<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
</head>
<body style="overflow-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;">
<div>* Submission Deadline: <b>Mon 18 Nov 2024</b></div>
<div>* Acceptance Notification: <b>Thu 12 Dec 2024</b> </div>
<div>* Workshop: Mon 20 Jan 2025</div>
<div><br>
</div>
<div>Submission website: https://prisc25.hotcrp.com</div>
<div>Workshop website: https://popl25.sigplan.org/home/prisc-2025</div>
<div><br>
</div>
<div>================================================</div>
<div>Call for Presentations: PriSC @ POPL 2025</div>
<div>================================================</div>
<div><br>
</div>
<div>Secure compilation is an emerging field that puts together advances in security,</div>
<div>programming languages, compilers, verification, systems, and hardware</div>
<div>architectures in order to build compilers that eliminate many of today's security</div>
<div>vulnerabilities.</div>
<div><br>
</div>
<div><br>
</div>
<div>9th Workshop on Principles of Secure Compilation (PriSC 2025)</div>
<div>=============================================================</div>
<div><br>
</div>
<div>The Workshop on Principles of Secure Compilation (PriSC) is an informal 1-day</div>
<div>workshop without any proceedings. The goal of this workshop is to identify</div>
<div>interesting research directions and open challenges and to bring together</div>
<div>researchers interested in working on building secure compilation chains, on</div>
<div>developing proof techniques and verification tools, and on designing software or</div>
<div>hardware enforcement mechanisms for secure compilation. The 9th edition of PriSC</div>
<div>will be held on January 20 in Denver, Colorado, United States together with</div>
<div>the ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), 2025.</div>
<div><br>
</div>
<div><br>
</div>
<div>Presentation Proposals and Attending the Workshop</div>
<div>=================================================</div>
<div><br>
</div>
<div>Anyone interested in presenting at the workshop should submit an extended</div>
<div>abstract (up to 2 pages, details below) covering past, ongoing, or future work.</div>
<div>Any topic that could be of interest to secure compilation is in scope. Secure</div>
<div>compilation should be interpreted broadly to include techniques that span</div>
<div>programming languages, architecture, and systems. Presentations that provide</div>
<div> a useful outside view or challenge the community are also welcome. </div>
<div>This includes presentations on new attack vectors such as microarchitectural</div>
<div> side-channels, whose defenses could benefit from compiler techniques.</div>
<div><br>
</div>
<div>Specific topics of interest include but are not limited to:</div>
<div>* Attacker models for secure compiler chains.</div>
<div>* Secure compiler properties: fully abstract compilation and similar properties,</div>
<div>memory safety, control-flow integrity, preservation of safety, information</div>
<div>flow and other (hyper-)properties against adversarial contexts, secure</div>
<div>multi-language interoperability.</div>
<div>* Secure interaction between different programming languages: foreign function</div>
<div>interfaces, gradual types, securely combining different memory management</div>
<div>strategies.</div>
<div>* Enforcement mechanisms and low-level security primitives: static checking,</div>
<div>program verification, typed assembly languages, reference monitoring, program</div>
<div>rewriting, software-based isolation/hiding techniques (SFI, crypto-based,</div>
<div>randomization-based, OS/hypervisor-based), security-oriented architectural</div>
<div>features such as Intel's SGX, MPX and MPK, capability machines, side-channel</div>
<div>defenses, object capabilities.</div>
<div>* Experimental evaluation and applications of secure compilers.</div>
<div>* Proof methods relevant to compilation: (bi)simulation, logical relations, game</div>
<div>semantics, trace semantics, multi-language semantics, embedded interpreters.</div>
<div>* Formal verification of secure compilation chains (protection mechanisms,</div>
<div>compilers, linkers, loaders), machine-checked proofs, translation validation,</div>
<div>property-based testing.</div>
<div><br>
</div>
<div><br>
</div>
<div>Guidelines for Submitting Extended Abstracts</div>
<div>============================================</div>
<div><br>
</div>
<div>Extended abstracts should be submitted in PDF format and not exceed 2 pages</div>
<div>(references not included). They should be formatted in two-column layout, 10pt</div>
<div>font, and be printable on A4 and US Letter sized paper. We recommend using the</div>
<div>new acmart LaTeX style in sigplan mode. Submissions are not anonymous and should</div>
<div>provide sufficient detail to be assessed by the program committee. Presentation</div>
<div>at the workshop does not preclude publication elsewhere.</div>
<div><br>
</div>
<div><br>
</div>
<div>Contact and More Information</div>
<div>============================</div>
<div><br>
</div>
<div>You can find more information on the workshop website:</div>
<div>https://popl25.sigplan.org/home/prisc-2025</div>
<div><br>
</div>
</body>
</html>