Home
  Organization
  Call for Papers
  Speakers
  Training
  Accepted Papers
  Workshop Program
  Sponsors
  Past Workshops
 















Software Security, Protection, and Reverse Engineering Workshop
Hilton Los Angeles/Universal City, Los Angeles, CA
December 5-6, 2016
Collocated with ACSAC 2016

Workshop Program

Downloadable Program


Monday, December 5th

7:30 am Breakfast
8:30 am Welcome and Best Paper Award
8:40 am Training Session: Whitebox Crypto Attacks
     Jasper von Woudenberg, RISCURE
10:00 am Break
10:30 am Training Session: Whitebox Crypto Attacks
     Jasper von Woudenberg, RISCURE
12:00 pm Lunch
1:30 pm Training Session: Concolic Analysis
     Vivek Notani, University of Verona
3:00 pm Break
3:30 pm Training Session: Concolic Analysis
     Vivek Notani, University of Verona
5:00 pm Invited Talk: Transition to Practice NSF SATC Program
     Dr. Alec Yasinsac, University of South Alabama
5:30 pm Adjourn


Tuesday, December 6th

7:30 am Breakfast
8:30 am Welcome
8:35 am Keynote: Secure Development After Security Bugs
     Jeremy Epstein, Program Manager, DARPA
9:30 am Finding the Needle in the Heap: Combining Static Analysis and Dynamic Symbolic Execution to Trigger Use-After-Free
     Josselin Feist, Mounier Laurent, Sebastien Bardin, Robin David, and Marie-Laure Potet
10:00 am Break
10:30 am Metadata Recovery From Obfuscated Programs Using Machine Learning (Best Paper Award)
     Aleieldin Salem and Sebastian Banescu
11:00 am Keynote: Industry Trends in Software Attack
     Jasper von Woudenberg, CTO North America, RISCURE
12:00 pm Lunch
1:00 pm Keynote: Information Flow Obfuscation
     Saumya Debray, Professor, University of Arizona
2:00 pm White-Box Cryptography-Practical Protection on Hostile Hosts
    Yuan Gu, Harold Johnson, Clifford Liem, Andrew Wajs, and Michael Wiener
2:30 pm Comparing the Effectiveness of Commercial Obfuscators against MATE Attacks
     Ramya Manikyam, Todd McDonald, William Mahoney, Todd Andel, and Samuel Russ
3:00 pm Break
3:30 pm Tightly-Coupled Self-Debugging Software Protection
    Bert Abrath, Joris Wijnant, Bart Coppens, Bjorn De Sutter, and Stijn Volckaert
4:00 pm Active Android Malware Analysis: An approach based on Stochastic Games
    Riccardo Sartea, Mila Dalla Preda, Alessandro Farinelli, Roberto Giacobazzi, and Isabella Mastroen
4:30 pm Buffer Overflow Attack's Power Consumption Signatures
     Samuel Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey McDonald, and Todd R. Ande
5:00 pm Detecting Rootkits With the RAI Runtime Application Inventory
     Shabnam Aboughadareh and Christoph Csallner
5:30 pm Adjourn
6:00 pm ACSAC Welcome Reception


Pre-proceedings


Presentation Slides (ZIP)