1s+/HVG6o0yCkxzVU1Dv190jbj4bHck6J nTAyVPVo4P/uecyOTHDRg0tQq8hc1uzXOtYQoj9eE2y/dpSVOuFD95AXfetzHyhBlga+ yEelPWIXpFw/vG/XXi41U20TECTJ8VUOBRDX4Fcy0a8u0PNNrKpUSJdub+GBaTAYXiAO BSQg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :thread-index:content-language; bh=s63Ik3nDu9OBm9rkDdJg1YK8ArueFA7hJw+DWfXc0G0=; b=AZHF+KzYXo/nGkWnbZ5oFSS4Pat8Nf3dkyiAxne6F/pw23cDe5NVa7hPHa4okI19i8 lCrQwZ8TCSmb7nqEjNjXMaTQ2ja9kXdGSYBRfUMJrdlqoptp90NCUg9xhPBsRt0wxeeS 5zE3TiYbWmEwb2Xd3ptcqIFtXAqgEtOfas7c7nTcA59ToN6oe1sFP9Fo0Mr8YiwjhB64 6NUKYLGPO75ZykR4/zD36Yzbwh1/zC74eP4OgmeLxNDTCVOaNJ8x6Xrb6SntQY1ko3TG IkySoJz54r+dbmt7sFz1ojsMHPe3+hk0QCsmSwCrw7a+d5Ue1SnV3xTpt14fcU2J0Omi pwMA== X-Gm-Message-State: ALyK8tJ0QzZjKsXxnXkT6weg5A4g4RBtRTWKWOMddwCsf34MU06Y/T7YecvzOMaHJMzN1b1j X-Received: by 10.129.53.139 with SMTP id c133mr4226691ywa.259.1467216309166; Wed, 29 Jun 2016 09:05:09 -0700 (PDT) Received: from BANGOR (173-17-45-186.client.mchsi.com. [173.17.45.186]) by smtp.gmail.com with ESMTPSA id h9sm1961358ywb.27.2016.06.29.09.05.08 for (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 29 Jun 2016 09:05:08 -0700 (PDT) From: "Todd McDonald" To: Date: Wed, 29 Jun 2016 11:05:13 -0500 Message-ID: <030201d1d220$0520ff10$0f62fd30$@southalabama.edu> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0303_01D1D1F6.1C4BE170" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdHSIASrIGSVRr4iQ7+GGO5aAAt2Pg== Content-Language: en-us Subject: [Caml-list] CFP: 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW) This is a multipart message in MIME format. ------=_NextPart_000_0303_01D1D1F6.1C4BE170 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit CALL FOR PAPERS ================================================================== 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW) Hilton Los Angeles/Universal City, Los Angeles, CA December 5-6, 2016 Collocated with ACSAC 2016 ================================================================== Venue: https://www.acsac.org/ Workshop: http://www.ssprew.org/ The 6th Software Security, Protection, and Reverse Engineering Workshop is now a consolidated workshop that merges into one venue the Program Protection and Reverse Engineering Workshop (PPREW) and the Software Security and Protection Workshop (SSP), which both started in 2011. Software security is a discipline that lies at the crossroads of security, cryptography, networks, software engineering, computer architecture, operating systems, and compiler design. Program protection and reverse engineering techniques both find their practical use in malware research and analysis as well as legitimate protection schemes for intellectual property and commercial software. The joint workshop will focus on how to protect software from tampering, reverse engineering, and piracy. Strongly encouraged are proposals of new, speculative ideas; evaluations of new or known techniques in practical settings; and discussions of emerging threats and problems in metrics, tools, and procedures for evaluating tamperproofing, watermarking, obfuscation, birthmarking, and protection algorithms in general. Likewise, reverse engineering of low-level constructs such as machine code or gate-level circuit definitions through static and dynamic analysis is geared to recover higher levels of abstract information to determine a program's function as well as to classify it with existing similar code (which is typically malicious). Both program protection and reverse engineering techniques are utilized for legitimate and illegal purposes. Theoretically, protection is seen as impossible in the general case but the promise of mathematically based transformations with rigorous cryptographic properties is an area of active interest. Given enough time and resources, reverse engineering and de-obfuscation is assumed to be achievable. Important Deadlines: . Submission: Aug. 28, 2016 . Notification of Acceptance: Oct. 3, 2016 . Camera-ready: Nov. 12, 2016 . Workshop: Dec. 5-6, 2016 Topics of interest include, but are not limited to the following. . Security modelling . Protection metrics and measurements . Obfuscation / Deobfuscation . Tamper-proofing . Watermarking / Digital fingerprinting . Reverse engineering tools and techniques . Program / circuit slicing . Information hiding and discovery . Hardware-based protections . Source code analysis / program understanding . Forensic analysis and protections . Virtualization for protection and/or analysis . New cutting-edge protection technologies . Diversity metrics and measurements . Man-at-the-end (MATE) attack technologies . MATE characterization . Theoretic Analysis Frameworks: -- Abstract Interpretation -- Term Rewriting Systems -- Machine Learning -- Large Scale Boolean Matching -- Homomorphic Encryption . User interface design for controlling protection . Static/dynamic analysis techniques . Moving target and active cyber defense . Protection profiling, verification, and evaluation SSPREW will provide a discussion forum for researchers that are exploring theoretical definitions and frameworks, implementing and using practical methods and empirical studies, and those developing new tools or techniques in this unique area of security. The workshop has historically provided exchange of ideas and support for cooperative relationships among researchers in industry, academia, and government. Submission Guidelines: Original, unpublished manuscripts of up to 12-pages including figures and references must follow the ACM SIG proceedings format. Papers will be published through ACM International Conference Proceedings Series (ICPS) and available in the ACM Digital Library. Submission is through EasyChair: https://easychair.org/conferences/?conf=ssprew6 See workshop website (http://www.ssprew.org) for more details. Program Co-Chairs: Mila Dalla Preda, Univ of Verona, Italy Natalia Stakhanova, Univ of New Brunswick, Canada General Workshop Chair: J. Todd McDonald, Univ of South Alabama, USA ------=_NextPart_000_0303_01D1D1F6.1C4BE170 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

