<!DOCTYPE html>
<html data-lt-installed="true">
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body style="padding-bottom: 1px;">
* Submission Deadline: Fri 17 Oct 2025<br>
* Acceptance Notification: Mon 1 Dec 2025 (tentative)<br>
* Workshop: Sun 11 Jan 2026<br>
<br>
Submission website: <a class="moz-txt-link-freetext" href="https://urldefense.com/v3/__https://prisc26.hotcrp.com__;!!IBzWLUs!QHxUjkzqsWqOnPKkvYrYktKUzFTtjCFzJQoLf9NJx3MRZBHa35hGOFJh1mOHidCn07q4zoy4ba-yvKegB-Qykq9gfTwD-5XVpUKqar2vNFkY$">https://prisc26.hotcrp.com</a><br>
Workshop website: <a class="moz-txt-link-freetext" href="https://urldefense.com/v3/__https://popl26.sigplan.org/home/prisc-2026__;!!IBzWLUs!QHxUjkzqsWqOnPKkvYrYktKUzFTtjCFzJQoLf9NJx3MRZBHa35hGOFJh1mOHidCn07q4zoy4ba-yvKegB-Qykq9gfTwD-5XVpUKqaspoHV_Z$">https://popl26.sigplan.org/home/prisc-2026</a><br>
<br>
================================================<br>
Call for Presentations: PriSC @ POPL 2026<br>
================================================<br>
<br>
Secure compilation is an emerging field that puts together advances
in security,<br>
programming languages, compilers, verification, systems, and
hardware<br>
architectures in order to build compilers that eliminate many of
today's security<br>
vulnerabilities.<br>
<br>
<br>
10th Workshop on Principles of Secure Compilation (PriSC 2026)<br>
=============================================================<br>
<br>
The Workshop on Principles of Secure Compilation (PriSC) is an
informal 1-day<br>
workshop without any proceedings. The goal of this workshop is to
identify<br>
interesting research directions and open challenges and to bring
together<br>
researchers interested in working on building secure compilation
chains, on<br>
developing proof techniques and verification tools, and on designing
software or<br>
hardware enforcement mechanisms for secure compilation. The 10th
edition of PriSC<br>
will be held on January 11 in Rennes, France, together with<br>
the ACM SIGPLAN Symposium on Principles of Programming Languages
(POPL), 2026.<br>
<br>
<br>
Presentation Proposals and Attending the Workshop<br>
=================================================<br>
<br>
Anyone interested in presenting at the workshop should submit an
extended<br>
abstract (up to 2 pages, details below) covering past, ongoing, or
future work.<br>
Any topic that could be of interest to secure compilation is in
scope. Secure<br>
compilation should be interpreted broadly to include techniques that
span<br>
programming languages, architecture, and systems. Presentations that
provide<br>
a useful outside view or challenge the community are also welcome. <br>
This includes presentations on new attack vectors, such as
microarchitectural<br>
side-channels, whose defenses could benefit from compiler
techniques.<br>
<br>
Specific topics of interest include, but are not limited to:<br>
* Attacker models for secure compiler chains.<br>
* Secure compiler properties: fully abstract compilation and similar
properties,<br>
memory safety, control-flow integrity, preservation of safety,
information<br>
flow and other (hyper-)properties against adversarial contexts,
secure<br>
multi-language interoperability.<br>
* Secure interaction between different programming languages:
foreign function<br>
interfaces, gradual types, securely combining different memory
management<br>
strategies.<br>
* Enforcement mechanisms and low-level security primitives: static
checking,<br>
program verification, typed assembly languages, reference
monitoring, program<br>
rewriting, software-based isolation/hiding techniques (SFI,
crypto-based,<br>
randomization-based, OS/hypervisor-based), security-oriented
architectural<br>
features such as Intel's SGX, MPX and MPK, capability machines,
side-channel<br>
defenses, object capabilities.<br>
* Experimental evaluation and applications of secure compilers.<br>
* Proof methods relevant to compilation: (bi)simulation, logical
relations, game<br>
semantics, trace semantics, multi-language semantics, embedded
interpreters.<br>
* Formal verification of secure compilation chains (protection
mechanisms,<br>
compilers, linkers, loaders), machine-checked proofs, translation
validation,<br>
property-based testing.<br>
<br>
<br>
Guidelines for Submitting Extended Abstracts<br>
============================================<br>
<br>
Extended abstracts should be submitted in PDF format and not exceed
2 pages<br>
(references not included). They should be formatted in two-column
layout, 10pt<br>
font, and be printable on A4 and US Letter-sized paper. We recommend
using the<br>
new acmart LaTeX style in sigplan mode. Submissions are not
anonymous and should<br>
provide sufficient detail to be assessed by the program committee.
Presentation<br>
at the workshop does not preclude publication elsewhere.<br>
<br>
<br>
Contact and More Information<br>
============================<br>
<br>
You can find more information on the workshop website:
<a class="moz-txt-link-freetext" href="https://urldefense.com/v3/__https://popl26.sigplan.org/home/prisc-2026__;!!IBzWLUs!QHxUjkzqsWqOnPKkvYrYktKUzFTtjCFzJQoLf9NJx3MRZBHa35hGOFJh1mOHidCn07q4zoy4ba-yvKegB-Qykq9gfTwD-5XVpUKqaspoHV_Z$">https://popl26.sigplan.org/home/prisc-2026</a>
</body>
<lt-container></lt-container>
</html>