Información de la conferencia
ROOTS 2022: Reversing and Offensive-oriented Trends Symposium
https://www.roots-conference.org/
Día de Entrega:
2022-08-26
Fecha de Notificación:
2022-10-03
Fecha de Conferencia:
2022-11-17
Ubicación:
Vienna, Austria
Años:
6
Vistas: 7613   Seguidores: 0   Asistentes: 0

Solicitud de Artículos
The Reversing and Offensive-oriented Trends Symposium, an academic workshop, is again co-located with the DeepSec conference in its sixth year. ROOTS solicits contributions that focus on theorems and root shells: In security, two things you absolutely cannot argue with.

Security is hard to define. Most often, security is defined by its absence. For scientists, this is particularly unsatisfactory. A lack of definition increases the difficulty to find suitable quantitive and qualitative models. Even though the overall landscape is blurry at best; exploitation, reverse engineering, and offensive techniques have their place. ROOTS aims to explore this territory.

The first European symposium of its kind, ROOTS aims to provide an industry-friendly academic platform to discuss trends in exploitation, reversing, offensive techniques, and effective protections. Submissions should provide novel attack forms, describe novel reversing techniques, or effective deployable defenses. Submissions can also provide a comprehensive overview of the state-of-the-art, and pinpoint promising areas that have not received appropriate attention in the past.

Topics of interest include but are not limited to:

- New exploitation techniques and methodologies
- New reverse engineering techniques and methodologies
- The science of (in)security
- The role of exploitation in the science of security
- The role of reverse engineering in the science of security
- Novel approaches to security scalability, in the actual world or in simulated environments (CTF)
- New unintended programming and execution models (“weird machines”)
wherein the program is encoded in data, metadata, descriptors, etc.
- Automated code analysis and semantic understanding
- Formal models of exploitation and formal methods for exploitation
- Systematization of knowledge in exploitation
- Systematization of knowledge in reverse engineering
- Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.
- Reverse engineering of trending platforms and architectures: embedded systems, IoT, cloud, SDNs, etc.
- Exploitation perspectives on emerging trust models: SGX, enclaves, blockchains, etc.
To facilitate interaction with industry, the ROOTS ticket will be valid for all DeepSec conference tracks on both days, including the industry tracks, and tickets for the industry track will be valid for ROOTS. 
Última Actualización Por Dou Sun en 2022-06-26
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
b1EICSACM SIGCHI Symposium on Engineering Interactive Computing Systems2024-02-162024-03-282024-06-24
aBuildSysACM International Conference on Systems for Energy-Efficient Built Environments2026-01-222026-04-032026-06-22
ba*a1IPSNInternational Conference on Information Processing in Sensor Networks2023-10-242024-01-202024-05-13
ab1ALENEXAlgorithm Engineering and Experiments2024-07-182025-01-12
bab2CogSciAnnual Meeting of the Cognitive Science Society2026-02-022026-07-22
b2SOSEInternational Symposium on Service-Oriented System Engineering2025-05-122025-06-072025-07-21
cb3AOSEInternational Workshop on Agent-Oriented Software Engineering2012-04-062012-06-04
baa1ECOOPEuropean Conference on Object-Oriented Programming2026-02-122026-04-092026-06-29
baa2ICSOCInternational Conference on Service Oriented Computing2025-07-072025-09-152025-12-01
bab1CoNEXTInternational Conference on emerging Networking EXperiments and Technologies2025-05-292025-09-152025-12-01