|Submission deadline:||31 January, 2015 (Closed)
|Notification of acceptance:||18 February, 2015|
|Camera-ready papers:||27 February, 2015|
|Workshop date:||19 May, 2015|
Desired articles should cover one or several of the following topics:
1. Software Protection techniques
- Code Obfuscation, Anti-reverse engineering
- Data obfuscation, White-box Cryptography
- Binary Rewriting, Binary Instrumentation
- Remote Attestation
- Code Virtualization, Software Dynamic Translation
- Software Tamper Resistance, Code Guards
- Software Diversity
- Software Renewability, Mobile Code
- Software Licensing, Watermarking, Fingerprinting
- Self-modifying Code
2. Software Protection Evaluation
- Evaluation Methodologies
- Malware Analysis
- Tools for static and dynamic software analysis
- Threat modeling, Petri nets, attack graphs
- Empirical studies
3. Software Protection in Industry
- Protection technique tooling and tool chains
- Architectures and build process integration
- IDEs and tools for integration and deployment
- Best practices from industrial use cases
- Software protection on heterogeneous devices
Accepted papers will be published in the IEEE ICSE workshop proceedings. Submissions can be of two types: regular papers or short papers.
Short papers can be initial works of PhD students or opinion pieces from recognized experts.
Regular papers must follow the ICSE 2015 Format and Submission Guidelines and must have a maximum length of seven (7) pages; short papers must have a maximum length of four (4) pages.
Submissions in excess of these limits may be rejected without refereeing.
Articles must be novel: IEEE does not republish material published previously in other venues, including other periodicals and formal conference/workshop proceedings, whether previous publication was in print or in electronic form.
For general author guidelines, follow this link . For submission, check the SPRO official webpage.
For informal queries about the submission contact the workshop chairs.