[fg-arc] [systex19] Call for Papers (deadline 15th August)

Raoul Strackx raoul.strackx at cs.kuleuven.be
Tue Jul 16 12:05:58 CEST 2019


+---------------------------------------------------------------------+
| 4th Workshop on System Software for Trusted Execution (SysTEX 2019) |
+---------------------------------------------------------------------+

Co-located with SOSP 2019
SysTEX, Huntsville, Ontario, Canada, 27th October 2019


[ IMPORTANT DATES (Times are AoE) ]

August 15, 2019 Paper submission
September 6, 2019 - Notification of acceptance]
October 1, 2019 - Camera Ready Deadline
October 27, 2019 - Workshop

The rise of new processor hardware extensions that permit fine-grained
and flexible trusted execution, such as Intel's SGX, ARM's TrustZone, or
AMD's SEV, introduces numerous novel challenges and opportunities for
developers of secure applications. There is a burning need for
cross-cutting systems support of such Trusted Execution Environments
(TEEs) that spans all the layers of the software stack, from the OS
through runtime to compilers and programming models.

The 4th Workshop on System Software for Trusted Execution (SysTEX) will
focus on systems research challenges related to TEEs, and explore new
ideas and strategies for the implementation of trustworthy systems with
TEEs. The workshop is also open to papers exploring attacks on current
TEEs and strategies for mitigating such attacks.

This is the fourth installment of the workshop that follows three
successful workshops collocated with primary systems venues Middleware
2016, SOSP 2017 and CCS 2018 respectively.

Topics of interest include but are not limited to:
- Architecture, applications and implementation technologies for trusted
platforms and trustworthy infrastructures
- Middleware for distributed trusted execution
- OS support for trusted execution
- Trustworthy infrastructures and services for cloud computing
(including resilience)
- Attestation and integrity verification
- Cryptographic aspects of trusted and trustworthy computing
- Intrusion resilience in trusted computing
- Virtualization for trusted platforms
- Security policy and management of trusted computing
- Privacy aspects of trusted computing
- Verification of trusted computing architectures
- Usability and end-user interactions with trusted platforms
- Limitations of trusted computing
- Usability and user perceptions of trustworthy systems and risks
- Use case studies of trusted execution
- Validation and performance evaluation of trusted hardware

[ WORKSHOP CO-CHAIRS ]

  Kapil Vaswani, Microsoft Research
  Raoul Strackx, KU Leuven, Belgium

Contact: kapilv at microsoft.com, raoul.strackx at cs.kuleuven.be

[ PROGRAM COMMITTEE ]

  Pascal Felber, University of Neuchatel, Switzerland
  Christof Fetzer, TU Dresden, Germany
  Rüdiger Kapitza, TU Braunschweig, Germany
  Peter Pietzuch, Imperial College, United Kingdom
  Meltem Ozsoy, Intel, USA
  Vinod Ganapathy, Indian Institute of Science, India
  Jethro Beekman, Fortanix, USA
  Han Dongsu, KAIST, Korea
  Taesoo Kim, Georgia Tech, USA
  Ofir Weisse, University of Michigan, USA
  Marina Minkin, University of Michigan, USA
  Ferdinand Brasser, TU Darmstadt, Germany
  Tilo Müller, University Erlangen-Nürnberg, Germany
  ... to be completed

[ FORMAT OF THE WORKSHOP ]

The goal of the workshop is to foster collaboration and discussion among
researchers and practitioners in this field. The workshop will be one
full day. The program should primarily include presentations by authors
of accepted papers (the workshop will have proceedings in the ACM
digital library).

[ SUBMISSION AND PUBLICATION ]

SysTEX welcomes submissions in two formats:

Regular research papers of at most 6 pages including references.
Research papers should be work that is not previously published or
concurrently submitted elsewhere and will be published in the proceedings.
Short research statements of at most 1-2 pages. Research statements aim
at fostering discussion and collaboration. Research statements may
summarize research published elsewhere or outline new emerging ideas.
Authors can choose if accepted research statements should be published
in the proceedings.
All submissions should be in PDF and must follow the ACM SIGPLAN format
(http://www.acm.org/publications/proceedings-template).

Reviewing is single-blind, and the names and affiliations of the authors
must appear in the submitted papers. Each paper will receive at least
three reviews from members of the program committee. Submissions that do
not respect the formatting requirement may be rejected without review.

Submissions site: https://hotcrp.doc.ic.ac.uk/systex19/



More information about the fg-arc mailing list