[cryptography] mail for cryptography mailing list

Paolo Falcarin falcarin at gmail.com
Mon Jun 7 12:45:29 EDT 2010


Dear Mr Palmer,
here follows an updated call for papers, in case of acceptance.

kind regards

Paolo Falcarin

==========================================================
Call for Papers
IEEE Software
Special Issue on Software Protection

URL: http://www.computer.org/portal/web/computingnow/swcfp2
===========================================================

Important Dates
===============
Submission Deadline: 1 August 2010
Notification: 9 October 2010
Revisions of Accepted Papers: 30 October 2010
Final Decision: 20 November 2010
Final Versions of Accepted Papers: 2 December 2010
Publication: March 2011


What is Software Protection?
============================
Software companies have much at stake in protecting their valuable 
intellectual property. Software protection techniques aim at developing 
algorithms that defend the integrity of data and software applications, 
deployed on untrusted hosts, from reverse engineering, piracy, and 
unauthorized and malicious modifications. Adopting such techniques can 
mean the difference between business survival and failure.
In particular, software developers face these recurring issues:
* What are the current threats to intellectual property, and what are 
the key protection mechanisms?
* How to evaluate and compare different protection tools and techniques, 
and how to select the one that best fits a particular company's 
requirements?
* What are concrete examples and case studies of attacks to software 
products, and what lessons can be learned from failures caused by lack 
of attention to software protection?
* How can software protection be used to prove authorship violation, and 
how are these mechanisms recognized by international laws?
* What kinds of software protection techniques are commonly deployed by 
malicious software, and what approaches and tools are effective against 
such methods?

Software protection is an area of growing importance in software 
engineering and security: leading-edge researchers have developed 
several pioneering approaches for preventing or resisting software 
piracy and tampering, building a heterogeneous body of knowledge 
spanning different topics: obfuscation, information hiding, reverse 
engineering, source/binary code transformation, operating systems, 
networking, encryption, and trusted computing.

Topics
======
IEEE Software seeks submissions for a special issue on software 
protection. We seek articles that present proven mechanisms and 
strategies to mitigate one or more of the problems faced by software 
protection. These strategies should offer practitioners appropriate 
methods, approaches, techniques, guidelines, and tools to support 
evaluation and integration of software protection techniques into their 
software products.

Possible topics include:
     * Analysis of legal, ethical, and usability aspects of software 
protection
     * Best practices and lesson learned while dealing with different 
relevant threats
     * Case studies on success and/or failure in applying software 
protections
     * Code obfuscation and reverse-engineering complexity
     * Computing with encrypted functions and data
     * Protection of authorship: watermarking and fingerprinting
     * Remote attestations and network-based approaches
     * Security evaluation of software protection's effectiveness
     * Software protection methods used by malware (viruses, rootkits, 
worms, and botnets)
     * Source and binary code protections
     * Tamper-resistant software: mobile, self-checking, and 
self-modifying code
     * Tools to implement or defeat software protections
     * Trusted computing or other hardware-assisted protection
     * Virtualization and protections based on operating systems

Contributions
=============
Submissions can be either regular or short articles. Regular articles 
must not exceed 4,700 words, including figures and tables, which count 
for 200 words each. Submissions in excess of these limits may be 
rejected without refereeing. The articles we deem within the theme and 
scope will be peer reviewed and are subject to editing for magazine 
style, clarity, organization, and space. Be sure to include the name of 
the special issue when you are submitting your regular paper to the IEEE 
Web site.

Short papers are contributions (max 1,000 words) from recognized experts 
on the state of the art (and the open issues) of software protection 
from different viewpoints:
     * Software protection researcher
     * Vendor of software protection tools
     * Open source community
     * Software security through hardware
     * Company using software protection tools to protect their products
     * Government institutions

Short papers must be directly submitted by email to the guest editors 
(sw2-2011 at computer.org) for review, putting [IEEE Software Protection] 
in the email subject.

All articles should have a practical orientation and be written in a 
style accessible to practitioners. Overly complex, purely 
research-oriented, or theoretical treatments are not appropriate. 
Articles should be novel. IEEE Software does not republish material 
published previously in other venues, including other periodicals and 
formal conference/workshop proceedings, whether previous publication was 
in print or in electronic form.

Further Information
===================
For more information about the focus, contact the Guest Editors ( 
sw2-2011 at computer.org ) :

     * Paolo Falcarin, University of East London
     * Christian Collberg, University of Arizona
     * Mikhail Atallah, Purdue University
     * Mariusz Jakubowski, Microsoft Research

Please check the official web-page: 
http://www.computer.org/portal/web/computingnow/swcfp2

For general author guidelines: www.computer.org/software/author.htm
For submission details: software at computer.org

Editorial Board
=============================

Aldo Basile, Politecnico di Torino, Italy
Ryad Benadijla, Orange, France
Jan Cappaert, Katholieke Universiteit Leuven, Belgium

Mariano Ceccato, Fondazione Bruno Kessler, Italy
<mailto:ceccato at fbk.eu>

Ee-Chien Chang, National University of Singapore
Bruno Crispo, University of Trento, Italy
Mila Dalla Preda, University of Verona, Italy
Bjorn De Sutter, Ugent, Belgium
Stefano Di Carlo, Politecnico di Torino, Italy
Teddy Furon, INRIA Rennes, France
Roberto Giacobazzi, University of Verona, Italy
Pierre Girard, Gemalto, France
Yuan Gu, Cloakware
Wulf Harder, QuBalt & whiteCryption

Amir Herzberg, Bar-Ilan University, Israel
William Horne, HP

Stefan Katzenbeisser, Philips Research, Netherlands
Darko Kirovski, Microsoft Research, USA
Nessim Kisserli, KU Leuven, Belgium
Igor Kotenko, SPIIRAS,Saint Petersburg, Russia
Antonio Mana, University di Malaga, Spain
John McHugh, Dalhousie University, Canada
Akito Monden, NAIST,Japan
Ginger Myles, Apple

Gianluca Ramunno, Politecnico di Torino, Italy
Thomas Reps, Grammatech
Phil Sallee, Booz Allen Hamilton, USA
Haya Shulman, Bar-Ilan University, Israel
Clark Thomborson, University of Auckland, New Zealand
Ramarathnam Venkatesan Microsoft <mailto:venkie at microsoft.com>
Adolfo Villafiorita, Fondazione Bruno Kessler, Italy
Martin Ward, De Montfort Univ. & Software Migrations Ltd
Brecht Wyseur, Nagravision, Switzerland
Alessandro Zorat, University of Trento, Italy


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20100607/f6ea052c/attachment.html>


More information about the cryptography mailing list