<div dir="ltr">(Apologies if you're getting this email multiple times.)
<br>
<br>Short version: PriSC is a fun, welcoming and exciting venue. Share
updates, ideas, thoughts or send students for a friendly gathering that
may lead to future collaborations and ideas. Submit now!
<br>
<br>All details are on the PriSC site
<br><a class="gmail-moz-txt-link-rfc2396E" href="https://popl21.sigplan.org/home/prisc-2021"><https://popl21.sigplan.org/home/prisc-2021></a> and in this email.
<br>
<br>================================================
<br>Call for Presentations: PriSC 2021 @ POPL 2021
<br>================================================
<br>
<br>The emerging field of secure compilation aims to preserve security
<br>properties of programs when they have been compiled to low-level
<br>languages such as assembly, where high-level abstractions don’t exist,
<br>and unsafe, unexpected interactions with libraries, other programs,
<br>the operating system and even the hardware are possible. For unsafe
<br>source languages like C, secure compilation requires careful handling
<br>of undefined source-language behavior (like buffer overflows and
<br>double frees). Formally, secure compilation aims to protect high-level
<br>language abstractions in compiled code, even against adversarial
<br>low-level contexts, thus enabling sound reasoning about security in
<br>the source language. A complementary goal is to keep the compiled code
<br>efficient, often leveraging new hardware security features and
<br>advances in compiler design. Other necessary components are
<br>identifying and formalizing properties that secure compilers must
<br>possess, devising efficient security mechanisms (both software and
<br>hardware), and developing effective verification and proof techniques.
<br>Research in the field thus puts together advances in compiler design,
<br>programming languages, systems security, verification, and computer
<br>architecture.
<br>
<br>5th Workshop on Principles of Secure Compilation (PriSC 2021)
<br>=============================================================
<br>
<br>The Workshop on Principles of Secure Compilation (PriSC) is a
<br>relatively new, informal 1-day workshop without any proceedings. The
<br>goal is to bring together researchers interested in secure compilation
<br>and to identify interesting research directions and open challenges.
<br>The 5th edition of PriSC will be held on January 17 online,
<br>together with the ACM SIGPLAN Symposium on Principles of
<br>Programming Languages (POPL), 2021.
<br>
<br>Important Dates
<br>===============
<br>
<br>* Fri 30 Oct 2020: Submission deadline
<br>* Wed 25 Nov 2020: Notification
<br>* Sun 17 Jan 2021: Workshop
<br>
<br>Presentation Proposals and Attending the Workshop
<br>=================================================
<br>
<br>Anyone interested in presenting at the workshop should submit an
<br>extended abstract (up to 2 pages, details below) covering past,
<br>ongoing, or future work. Any topic that could be of interest to secure
<br>compilation is in scope. Secure compilation should be interpreted very
<br>broadly to include any work in security, programming languages,
<br>architecture, systems or their combination that can be leveraged to
<br>preserve security properties of programs when they are compiled or to
<br>eliminate low-level vulnerabilities. Presentations that provide a
<br>useful outside view or challenge the community are also welcome. This
<br>includes presentations on new attack vectors such as
<br>microarchitectural side-channels, whose defenses could benefit from
<br>compiler techniques.
<br>
<br>Specific topics of interest include but are not limited to:
<br>
<br>* Attacker models for secure compiler chains.
<br>* Secure compiler properties: fully abstract compilation and similar
<br>properties, memory safety, control-flow integrity, preservation of
<br>safety, information flow and other (hyper-)properties against
<br>adversarial contexts, secure multi-language interoperability.
<br>* Secure interaction between different programming languages: foreign
<br>function interfaces, gradual types, securely combining different
<br>memory management strategies.
<br>* Enforcement mechanisms and low-level security primitives: static
<br>checking, program verification, typed assembly languages, reference
<br>monitoring, program rewriting, software-based isolation/hiding
<br>techniques (SFI, crypto-based, randomization-based,
<br>OS/hypervisor-based), security-oriented architectural features such as
<br>Intel’s SGX, MPX and MPK, capability machines, side-channel defenses,
<br>object capabilities.
<br>* Experimental evaluation and applications of secure compilers.
<br>* Proof methods relevant to compilation: (bi)simulation, logical
<br>relations, game semantics, trace semantics, multi-language semantics,
<br>embedded interpreters.
<br>* Formal verification of secure compilation chains (protection
<br>mechanisms, compilers, linkers, loaders), machine-checked proofs,
<br>translation validation, property-based testing.
<br>
<br>Guidelines for Submitting Extended Abstracts
<br>============================================
<br>
<br>Extended abstracts should be submitted in PDF format and not exceed 2
<br>pages (references not including). They should be formatted in
<br>two-column layout, 10pt font, and be printable on A4 and US Letter
<br>sized paper. We recommend using the new acmart LaTeX style in sigplan
<br>mode.
<br>
<br>Submissions are not anonymous and should provide sufficient detail to
<br>be assessed by the program committee. Presentation at the workshop
<br>does not preclude publication elsewhere.
<br>
<br>Contact and More Information
<br>============================
<br>
<br>You can find more information on the workshop website:
<br><a class="gmail-moz-txt-link-freetext" href="https://popl21.sigplan.org/home/prisc-2021">https://popl21.sigplan.org/home/prisc-2021</a>
<br>
<br>For questions please contact the workshop chairs, Jonathan Protzenko
<br>and Deian Stefan.
</div>