From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 172777F75C for ; Mon, 11 Aug 2014 20:11:37 +0200 (CEST) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=pra; client-ip=209.85.213.50; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of jtmcdonald@southalabama.edu) identity=mailfrom; client-ip=209.85.213.50; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="jtmcdonald@southalabama.edu"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-yh0-f50.google.com) identity=helo; client-ip=209.85.213.50; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="jtmcdonald@southalabama.edu"; x-sender="postmaster@mail-yh0-f50.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AssBAJwG6VPRVdUylGdsb2JhbABagkeBGK8RnkUBCYdIgR0WEAEBAQEHCwsJEiuECggCCAsQKAsGAgUFFAVoGwEFAQEcAQQcAgUSiCAFCJ4Ngxhqm1aFCRcKjmoEUIJDD0SBQQWGD4ULg2yCE1eDToI5hQmLMIcIQYUrToEF X-IPAS-Result: AssBAJwG6VPRVdUylGdsb2JhbABagkeBGK8RnkUBCYdIgR0WEAEBAQEHCwsJEiuECggCCAsQKAsGAgUFFAVoGwEFAQEcAQQcAgUSiCAFCJ4Ngxhqm1aFCRcKjmoEUIJDD0SBQQWGD4ULg2yCE1eDToI5hQmLMIcIQYUrToEF X-IronPort-AV: E=Sophos;i="5.01,843,1400018400"; d="scan'208,217";a="74532902" Received: from mail-yh0-f50.google.com ([209.85.213.50]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/RC4-SHA; 11 Aug 2014 20:11:35 +0200 Received: by mail-yh0-f50.google.com with SMTP id v1so6658040yhn.9 for ; Mon, 11 Aug 2014 11:11:34 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-type:thread-index:content-language; bh=E0HtqgaoPdpx9bLV0eYdDF6Y4Ww7F2zfmCb7ltW8P1A=; b=AzTlW0KaDkjIDeudZWdB0nOhiKjse9WoMfDlWKpdtiFAR1HW6r8KIViX+yBEiRkTaO 4UGWrAPuoI8ReC3uqARKA23nxGBNKIBRJq9uHetBMdV9p+v4KRN9QW+sKjukY63GFyPq bywe5I+fHBex/Rud8+E8iobmNpHvKde7EHpeau1bYpa0c/8H1kWQHqE+P09pkieY1Csc 3SZje3ahAls2CwioY+HkUymxnjEuOKog9PS7wDF4Y0CctRPZX4c1UdtQY5RrLIqoUmgj aH/9kR4lbuLgMHdGDisazI+lvfa7xVGBpofAsXjqBlX3FdQeCqS3mP9PpiU/vzzGTfSj /UlQ== X-Gm-Message-State: ALoCoQkxFvidViT7q/QmdP33C4ScDtuv2a3fgN4n6pb8Vn2xrxRO+6rofuOuBhc5Q6nDmEllHhJc X-Received: by 10.236.82.147 with SMTP id o19mr45740465yhe.112.1407780693989; Mon, 11 Aug 2014 11:11:33 -0700 (PDT) Received: from ZION (173-21-70-194.client.mchsi.com. [173.21.70.194]) by mx.google.com with ESMTPSA id k106sm24994655yhq.49.2014.08.11.11.11.33 for (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 11 Aug 2014 11:11:33 -0700 (PDT) From: "Todd McDonald" To: Date: Mon, 11 Aug 2014 13:11:38 -0500 Message-ID: <034801cfb58f$b1e09530$15a1bf90$@southalabama.edu> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0349_01CFB565.C90CFE30" X-Mailer: Microsoft Outlook 14.0 thread-index: Ac+1jc4w6I+rNgr/SKi2pE2ft/rp5g== Content-Language: en-us Subject: [Caml-list] CFP: 4th Program Protection and Reverse Engineering Workshop (PPREW) This is a multipart message in MIME format. ------=_NextPart_000_0349_01CFB565.C90CFE30 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Apologies for cross-posting --------------------------- CALL FOR PAPERS ---------------------------------------------------------------------------- ----- 4th Program Protection and Reverse Engineering Workshop (PPREW-4) Hyatt French Quarter New Orleans, LA December 09, 2014 Website: http://www.pprew.org Co-Located with: Annual Computer Security Applications Conference (ACSAC) 2014 Website: https://www.acsac.org/ ---------------------------------------------------------------------------- ----- Important Dates: *********************** Paper Submission: October 10, 2014 Author Notification: November 10, 2014 Camera Ready: November 28, 2014 Workshop: 09 December, 2014 Workshop Aims: *************** Program protection and reverse engineering are dualisms of good and evil. Beneficial uses of reverse engineering abound: malicious software needs to be analyzed and understood in order to prevent their spread and to assess their functional footprint; owners of intellectual property (IP) at times need to recover lost or unmaintained designs. Conversely, malicious reverse engineering allows illegal copying and subversion; designers can employ obfuscation and tamper-proofing on IP to target