In accordance with the spirit of EuroSys, we also seek:
In the past thirteen years, EuroSec was able to successfully attract papers on several of the above issues and thus was able to compile a high-quality systems security program. Last year, the EuroSec 2020 program included 7 accepted peer-reviewed papers and one keynote talk. More than 40 people attended the workshop last year.
The procedures of paper submission, selection, and publication will be similar to the procedures followed in the past EuroSec workshops. We expect to announce the Call for Paper in mid-December 2020 and have a paper submission deadline by mid-February 2021 after the EuroSys notification deadline. We expect the Call for Papers (as well as Call for Participation later) to be widely publicized by the PC members and most importantly by the Publicity Chairs who will be appointed by the PC co-chairs.
Each of the submitted papers will be peer-reviewed by 3-4 members of the Program Committee. All the reviews and discussions will be supported by an online conference management system (HotCrp). Based on each paper’s reviews and on the discussion among the PC members, a short list of about 7-9 accepted papers will be compiled. In addition to the presentation of the accepted technical papers, we expect to complement the Technical Program with one or two invited keynote talk(s) and/or panel. In case we organize a panel, we expect the panel to be forward-looking into a topic of interest to researchers in the field.
The Program Committee will be composed of well-known members of the systems and security community who have published their work in distinguished places such as SOSP, OSDI, EuroSys, ASPLOS, USENIX Security, IEEE S&P, CCS, NDSS, etc. We would like the papers to be published in the ACM Digital Library, as was done last year for EuroSec 2020.
EuroSec 2021 is expected to be a one-day workshop attended by around 40 participants. We expect that we will start the workshop with a keynote talk, followed by technical sessions that will last till the afternoon. We expect to close the workshop with a second keynote talk or a panel on some forward-looking aspects of research in systems and network security.
You are invited to submit papers of up to 6 pages, with 9-point font, in a two-column format, including figures, tables and references. Submitted papers must use the latest ACM sigconf proceedings template. You should not modify key aspects of the template, such as font face, spacing, etc. The template, as well as instructions on how to use it, can be found here.
All submissions will be reviewed by the Program Committee. Only original, novel work will be considered for publication. Accepted papers will be published in the Proceedings of EuroSec in the ACM Digital Library. One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.
Submissions should be made online at https://eurosec2021.hotcrp.com.
Registration Information: Registration to EuroSec 2021 must be made through EuroSys 2021 registration page: as the main conference, the workshop will be held online on Apr 26 (tentative program here below, on CEST timezone); we will be using Zoom as the conferencing platform.
|Welcome message from the PC Chairs
|Invited Keynote: Prof. Juan Caballero IMDEA Software, Madrid, Spain
|Session 1 - System Protection
|SGXoMeter: Open and Modular Benchmarking for Intel SGX
M. Mahhouk, R. Kapitza, N. Weichbrodt
|Fine-grained Program Partitioning for Security
Z. Huang, T. Jaeger, G. Tan
|SgxPecial: Specializing SGX-Interfaces against Code Reuse Attacks
S. Mishra, M. Polychronakis
|Session 2 - Program Analysis for Security
|TagVet: Vetting Malware Tags using Explainable Machine Learning
L. Pirch, A. Warnecke, C. Wressnegger, K. Rieck
|Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis
S. Bensalim, D. Klein, T. Barber, M. Johns
|dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting
A. Voulimeneas, D. Song, P. Larsen, M. Franz, S. Volckaert
|CollabFuzz: A Framework for Collaborative Fuzzing
S. Österlund, E. Geretto, A. Jemmett, E. Güler, P. Görz, T. Holz, C. Giuffrida, H. Bos
|Session 3 - Microarchitectural Side-Channel Attacks
|Reproducing Spectre Attack with gem5: How To Do It Right?
P. AYOUB, C. Maurice
|The Price of Meltdown and Spectre: Energy Overhead of Mitigations at Operating System Level
B. Herzog, S. Reif, J. Preis, T. Hönig, W. Schröder-Preikschat