征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Theorems and root shells: things you absolutely can not argue with.
Until now, Europe lacked a premier academic symposium on offensive technologies.
ROOTS fills this gap by providing an academic platform to discuss trends in exploitation, reversing, and other offensive techniques and how to protect against them.
ROOTS is co-located with DeepSec 2018.
To facilitate interaction with industry, the ROOTS ticket be will valid for all DeepSec conference tracks on both days, including the industry tracks, and tickets for the industry track will be valid for ROOTS.

组委会

Program Committee

  • Patroklos (argp) Argyroudis (CENSUS S.A.)

  • Stephen Checkoway (University of Illinois at Chicago)

  • Lucas Davi (University of Duisburg-Essen)

  • Mario Heiderich (Cure53)

  • René Mayrhofer (JKU Linz)

  • Marcus Niemietz (RUB)

  • Alexander Peslyak (Openwall)

  • Konrad Rieck (TU Braunschweig)

  • Sebastian Schinzel (FH Münster)

  • Juraj Somorovsky (Hackmanit)

  • Filippo Valsorda (Cloudflare)

  • Edgar Weippl (TU Wien, SBA Research)

  • Fabian Yamaguchi (TU Braunschweig, LeftShift)

  • Stephano Zanero (University Politecnico di Milano)

Organizing committee

  • René Pfeiffer (DeepSec)

  • Edgar Weippl (TU Wien, SBA Research)

  • Adrian Dabrowksi (SBA Research)

征稿信息

重要日期

2018-08-26
摘要截稿日期
2018-10-06
初稿截稿日期

作者指南

All papers must be original and not simultaneously submitted to another journal or conference. Submissions to ROOTS are not limited in page count, but their length should be commensurate with the results; 5-10 pages of two-column PDF using the sigconf template from https://www.acm.org/publications/proceedings-template. We encourage submissions of papers based on results previously presented at industry or hacker conferences, so long as the papers themselves have not been presented elsewhere. We also encourage Systematization of Knowledge (SoK) submissions. The following paper categories are welcome:

  • New exploitation techniques and methodologies
  • New reverse engineering techniques and methodologies
  • The role of exploitation in the science of security
  • The role of reverse engineering in the science of security
  • New unintended models of programming and execution wherein the program is encoded in data, metadata, descriptors, etc.
  • Formal models of exploitation and formal methods for exploitation
  • Systematization of knowledge in exploitation
  • Systematization of knowledge in reverse engineering
  • Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.
  • Reverse engineering of trending platforms and architectures: IoT, cloud, SDNs, etc.
  • Exploitation perspectives on emerging trust models: SGX, blockchains, etc.
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    11月29日

    2019

    11月30日

    2019

  • 08月26日 2018

    摘要截稿日期

  • 10月06日 2018

    初稿截稿日期

  • 11月30日 2019

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询