various attack vectors. In this sense, protecting IP and protecting malware from detection and analysis is a double-edged sword: depending on the context, the same techniques are either beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become analysis methods that support reverse engineering for illegal activity. PPREW invites papers on practical and theoretical approaches for program protection and reverse engineering used in beneficial contexts, focusing on analysis/ deobfuscation of malicious code and methods/tools that hinder reverse engineering. Ongoing work with preliminary results, theoretical approaches, tool-based methods, and empirical studies on various methods are all appropriate. Studies on hardware/circuit based methods or software/assembly based mechanisms are within scope of the workshop. We expect the workshop to provide exchange of ideas and support for cooperative relationships among researchers in industry, academia, and government. Topics of interest include, but are not limited, to the following: - Obfuscation / Deobfuscation (polymorphism) - Tamper-proofing / Hardware-based protection - Theoretic proofs for exploitation or protection - Software watermarking / Digital fingerprinting - Reverse engineering tools and techniques - Side channel analysis and vulnerability mitigation - Program / circuit slicing - Information hiding and discovery - Virtualization for protection and/or analysis - Forensic and anti-forensic protection - Moving target and active cyber defense - Theoretic analysis frameworks: o Abstract Interpretation o Homomorphic Encryption o Term Rewriting Systems o Machine Learning o Large Scale Boolean Matching - Component / Functional Identification - Program understanding - Source code (static/dynamic) analysis techniques Submission Guidelines: *********************** Original, unpublished manuscripts of up to 12-pages including figures and references must follow the ACM SIG proceedings format. SIGPLAN conference paper templates are available for LaTeX and Word at: http://www.acm.org/sigs/publications/proceedings-templates. Submissions must be in PDF. Submitted papers must adhere to the SIGPLAN Re-publication Policy and the ACM Policy on Plagiarism. Concurrent submissions to other conferences, workshops, journals, or similar forums of publication are not allowed. Submissions that do not meet these guidelines may not be considered. The URL for submission is through Easy Chair: https://easychair.org/conferences/?conf=pprew4 Publication: ******************** Arrangements for publication of accepted and presented papers at PPREW are currently underway. Program Chairs: ******************** .Mila Dalla Preda, University of Verona, Italy .J. Todd McDonald, University of South Alabama, USA Proceedings Chair: ******************** .Natalia Stakhanova, University of New Brunswick, Canada Program Committee: ******************** .Saumya Debray, University of Arizona, USA .Stephen Magill, Galois, USA .Frederico Maggi, University of Milan, Italy .Andy King, University of Kent, UK .Natalia Stakhanova, University of New Brunswick, Canada .Guillaume Bonfante, Loria, France .Todd Andel, University of South Alabama, USA .Yuan Xiang Gu, IRDETO, Canada .Clark Thomborson, University of Auckland .Johannes Kinder, Royal Holloway, University of London, UK .Michael Grimaila, Air Force Institute of Technology, USA .William Mahoney, University of Nebraska Omaha, USA .Mathias Payer, University of California-Berkeley, USA .Bjorn De Sutter, Unviversity of Ghent, Belgium .Mihai Christodorescu, Qualcomm Reseach-IBM Research, USA .Sergio Maffeis, Imperial College London, UK .Jean-Yves Marion, INPL, France Steering Committee: ******************** .Arun Lakhotia, University of Louisiana-Lafayette, USA .Roberto Giocabazzi, University of Verona, Italy .J. Todd McDonald, University of South Alabama, USA .Mila Dalla Preda, University of Verona, Italy ------=_NextPart_000_0349_01CFB565.C90CFE30 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Apologies for= cross-posting

