|
4th Program Protection and Reverse
Engineering Workshop (PPREW-4)
Hyatt French Quarter, New Orleans, LA
December 9, 2014
Collocated with
ACSAC
2014
Topics for the workshop can cover a wide variety of tools, techniques, and methodologies related to security aspects of software and hardware systems, with particular focus on subversion/exploitation or protection of program integrity, confidentiality, authorization, and intellectual property. Ongoing work with
preliminary results, theoretical approaches,
tool-based methods, and empirical studies on
various methods are all appropriate for submission. Papers can address studies on hardware/circuit based
methods or software/assembly based mechanisms.
We expect the workshop to provide exchange of
ideas and support for cooperative relationships
among researchers in industry, academia, and government. Topics can include:
- Obfuscation
/ deobfuscation
-
Tamper-proofing
- Hardware-based protection
- Side channel
analysis vulnerabilities
- Theoretical
analysis
frameworks:
- Abstract Interpretation
- Homomorphic Encryption
- Term Rewriting Systems
- Machine Learning
- Large Scale Boolean Matching
- Software
watermarking
-
Digital
fingerprinting
- Reverse
engineering
tools / techniques
- Program /
circuit slicing
- Component /
functional
Identification
- Source code
(static/dynamic)
analysis
- Information
hiding and
discovery
- Virtualization for protection and/or analysis
- Forensic and anti-forensic protection
- Moving target and active cyber defense
Papers must describe original work, be written
and presented in English, and must not
substantially overlap with papers that have been
published or that are simultaneously submitted
to a journal or a conference with refereed
proceedings.
Original, unpublished manuscripts of up to
12-pages including figures and references must
follow the ACM SIG proceedings format. All submissions must be in PDF and paper templates are available for
LaTeX and Word at:
http://www.acm.org/sigs/publications/proceedings-templates. Authors should apply ACM Computing Classification
categories and terms. The templates provide space for this indexing and authors should refer to the Computing
Classification Scheme at: http://www.acm.org/about/class/1998
Submitted papers must adhere to the
ACM Copyright
Policy and the
ACM Policy on
Plagiarism. Concurrent submissions to other
conferences, workshops, journals, or similar
forums of publication are not allowed.
Submissions that do not meet these guidelines
may not be considered.
The URL for submission of papers
is through
Easy Chair.
For accepted papers, at least one author must register for, attend, and make a presentation at PPREW in order for the paper to appear in the workshop proceedings. Proceedings
will be published through ACM International Conference Publication Series (ICPS) and will appear in the ACM Digital Library.
To expedite publication of accepted papers in the workshop proceedings, camera ready papers should have the following properties:
- PDFs should be optimized for fast web viewing.
- PDFs should Include the rights management statement and bibliographic strip on the bottom of the first page left column. The specific wording of this statement is emailed directly to the authors of accepted papers through the ACM Rights Management System.
- All fonts in the PDF must be Type 1 fonts (scalable), not Type 3 (bit-mapped).
- All fonts MUST be embedded within the PDF file.
Documentation on how to embed fonts is provided by ACM. Authors should download and use the ACM Digital Library optimal distiller settings file, ACM.joboptions.
|
|