[ The Types Forum (announcements only),
     http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]

--------------------------------------------------------------------------

PLAS 2021 Call for Papers
16th Workshop on Programming Languages and Analysis for Security (PLAS 2021)

https://urldefense.com/v3/__https://plas21.software.imdea.org__;!!IBzWLUs!AmIX5jm3aEM8FzljTL7H7CILLSk2g2jt6fdStTREyUc0Dk2cW61Lwi2LYEeRIaRXFKSwz-sxsOj93Q$
 
Virtual Event 
December 7, 2021

--------------------------------------------------------------------------

Important Dates

Paper submission: October 22, 2021 (AoE) 
Author notification: November 12, 2021 (AoE)
Workshop date: December 7, 2021

--------------------------------------------------------------------------

PLAS provides a forum for exploring and evaluating the use of programming 
language and program analysis techniques for promoting security in the complete 
range of software systems, from compilers to machine-learned models and smart 
contracts. The workshop encourages proposals of new, speculative ideas, 
evaluations of new or known techniques in practical settings, and discussions 
of emerging threats and problems. We also host position papers that are 
radical, forward-looking, and lead to lively and insightful discussions 
influential to the future research at the intersection of programming languages 
and security.

The scope of PLAS includes, but is not limited to:

- Language-based techniques for detecting and eliminating side-channel 
vulnerabilities
- Programming language techniques and verification applied to security in other 
domains (e.g. adversarial learning and smart contracts)
- Software isolation techniques (e.g., SFI and sandboxing) and compiler-based 
hardening techniques (e.g, secure compilation). 
- Compiler-based security mechanisms (e.g. security type systems) or 
runtime-based security mechanisms (e.g. inline reference monitors)
- Techniques for discovering and detecting security vulnerabilities, including 
program (binary) analysis and fuzzing- Automated introduction and/or 
verification of security enforcement mechanisms
- Language-based verification of security properties in software, including 
verification of cryptographic protocols
- Specifying and enforcing security policies for information flow and access 
control
- Model-driven approaches to security
- Security concerns for Web programming languages
- Language design for security in new domains such as cloud computing and IoT
- Applications, case studies, and implementations of these techniques

--------------------------------------------------------------------------

Call for Papers

We invite both short papers and long papers. For short papers, we especially 
encourage the submission of position papers that are likely to generate lively 
discussion as well as short papers covering ongoing and future work. 

- Short papers should be at most 2 pages long, plus as many pages as needed for 
references. Papers that present radical, open-ended and forward-looking ideas 
are particularly welcome in this category. Authors submitting papers in this 
category must prepend the phrase "Short Paper:" to the title of the submitted 
paper.

- There is no page limit on long papers. Papers in this category are expected 
to have relatively mature content. Papers that present promising preliminary 
and exploratory work, or recently published work are particularly welcome in 
this category. Long papers may receive longer talk slots at the workshop than 
short papers, depending on the number of accepted submissions.

*NEW THIS YEAR* The workshop has no published workshop proceedings and there is 
no restriction on paper format other than the page limits as stated above. 
Presenting a paper (either short or long) at the workshop should not preclude 
submission to or publication in other venues that are before, concurrent, or 
after the workshop. Papers presented at the workshop will be made available to 
workshop participants only.

--------------------------------------------------------------------------

Program Committee

Owen Arden (UC Santa Cruz)
Aslan Askarov (Aarhus University)
Stefano Calzavara (Università Ca’ Foscari Venezia)
Dana Drachsler Cohen (Technion)
Klaus von Gleissenthal (Vrije Universiteit Amsterdam)
Marco Guarnieri (IMDEA Software, Co-Chair)
Andrew Hirsch (Max Planck Institute for Software Systems)
Toby Murray (University of Melbourne)
Joe Near (University of Vermont)
Marco Patrignani (CISPA)
Hernán Ponce de León (Bundeswehr University Munich)
Jian Xiang (Harvard University)
Danfeng Zhang (Penn State University, Co-Chair)

--------------------------------------------------------------------------

Reply via email to