<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
</head>
<body style="overflow-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;">
================================================<br>
Call for Presentations: PriSC @ POPL 2025<br>
================================================<br>
<br>
Secure compilation is an emerging field that puts together advances in security,<br>
programming languages, compilers, verification, systems, and hardware<br>
architectures in order to devise more secure compilation chains that eliminate<br>
many of today's security vulnerabilities and that allow sound reasoning about<br>
security properties in the source language. For a concrete example, all modern<br>
languages provide a notion of structured control flow and an invoked procedure<br>
is expected to return to the right place. However, today's compilation chains<br>
(compilers, linkers, loaders, runtime systems, hardware) cannot efficiently<br>
enforce this abstraction against linked low-level code, which can call and<br>
return to arbitrary instructions or smash the stack, blatantly violating the<br>
high-level abstraction. Other problems arise because today's languages fail to<br>
specify security policies, such as data confidentiality, and the compilation<br>
chains thus fail to enforce them, especially against powerful side-channel<br>
attacks. The emerging secure compilation community aims to address such problems<br>
by identifying precise security goals and attacker models, designing more secure<br>
languages, devising efficient enforcement and mitigation mechanisms, and<br>
developing effective verification techniques for secure compilation chains.<br>
<br>
9th Workshop on Principles of Secure Compilation (PriSC 2025)<br>
=============================================================<br>
<br>
The Workshop on Principles of Secure Compilation (PriSC) is an informal 1-day<br>
workshop without any proceedings. The goal of this workshop is to identify<br>
interesting research directions and open challenges and to bring together<br>
researchers interested in working on building secure compilation chains, on<br>
developing proof techniques and verification tools, and on designing software or<br>
hardware enforcement mechanisms for secure compilation. The 9th edition of PriSC<br>
will be held on January 20 in Denver, Colorado, United States together with<br>
the ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), 2025.<br>
<br>
Important Dates<br>
===============<br>
<br>
* Thu 7 Nov 2024: Submission Deadline<br>
* Thu 5 Dec 2024: Acceptance Notification<br>
* Mon 20 Jan 2025: Workshop<br>
<br>
Presentation Proposals and Attending the Workshop<br>
=================================================<br>
<br>
Anyone interested in presenting at the workshop should submit an extended<br>
abstract (up to 2 pages, details below) covering past, ongoing, or future work.<br>
Any topic that could be of interest to secure compilation is in scope. Secure<br>
compilation should be interpreted very broadly to include any work in security,<br>
programming languages, architecture, systems or their combination that can be<br>
leveraged to preserve security properties of programs when they are compiled or<br>
to eliminate low-level vulnerabilities. Presentations that provide a useful<br>
outside view or challenge the community are also welcome. This includes<br>
presentations on new attack vectors such as microarchitectural side-channels,<br>
whose defenses could benefit from compiler techniques.<br>
<br>
Specific topics of interest include but are not limited to:<br>
* Attacker models for secure compiler chains.<br>
* Secure compiler properties: fully abstract compilation and similar properties,<br>
memory safety, control-flow integrity, preservation of safety, information<br>
flow and other (hyper-)properties against adversarial contexts, secure<br>
multi-language interoperability.<br>
* Secure interaction between different programming languages: foreign function<br>
interfaces, gradual types, securely combining different memory management<br>
strategies.<br>
* Enforcement mechanisms and low-level security primitives: static checking,<br>
program verification, typed assembly languages, reference monitoring, program<br>
rewriting, software-based isolation/hiding techniques (SFI, crypto-based,<br>
randomization-based, OS/hypervisor-based), security-oriented architectural<br>
features such as Intel's SGX, MPX and MPK, capability machines, side-channel<br>
defenses, object capabilities.<br>
* Experimental evaluation and applications of secure compilers.<br>
* Proof methods relevant to compilation: (bi)simulation, logical relations, game<br>
semantics, trace semantics, multi-language semantics, embedded interpreters.<br>
* Formal verification of secure compilation chains (protection mechanisms,<br>
compilers, linkers, loaders), machine-checked proofs, translation validation,<br>
property-based testing.<br>
<br>
Guidelines for Submitting Extended Abstracts<br>
============================================<br>
<br>
Extended abstracts should be submitted in PDF format and not exceed 2 pages<br>
(references not included). They should be formatted in two-column layout, 10pt<br>
font, and be printable on A4 and US Letter sized paper. We recommend using the<br>
new acmart LaTeX style in sigplan mode. Submissions are not anonymous and should<br>
provide sufficient detail to be assessed by the program committee. Presentation<br>
at the workshop does not preclude publication elsewhere.<br>
<br>
Contact and More Information<br>
============================<br>
<br>
You can find more information on the workshop website:<br>
<a href="https://urldefense.com/v3/__https://popl25.sigplan.org/home/prisc-2025__;!!IBzWLUs!S3UcpBiVFOcW5lZsurjy7Qcz5pjpiI0t1RCCYC8hyaeney-EkZz_3oafFNBj3DwrRX2iGQVZHMTJySxKd4SZM-82kHpQ5_GR$">https://popl25.sigplan.org/home/prisc-2025</a><br>
<br>
Submission website: <a href="https://urldefense.com/v3/__https://prisc25.hotcrp.com/__;!!IBzWLUs!S3UcpBiVFOcW5lZsurjy7Qcz5pjpiI0t1RCCYC8hyaeney-EkZz_3oafFNBj3DwrRX2iGQVZHMTJySxKd4SZM-82kAaHLtoN$">https://prisc25.hotcrp.com</a><br>
<br>
For questions please contact the workshop chairs, Marco Patrignani<br>
(<a href="mailto:marco.patrignani@unitn.it">marco.patrignani@unitn.it</a>) and Marco Vassena (<a href="mailto:m.vassena@uu.nl">m.vassena@uu.nl</a>).
</body>
</html>