CALL FOR PAPERS<= o:p>

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D

6th Software Security, Protect= ion, and Reverse Engineering Workshop (SSPREW)

Hilton Los Angeles/Universal City, Los Angeles, CA

December 5-6, 2016

Col= located with ACSAC 2016

=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Venue:= https://www.acsac.org/

Workshop: http:= //www.ssprew.org/

 

=

The 6th Software Security, Protection, and Reverse Eng= ineering Workshop is now a consolidated workshop that merges into one venue= the Program Protection and Reverse Engineering Workshop (PPREW) and the So= ftware Security and Protection Workshop (SSP), which both started in 2011.&= nbsp; Software security is a discipline that lies at the crossroads of secu= rity, cryptography, networks, software engineering, computer architecture, = operating systems, and compiler design. Program protection and reverse engi= neering techniques both find their practical use in malware research and an= alysis as well as legitimate protection schemes for intellectual property a= nd commercial software.   The joint workshop will focus on how to= protect software from tampering, reverse engineering, and piracy. Strongly= encouraged are proposals of new, speculative ideas; evaluations of new or = known techniques in practical settings; and discussions of emerging threats= and problems in metrics, tools, and procedures for evaluating tamperproofi= ng, watermarking, obfuscation, birthmarking, and protection algorithms in g= eneral. Likewise, reverse engineering of low-level constructs such as machi= ne code or gate-level circuit definitions through static and dynamic analys= is is geared to recover higher levels of abstract information to determine = a program’s function as well as to classify it with existing similar = code (which is typically malicious).  Both program protection and reve= rse engineering techniques are utilized for legitimate and illegal purposes= .  Theoretically, protection is seen as impossible in the general case= but the promise of mathematically based transformations with rigorous cryp= tographic properties is an area of active interest.  Given enough time= and resources, reverse engineering and de-obfuscation is assumed to be ach= ievable.

 

Important Deadlines:

•= ;  Submission: Aug. 28, 2016

̶= 6;  Notification of Acceptance: Oct. 3, 2016

•  Camera-ready: Nov. 12, 2016

•  Workshop: Dec. 5-6, 2016

 

Topics of interest i= nclude, but are not limited to the following.

•  Security modelling

&= #8226;  Protection metrics and measurements

•  Obfuscation / Deobfuscation

•  Tamper-proofing

•  Watermarking / Digital fingerprinting

•  Reverse engineering tools and techniques<= /o:p>

•  Program / circuit slicing<= /o:p>

•  Information hiding and discover= y

•  Hardware-based protectio= ns

•  Source code analysis / = program understanding

•  Fore= nsic analysis and protections

•&nb= sp; Virtualization for protection and/or analysis

•  New cutting-edge protection technologies=

•  Diversity metrics and measurements

•  Man-at-the-end (MATE) attac= k technologies

•  MATE charac= terization

•  Theoretic Analy= sis Frameworks:

    -- Ab= stract Interpretation

   = -- Term Rewriting Systems

  &= nbsp; -- Machine Learning

  &n= bsp; -- Large Scale Boolean Matching

&nb= sp;   -- Homomorphic Encryption

•  User interface design for controlling protection=

•  Static/dynamic analysis techniques

•  Moving target and active cy= ber defense

•  Protection pro= filing, verification, and evaluation

 

SSPREW will provide a discussion for= um for researchers that are exploring theoretical definitions and framework= s, implementing and using practical methods and empirical studies, and thos= e developing new tools or techniques in this unique area of security. The w= orkshop has historically provided exchange of ideas and support for coopera= tive relationships among researchers in industry, academia, and government.=

Su= bmission Guidelines:  Original, unpublished manuscripts of up to 12-pa= ges including figures and references must follow the ACM SIG proceedings fo= rmat. Papers will be published through ACM International Conference Proceed= ings Series (ICPS) and available in the ACM Digital Library.

=

 

Submission i= s through EasyChair: https://easychair.org/conferences/?conf=3Dssprew6 = ;

See workshop website (http://www.sspr= ew.org) for more details.

 

Program Co-Chairs:

Mila Dalla Preda, Univ of Verona, Italy

Natalia Stakhanova, Univ of New Brunswick, Canada

 

General Workshop= Chair:

J. Todd McDonald, Univ of South = Alabama, USA

 

= = ------=_NextPart_000_0303_01D1D1F6.1C4BE170--