[TYPES/announce] Principles of Secure Compilation (PriSC) 2020: Call for Participation and Short Talks
Dominique DEVRIESE
Dominique.Devriese at vub.be
Tue Dec 10 15:32:47 EST 2019
Principles of Secure Compilation Workshop (PriSC 2020)
- POPL/PriSC Early registration deadline: 18 December 2019
- Registration, visa info, venue: https://popl20.sigplan.org/
- Accepted talks available here:
https://popl20.sigplan.org/home/prisc-2020#event-overview
- Invited speaker:
Tyler McMullen (Fastly)
- Call for short talks: see below
Deadline: 13 January 2020
The Workshop on Principles of Secure Compilation (PriSC) is an informal 1-day
workshop without formal proceedings. The goal is to bring together researchers
interested in secure compilation and to identify interesting research directions
and open challenges.
PriSC 2020 will be held on Saturday 25 January 2020 in New Orleans, Louisiana,
United States and will be co-located with POPL 2020.
For more information about this edition and the PriSC series, please
visit https://popl20.sigplan.org/home/prisc-2020
### Invited Speakers
Tyler McMullen (Fastly)
### Accepted papers
The list of accepted talks is available at
https://popl20.sigplan.org/home/prisc-2020#event-overview
### Call for Short Talks
We also have a short talks session, where participants get 5 minutes to present
intriguing ideas, advertise ongoing work, etc. If you're interested in giving a
short 5-minute talk should submit an abstract. Any topic that could be of
interest to the emerging secure compilation community is in scope. Presentations
that provide a useful outside view or challenge the community are also welcome.
- Deadline: 13 January 2020
- More details:
https://popl20.sigplan.org/home/prisc-2020#Call-for-Short-Talks
- Submit here:
https://prisc2020short.hotcrp.com/
### Workshop summary
The emerging field of secure compilation aims to preserve security properties of
programs when they have been compiled to low-level languages such as assembly,
where high-level abstractions don’t exist, and unsafe, unexpected interactions
with libraries, other programs, the operating system and even the hardware are
possible. For unsafe source languages like C, secure compilation requires
careful handling of undefined source-language behavior (like buffer overflows
and double frees). Formally, secure compilation aims to protect high-level
language abstractions in compiled code, even against adversarial low-level
contexts, thus enabling sound reasoning about security in the source language. A
complementary goal is to keep the compiled code efficient, often leveraging new
hardware security features and advances in compiler design. Other necessary
components are identifying and formalizing properties that secure compilers must
possess, devising efficient security mechanisms (both software and hardware),
and developing effective verification and proof techniques. Research in the
field thus puts together advances in compiler design, programming languages,
systems security, verification, and computer architecture.
### Contact
For any questions please contact the workshop chairs, Dominique Devriese
(dominique.devriese at vub.be) and Deian Stefan (deian at cs.ucsd.edu).
To make sure you receive PriSC announcements in the future please
subscribe to the following low-traffic mailing list:
https://lists.gforge.inria.fr/mailman/listinfo/prisc-announce
More information about the Types-announce
mailing list