[fg-arc] [systex19] Call for Papers (deadline extended to 21st August)
Raoul Strackx
raoul.strackx at cs.kuleuven.be
Wed Aug 14 14:06:18 CEST 2019
Deadline extended to August 21!
+---------------------------------------------------------------------+
| 4rd Workshop on System Software for Trusted Execution (SysTEX 2019) |
+---------------------------------------------------------------------+
Co-located with SOSP 2019
SysTEX, Huntsville, Ontario, Canada, 27th October 2019
[ IMPORTANT DATES (Times are AoE) ]
August 21, 2019 Paper submission
September 6, 2019 - Notification of acceptance]
October 1, 2019 - Camera Ready Deadline
October 27, 2019 - Workshop
The rise of new processor hardware extensions that permit fine-grained
and flexible trusted execution, such as Intel's SGX, ARM's TrustZone, or
AMD's SEV, introduces numerous novel challenges and opportunities for
developers of secure applications. There is a burning need for
cross-cutting systems support of such Trusted Execution Environments
(TEEs) that spans all the layers of the software stack, from the OS
through runtime to compilers and programming models.
The 4th Workshop on System Software for Trusted Execution (SysTEX) will
focus on systems research challenges related to TEEs, and explore new
ideas and strategies for the implementation of trustworthy systems with
TEEs. The workshop is also open to papers exploring attacks on current
TEEs and strategies for mitigating such attacks.
This is the fourth installment of the workshop that follows three
successful workshops collocated with primary systems venues Middleware
2016, SOSP 2017 and CCS 2018 respectively.
Topics of interest include but are not limited to:
- Architecture, applications and implementation technologies for trusted
platforms and trustworthy infrastructures
- Middleware for distributed trusted execution
- OS support for trusted execution
- Trustworthy infrastructures and services for cloud computing
(including resilience)
- Attestation and integrity verification
- Cryptographic aspects of trusted and trustworthy computing
- Intrusion resilience in trusted computing
- Virtualization for trusted platforms
- Security policy and management of trusted computing
- Privacy aspects of trusted computing
- Verification of trusted computing architectures
- Usability and end-user interactions with trusted platforms
- Limitations of trusted computing
- Usability and user perceptions of trustworthy systems and risks
- Use case studies of trusted execution
- Validation and performance evaluation of trusted hardware
[ WORKSHOP CO-CHAIRS ]
Kapil Vaswani, Microsoft Research
Raoul Strackx, KU Leuven, Belgium
Contact: kapilv at microsoft.com, raoul.strackx at cs.kuleuven.be
[ PROGRAM COMMITTEE ]
Pascal Felber, University of Neuchatel, Switzerland
Christof Fetzer, TU Dresden, Germany
Rüdiger Kapitza, TU Braunschweig, Germay
Peter Pietzuch, Imperial College, United Kingdom
Meltem Ozsoy, Intel, USA
Vinod Ganapathy, Indian Institute of Science, India
Jethro Beekman, Fortanix, USA
Han Dongsu, KAIST, Korea
Taesoo Kim, Georgia Tech, USA
Ofir Weisse, University of Michigan, USA
Marina Minkin, University of Michigan, USA
Ferdinand Brasser, TU Darmstadt, Germany
Tilo Müller, University Erlangen-Nürnberg, Germany
Andrew Paverd, Microsoft Research Cambridge, UK
Simon Johnson, Intel, USA
[ FORMAT OF THE WORKSHOP ]
The goal of the workshop is to foster collaboration and discussion among
researchers and practitioners in this field. The workshop will be one
full day. The program should primarily include presentations by authors
of accepted papers (the workshop will have proceedings in the ACM
digital library).
[ SUBMISSION AND PUBLICATION ]
SysTEX welcomes submissions in two formats:
Regular research papers of at most 6 pages including references.
Research papers should be work that is not previously published or
concurrently submitted elsewhere and will be published in the proceedings.
Short research statements of at most 1-2 pages. Research statements aim
at fostering discussion and collaboration. Research statements may
summarize research published elsewhere or outline new emerging ideas.
Authors can choose if accepted research statements should be published
in the proceedings.
All submissions should be in PDF and must follow the ACM SIGPLAN format
(http://www.acm.org/publications/proceedings-template).
Reviewing is single-blind, and the names and affiliations of the authors
must appear in the submitted papers. Each paper will receive at least
three reviews from members of the program committee. Submissions that do
not respect the formatting requirement may be rejected without review.
Submissions site: https://hotcrp.doc.ic.ac.uk/systex19/
More information about the fg-arc
mailing list