Home
  Call for Papers
  Accepted Papers
  Keynote Speakers
  Sponsors
  Workshop Program
  Committee
  Registration
  Local Arrangements















2nd ACM SIGPLAN Program Protection and
Reverse Engineering Workshop (PPREW 2013)

Parco dei Principi Hotel, Rome, Italy
January 26, 2013
Collocated with POPL 2013

Proceedings

ACM Digital Library

About PPREW

Program protection and reverse engineering are dualisms of good and evil. Beneficial uses of reverse engineering abound: malicious software needs to be analyzed and understood in order to prevent their spread and to assess their functional footprint; owners of intellectual property (IP) at times need to recover lost or unmaintained designs. Conversely, malicious reverse engineering allows illegal copying and subversion and designers can employ obfuscation and tamper-proofing on IP to target various attack vectors. In this sense, protecting IP and protecting malware from detection and analysis is a double-edged sword: depending on the context, the same techniques are either beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become analysis methods that support reverse engineering for illegal activity.

PPREW invites papers on practical and theoretical approaches for program protection and reverse engineering used in beneficial contexts, focusing on analysis/deobfuscation of malicious code and methods/tools that hinder reverse engineering. Ongoing work with preliminary results, theoretical approaches, tool-based methods, and empirical studies on various methods are all appropriate.

  • Obfuscation / deobfuscation
  • Tamper-proofing
  • Hardware-based protection
  • Side channel analysis vulnerabilities
  • Theoretical analysis frameworks:
    • Abstract Interpretation
    • Term Rewriting Systems
    • Machine Learning
    • Large Scale Boolean Matching
  • Software watermarking
  • Digital fingerprinting
  • Reverse engineering tools / techniques
  • Program / circuit slicing
  • Component / functional Identification
  • Source code (static/dynamic) analysis
  • Information hiding and discovery

Important Dates

Extended Paper Submission: October 11, 2012
Author Notification: November 1, 2012
Camera Ready: November 13, 2012
Early Registration: December 31, 2012
Workshop: January 26, 2013