----------------------= -----

 

 

CALL FOR PAPERS

-------------------------------------------= --------------------------------------

4th Program Protection and Reverse Engineering Workshop (PPREW-4)

Hyatt French Quarter   =

New Orleans, LA  

December 09, 2014

Website: http://www.pprew.org &n= bsp;

 

Co-Located with:

Annu= al Computer Security Applications Conference (ACSAC) 2014

Website: https://ww= w.acsac.org/

--------------------= -------------------------------------------------------------

Important = Dates:  

*****************= ******    

Paper= Submission: October 10, 2014    

Author Notification: November 10, 2014   &= nbsp;      

Camera Ready: November 28, 2014  

Workshop: 09 December, 2014  

     

Workshop Aims:    

***************  

Program protection and reverse engineering are dualisms of good = and evil.  

Beneficial use= s of reverse engineering abound: malicious software needs to be  =

analyzed and understood in order to= prevent their spread and to assess their

functional footprint; owners of intellectual property (IP) at times ne= ed to

recover lost or unmaintained de= signs. Conversely, malicious reverse engineering

allows illegal copying and subversion;  designers can empl= oy obfuscation and

tamper-proofing on= IP to target various attack vectors. In this sense,

protecting IP and protecting malware from detection and ana= lysis is a

double-edged sword: depend= ing on the context, the same techniques are either

beneficial or harmful. Likewise, tools that deobfuscate mal= ware in good contexts

become analysis= methods that support reverse engineering for illegal activity.<= /p>

PPREW in= vites papers on practical and theoretical approaches for   &= nbsp;

program protection and reverse= engineering used in beneficial contexts,    

focusing on analysis/ deobfuscation of malici= ous code and methods/tools  

that hinder reverse engineering. Ongoing work with preliminary results,&= nbsp; 

theoretical approaches, = tool-based methods, and empirical studies on various

methods are all appropriate. Studies on hardware/circuit ba= sed methods or

software/assembly base= d mechanisms are within scope of the workshop. We expect

the workshop to provide exchange of ideas and support f= or cooperative

relationships among re= searchers in industry, academia, and government.  

     

Topics of interest include, but are not limited, to the = following:  

- Obfuscation= / Deobfuscation (polymorphism)

- Tam= per-proofing / Hardware-based protection  

- Theoretic proofs for exploitation or protection &nb= sp;

- Software watermarking / Digita= l fingerprinting  

- Rever= se engineering tools and techniques

-= Side channel analysis and vulnerability mitigation   =

- Program / circuit slicing  

- Information hiding and discovery &nb= sp;

- Virtualization for protection = and/or analysis

- Forensic and anti-f= orensic protection

- Moving target an= d active cyber defense

- Theoretic an= alysis frameworks:

o Abstract Interp= retation  

 o Homomor= phic Encryption

o Term Rewriting Sys= tems  

 o Machine Lea= rning  

 o Large Scal= e Boolean Matching

- Component / Func= tional Identification

- Program under= standing

- Source code (static/dynami= c) analysis techniques  

<= o:p> 

Submission Guidelines:

***********************

Original, unpublished manuscripts of up to 12-pages includ= ing figures and

references must follo= w the ACM SIG proceedings format. SIGPLAN conference

paper templates are available for LaTeX and Word at:

http://www.acm.org/sigs/publications/proceeding= s-templates.

Submissions must be = in PDF.

 

Submitted papers must adhere to the SIGPLAN Re-publication = Policy and the

ACM Policy on Plagiari= sm. Concurrent submissions to other conferences,

workshops, journals, or similar forums of publication are not a= llowed.

Submissions that do not meet = these guidelines may not be considered.

 

The URL for submission is t= hrough Easy Chair:

https://easychair.org/conference= s/?conf=3Dpprew4

 

Publication:  

********************  

Arrangements for publication of accepted and presented pape= rs at PPREW are  

currentl= y underway.  

 <= /o:p>

Program Chairs:

********************

R= 26;Mila Dalla Preda, University of Verona, Italy

•J. Todd McDonald, University of South Alabama, USA<= /o:p>

  

Proceedings Chair:  

********************  

•Natalia Stakhanova, University of New Brunswick, Canada=

 

Pr= ogram Committee:  

*******= *************    

•Saumya Debray, University of Arizona, USA   <= /p>

•Stephen Magill, Galois, USA   <= o:p>

•Frederico Maggi, University of= Milan, Italy  

•And= y King, University of Kent, UK  

•Natalia Stakhanova, University of New Brunswick, Canada =  

•Guillaume Bonfante, Lo= ria, France  

•Todd = Andel, University of South Alabama, USA  

•Yuan Xiang Gu, IRDETO, Canada  

•Clark Thomborson, University of Aucklan= d  

•Johannes Kinder= , Royal Holloway, University of London, UK  

•Michael Grimaila, Air Force Institute of Technolo= gy, USA  

•William M= ahoney, University of Nebraska Omaha, USA  

•Mathias Payer, University of California-Berkeley, = USA

•Bjorn De Sutter, Unviversi= ty of Ghent, Belgium  

= 226;Mihai Christodorescu, Qualcomm Reseach-IBM Research, USA  

•Sergio Maffeis, Imperial Colleg= e London, UK

•Jean-Yves Marion,= INPL, France  

 &nbs= p; 

Steering Committee:

********************     =

•Arun Lakhotia, University of = Louisiana-Lafayette, USA  

•Roberto Giocabazzi, University of Verona, Italy  

•J. Todd McDonald, University of Sout= h Alabama, USA  

•Mi= la Dalla Preda, University of Verona, Italy  

 

 

 

= ------=_NextPart_000_0349_01CFB565.C90CFE30--