[ The Types Forum (announcements only),
http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]
--------------------------------------------------------------------------
PLAS 2021 Call for Papers
16th Workshop on Programming Languages and Analysis for Security (PLAS 2021)
https://urldefense.com/v3/__https://plas21.software.imdea.org__;!!IBzWLUs!AmIX5jm3aEM8FzljTL7H7CILLSk2g2jt6fdStTREyUc0Dk2cW61Lwi2LYEeRIaRXFKSwz-sxsOj93Q$
Virtual Event
December 7, 2021
--------------------------------------------------------------------------
Important Dates
Paper submission: October 22, 2021 (AoE)
Author notification: November 12, 2021 (AoE)
Workshop date: December 7, 2021
--------------------------------------------------------------------------
PLAS provides a forum for exploring and evaluating the use of programming
language and program analysis techniques for promoting security in the complete
range of software systems, from compilers to machine-learned models and smart
contracts. The workshop encourages proposals of new, speculative ideas,
evaluations of new or known techniques in practical settings, and discussions
of emerging threats and problems. We also host position papers that are
radical, forward-looking, and lead to lively and insightful discussions
influential to the future research at the intersection of programming languages
and security.
The scope of PLAS includes, but is not limited to:
- Language-based techniques for detecting and eliminating side-channel
vulnerabilities
- Programming language techniques and verification applied to security in other
domains (e.g. adversarial learning and smart contracts)
- Software isolation techniques (e.g., SFI and sandboxing) and compiler-based
hardening techniques (e.g, secure compilation).
- Compiler-based security mechanisms (e.g. security type systems) or
runtime-based security mechanisms (e.g. inline reference monitors)
- Techniques for discovering and detecting security vulnerabilities, including
program (binary) analysis and fuzzing- Automated introduction and/or
verification of security enforcement mechanisms
- Language-based verification of security properties in software, including
verification of cryptographic protocols
- Specifying and enforcing security policies for information flow and access
control
- Model-driven approaches to security
- Security concerns for Web programming languages
- Language design for security in new domains such as cloud computing and IoT
- Applications, case studies, and implementations of these techniques
--------------------------------------------------------------------------
Call for Papers
We invite both short papers and long papers. For short papers, we especially
encourage the submission of position papers that are likely to generate lively
discussion as well as short papers covering ongoing and future work.
- Short papers should be at most 2 pages long, plus as many pages as needed for
references. Papers that present radical, open-ended and forward-looking ideas
are particularly welcome in this category. Authors submitting papers in this
category must prepend the phrase "Short Paper:" to the title of the submitted
paper.
- There is no page limit on long papers. Papers in this category are expected
to have relatively mature content. Papers that present promising preliminary
and exploratory work, or recently published work are particularly welcome in
this category. Long papers may receive longer talk slots at the workshop than
short papers, depending on the number of accepted submissions.
*NEW THIS YEAR* The workshop has no published workshop proceedings and there is
no restriction on paper format other than the page limits as stated above.
Presenting a paper (either short or long) at the workshop should not preclude
submission to or publication in other venues that are before, concurrent, or
after the workshop. Papers presented at the workshop will be made available to
workshop participants only.
--------------------------------------------------------------------------
Program Committee
Owen Arden (UC Santa Cruz)
Aslan Askarov (Aarhus University)
Stefano Calzavara (Università Ca’ Foscari Venezia)
Dana Drachsler Cohen (Technion)
Klaus von Gleissenthal (Vrije Universiteit Amsterdam)
Marco Guarnieri (IMDEA Software, Co-Chair)
Andrew Hirsch (Max Planck Institute for Software Systems)
Toby Murray (University of Melbourne)
Joe Near (University of Vermont)
Marco Patrignani (CISPA)
Hernán Ponce de León (Bundeswehr University Munich)
Jian Xiang (Harvard University)
Danfeng Zhang (Penn State University, Co-Chair)
--------------------------------------------------------------------------