征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The 4th Program Protection and Reverse Engineering Workshop will be held in New Orleans, Louisiana, Tuesday, December 9, 2014, in conjunction with the Annual Computer Security Applications Conference (ACSAC). ACSAC will be held at the Hyatt French Quarter, a New Orleans hotel located in the historic French Quarter. Program protection and reverse engineering are dualisms of good and evil. Beneficial uses of reverse engineering abound: malicious software needs to be analyzed and understood in order to prevent their spread and to assess their functional footprint; owners of intellectual property (IP) at times need to recover lost or unmaintained designs. Conversely, malicious reverse engineering allows illegal copying and subversion and designers can employ obfuscation and tamper-proofing on IP to target various attack vectors. In this sense, protecting IP and protecting malware from detection and analysis is a double-edged sword: depending on the context, the same techniques are either beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become analysis methods that support reverse engineering for illegal activity. PPREW is a forum for researchers and practitioners in academia, industry, and government who focus on analysis, security, and protection in software and hardware systems. PPREW invites papers on practical and theoretical approaches for program protection and reverse engineering used in beneficial contexts, focusing on analysis/deobfuscation of malicious code and methods/tools that hinder reverse engineering.

征稿信息

重要日期

2014-10-10
初稿截稿日期

征稿范围

Topics of interest include, but are not limited to: Polymorphic variation (obfuscation / deobfuscation) Tamper-proofing Hardware-based protection Side channel analysis vulnerabilities Theoretical analysis frameworks: Abstract Interpretation Homomorphic Encryption Term Rewriting Systems Machine Learning Large Scale Boolean Matching Software watermarking Digital fingerprinting Reverse engineering tools / techniques Program / circuit slicing Component / functional Identification Source code (static/dynamic) analysis Information hiding and discovery Virtualization for protection and/or analysis Forensic and anti-forensic protection Moving target and active cyber defense
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月09日

    2014

    02月09日

    2016

  • 10月10日 2014

    初稿截稿日期

  • 02月09日 2016

    注册截止日期

主办单位
The Applied Computer Security Associates (ACSA)
联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询