Call for Papers: 1st Reversing and Offensive-Oriented Trends Symposium (ROOTs) 2017

René Pfeiffer/ May 1, 2017/ Call for Papers, Conference

ROOTs 2017

The first Reversing and Offensive-Oriented Trends Symposium (ROOTs) 2017 opens its call for papers. ROOTs is the first European symposium of its kind. ROOTS aims to provide an industry-friendly academic platform to discuss trends in exploitation, reversing, offensive techniques, and effective protections. Submissions should provide novel attack forms, describe novel reversing techniques or effective deployable defenses. Submissions can also provide a comprehensive overview of the state-of-the-art, and pinpoint promising areas that have not received appropriate attention in the past.

To facilitate interaction with industry, the ROOTs ticket will be valid for all DeepSec conference tracks on both days, including the industry tracks, and the DeepSec conference tickets for the industry track will be valid for ROOTs. The usual rules for academic discounts apply. Please contact the DeepSec staff or our sponsors for discount codes.

Topics

Topics of interest include, but are not limited to:

  • New exploitation techniques and methodologies
  • New reverse engineering techniques and methodologies
  • The role of exploitation in the science of security
  • The role of reverse engineering in the science of security
  • New unintended models of programming and execution wherein the program is encoded in data, metadata, descriptors, etc.
  • Formal models of exploitation and formal methods for exploitation
  • Systematization of knowledge in exploitation
  • Systematization of knowledge in reverse engineering
  • Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.
  • Reverse engineering of trending platforms and architectures: IoT, cloud, SDNs, etc.
  • Exploitation perspectives on emerging trust models: SGX, blockchains, etc.

PC & Publisher

The Call for Papers is open, and we welcome any kind of submissions. All submitted presentations will be reviewed by the programme committee consisting of the following persons.

Program chair: Sergey Bratus (Dartmouth College)
General chair: Edgar Weippl (TU Wien, SBA Research)
Co-General chair: René Pfeiffer (DeepSec)

Patroklos (argp) Argyroudis (CENSUS S.A.)
Jean-Philippe Aumasson (Kudelski Security, Switzerland)
Hebert Bos (V.U. Amsterdam)
Stephen Checkoway (University of Illinois at Chicago)
Gynvael Coldwind (Google Security Team)
Lucas Davi (University of Duisburg-Essen)
Thomas Dullien (Google Project Zero)
Aurelien Francion (EURECOM)
Mario Heiderich (Cure53)
Vasileios Kemerlis (Brown University)
René Mayrhofer (JKU Linz)
Marion Marschalek (BlackHoodie)
Collin Mulliner (Trifinite)
Marcus Niemietz (RUB)
Alexander Peslyak (Openwall)
Konrad Rieck (TU Braunschweig)
Ahmad-Reza Sadeghi (TU Darmstadt)
Sebastian Schinzel (FH Münster)
Juraj Somorovsky (Hackmanit)
Filippo Valsorda (Cloudflare)
Edgar Weippl (TU Wien, SBA Research)
Fabian Yamaguchi (TU Braunschweig, LeftShift)
Stephano Zanero (University Politecnico di Milano)

Application for inclusion in ACM DL via the International Conference Proceedings Series (ICPS) is pending. See ACM’s details about author’s rights.

The Call for Papers uses the Easychair CfP manager. All submissions must be sent until 5 August 2017. Authors will be notified by 15 September 2017. We need your camera-ready papers until 5 October 2017.

Submission Instructions

Submissions to ROOTS are not limited in page count, but their length should be commensurate with the results; 5-10 pages of two-column PDF using the sigconf template from https://www.acm.org/publications/proceedings-template. We encourage submissions of papers based on results previously presented at industry or hacker conferences, so long as the papers themselves have not been presented elsewhere. We also encourage Systematization of Knowledge (SoK) submissions.

If you have further questions, do not hesitate to contact us.

Share this Post

About René Pfeiffer

System administrator, lecturer, hacker, security consultant, technical writer and DeepSec organisation team member. Has done some particle physics, too. Prefers encrypted messages for the sake of admiring the mathematical algorithms at work.