5th Reversing and Offensive-oriented Trends Symposium 2021

ROOTS 2021


Computer Networks & Wireless Communication Computer Security & Cryptography Computing Systems



Reversing and Offensive-oriented Trends Symposium 2021 (ROOTS)

===============================================================

Academic workshop co-located with DeepSec 2021 November 18/19, Vienna



 



The Reversing and Offensive-oriented Trends Symposium, an academic workshop, is again co-located with the DeepSec conference in its fifth year. ROOTS solicits contributions that focus on theorems and root shells: In security, two things you absolutely cannot argue with.

Security is hard to define. Most often, security is defined by its absence. For scientists, this is particularly unsatisfactory. A lack of definition increases the difficulty to find suitable quantitative and qualitative models. Even though the overall landscape is blurry at best; exploitation, reverse engineering, and offensive techniques have their place. ROOTS aims to explore this territory.



The first European symposium of its kind, ROOTS aims to provide an industry-friendly academic platform to discuss trends in exploitation, reversing, offensive techniques, and effective protections. Submissions should provide novel attack forms, describe novel reversing techniques, or effective deployable defenses. Submissions can also provide a comprehensive overview of the state-of-the-art, and pinpoint promising areas that have not received appropriate attention in the past.



Topics of interest include but are not limited to:



- New exploitation techniques and methodologies

- New reverse engineering techniques and methodologies

- The science of (in)security

- The role of exploitation in the science of security

- The role of reverse engineering in the science of security

- Novel approaches to security scalability, in the actual world or in simulated environments (CTF)

- New unintended programming and execution models (“weird machines”)

wherein the program is encoded in data, metadata, descriptors, etc.

- Automated code analysis and semantic understanding

- Formal models of exploitation and formal methods for exploitation

- Systematization of knowledge in exploitation

- Systematization of knowledge in reverse engineering

- Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.

- Reverse engineering of trending platforms and architectures: embedded systems, IoT, cloud, SDNs, etc.

- Exploitation perspectives on emerging trust models: SGX, enclaves, blockchains, etc.





PC & Publisher

===============

Program Chairs: Adrian Dabrowski (University of California, Irvine), René Pfeiffer (DeepSec)

General chair: Edgar Weippl (Universität Wien, SBA Research)



Program & Review Committee 2021

================================



Patroklos Argyroudis (CENSUS S.A.)

Jean-Philippe Aumasson (Kudelski Security, Switzerland)

Sergey Bratus (Dartmouth College)

Martina Lindorfer (University of Technology, Vienna)

Georg Merzdovnik (SBA Research)

Marius Muench (VU Amsterdam)

Sebastian Neuner (Google LLC)

Marcus Niemietz (Ruhr-University Bochum)

Konrad Rieck (TU Braunschweig)

Sebastian Schinzel (Münster University of Applied Sciences)

Juraj Somorovsky (Paderborn University)

Alexios Voulimeneas (KU Leuven)

Stefano Zanero (Politecnico di Milano)



Publication

============

Similar to 2017-2020, proceedings will be published via ACM's Digital Library. See http://authors.acm.org/main.html for details about the author's rights.



Submission instructions

========================

Submissions to ROOTS are not limited in page count, but their length should be commensurate with the results. We expect that 5--10 pages of two-column PDF using the sigconf template should be sufficient. We encourage submissions of papers based on results previously presented at industry or hacker conferences, so long as the papers themselves have not been presented or published elsewhere. We also encourage Systematization of Knowledge (SoK) submissions.



Submissions should be anonymous and direct references to the author should be blinded or written as a 3rd person reference, where possible. Additionally, submissions should not contain endorsements of specific products or vendors.



Important dates 

================

Submission deadline: August 20 (anywhere in the world)

Author notification: October 1

Camera-ready papers due: October 22

Workshop and DeepSec: November 18/19