|
4th Program Protection and Reverse
Engineering Workshop (PPREW-4)
Hyatt French Quarter, New Orleans, LA
December 9, 2014
Collocated with
ACSAC
2014
Early registration deadline: November 14, 2014
PPREW-4 is collocated with ACSAC-2014, held at the Hyatt French Quarter in New Orleans, LA, USA.
Visit the ACSAC registration site for arrangement information.
Registration cost for PPREW of $200 (early) / $250 (late) covers breakfast, lunch, and a welcome reception that evening. Group hotel rates are available for the conference.
Program protection and reverse engineering are
dualisms of good and evil. Beneficial uses of
reverse engineering abound: malicious software
needs to be analyzed and understood in order to
prevent their spread and to assess their
functional footprint; owners of intellectual
property (IP) at times need to recover lost or
unmaintained designs. Conversely, malicious
reverse engineering allows illegal copying and
subversion and designers can employ obfuscation
and tamper-proofing on IP to target various
attack vectors. In this sense, protecting IP and
protecting malware from detection and analysis
is a double-edged sword: depending on the
context, the same techniques are either
beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become
analysis methods that support reverse
engineering for illegal activity.
PPREW is a forum for researchers and practitioners in academia, industry, and government who focus on analysis, security, and protection in software and hardware systems. PPREW invites papers on practical and
theoretical approaches for program protection
and reverse engineering used in beneficial
contexts, focusing on analysis/deobfuscation of
malicious code and methods/tools that hinder
reverse engineering. Topics of interest include, but are not limited to:
- Obfuscation
/ deobfuscation
-
Tamper-proofing
- Hardware-based protection
- Side channel
analysis vulnerabilities
- Theoretical
analysis
frameworks:
- Abstract Interpretation
- Homomorphic Encryption
- Term Rewriting Systems
- Machine Learning
- Large Scale Boolean Matching
- Software
watermarking
-
Digital
fingerprinting
- Reverse
engineering
tools / techniques
- Program /
circuit slicing
- Component /
functional
Identification
- Source code
(static/dynamic)
analysis
- Information
hiding and
discovery
- Virtualization for protection and/or analysis
- Forensic and anti-forensic protection
- Moving target and active cyber defense
Paper
Submission:
|
October 10, 2014 |
Author
Notification:
|
November 10, 2014 |
Pre-Workshop Version:
|
December 3, 2014 |
Workshop: |
December 9, 2014 |
Camera Ready Version: |
December 20, 2014 |
Submissions handled through EasyChair.
|
|