±±¾©Ê¯ÓÍ»¯¹¤Ñ§Ôº2026ÄêÑо¿ÉúÕÐÉú½ÓÊÕµ÷¼Á¹«¸æ
²é¿´: 205  |  »Ø¸´: 0
µ±Ç°Ö÷ÌâÒѾ­´æµµ¡£

maplewzx

½ð³æ (СÓÐÃûÆø)

[½»Á÷] ¡¾2009-6-12¡¿ACM CCS 2009 workshop»áÒé

CALL FOR PAPERS

***********************************************************************
    Workshop on Secure Execution of Untrusted Code  (SecuCode 2009)
            November 9, 2009, Hyatt Regency Chicago, IL, USA
                 http://www.docomoeurolabs.de/secucode/

                          In conjunction with
      ACM Conference on Computer and Communications Security 2009
                               (CCS 2009)
                   http://www.sigsac.org/ccs/CCS2009/
***********************************************************************

The workshop aims at bringing together researchers and practitioners from
industry and academia working on the protection of software systems against
untrusted code. The workshop will be a platform for presenting and discussing
recent developments and future directions.

Broadband access to the Internet is a key factor to the increased availability
of untrusted code. Typically, various applications are downloaded and executed
locally. All these applications have in common that their origin is often
unknown or their trustworthiness cannot be assessed. The user wants to be sure
that his system is not harmed when executing untrusted applications from an
unknown source. Thus, the applications should only access those resources and
only call those functions that are considered as non-security-critical. However,
to allow applications to execute properly, they need a minimal set of rights
which differs from application to application. The proliferation of malware and
the increment of flaws in program code require securing systems against
untrusted code to prevent unauthorized access to resources. The workshop
addresses various topics of this field.

TOPICS OF INTEREST
Intermediate languages (Java and .NET)
-        Programming language safety
-        Intermediate languages (e.g. Java bytecode, .NET CLI) safety
-        Security applied to intermediate language code
-        Intermediate language code verification and secure class loading
-        Runtime environment security and security extensions
-        Policy definition and policy enforcement
-        Access control
-        Information flow control
-        Security of distributed computing
Interpreted languages (Python, PHP, ???)
-        Programming language safety
-        Interpreter security
-        Access control
-        Information flow control
-        Security of distributed computing
Runtime monitoring (identifying prohibited resource accesses or function calls at runtime)
-        In-lining of code in applications
-        External monitors not running inside the application
-        Sandboxing: preventing applications from escaping their restricted
        environment
Static analysis (identifying prohibited resource accesses or function calls
prior to execution)
-        Source code analysis
-        Intermediate language code analysis
-        Reduction of the number of security checks at runtime
-        Policy generation
Security architectures (sound, coherent and holistic security approaches for a
system)
-        Protecting the system against untrusted code
-        Security policies
Miscellaneous (touches all the before mentioned topics)
-        Insufficiency of known security mechanisms and concepts
-        Security activities at standardisation organisations (e.g. JCP)
-        Performance loss due to security mechanisms (especially in resource
        constraint devices)
-        Hot topics and future topics in securing systems against untrusted code

SUBMISSION INSTRUCTIONS
Please consider to submit your contribution to the workshop. Submissions shall
be original, previously unpublished and not currently under review by another
conference or journal. Theoretic work and pragmatic approaches are welcomed.
Submissions that are usable and applicable in practice are especially welcomed.
Your contribution should either cover your current research in progress, your
research results, your experience from practical deployment of security
features, or it should be a position paper containing your thesis and
comprehensible reasoning. It should be written text at most eight pages
double-column ACM format
(http://www.acm.org/sigs/publications/proceedings-templates), including
references and appendices. Authors of accepted papers must guarantee that their
papers will be presented at the workshop.
Authors should submit the abstract of the paper through the online submission
system the week before the paper is due; helping us to assign reviewers.
Please submit your abstract and upload your paper in PDF format at EasyChair:
http://www.easychair.org/conferences/?conf=secucode09.

IMPORTANT DATES
- Abstract submission due:   Sun June 7, 2009
- Paper submissions due:     Fri June 12, 2009
- Acceptance notifications:  Fri August 14, 2009
- Camera-ready papers due:   Tue August 25, 2009
- Workshop:                  Mon November 9, 2009

PUBLICATION
Accepted papers will be published in the ACM Digital Library and in the
workshop proceedings on CD.

COMMITTEES

ORGANISATION COMMITTEE & PROGRAM CHAIRS
- Sven Lachmund, DOCOMO Euro-Labs, Germany
- Christian Schaefer, DOCOMO Euro-Labs, Germany

PROGRAM COMMITTEE
- Joerg Abendroth (Nokia Siemens Networks, Germany)
- Mads Dam (Royal Institute of Technology (KTH), Sweden)
- Jochen Haller (SAP, Germany)
- Antonio Lioy (Politecnico di Torino, Italy)
- Fabio Martinelli (National Research Council (IIT-CNR), Italy)
- Fabio Massacci (University of Trento, Italy)
- Chris Mitchell (Royal Holloway University of London, U.K.)
- Frank Piessens (Katholieke Universiteit Leuven, Belgium)
- Anand Prasad (NEC, Japan)
- Alexander Pretschner (Fraunhofer Institut Experimentelles Software
  Engineering, Germany)
- Thomas Quillinan (Vrije Universiteit Amsterdam, Netherlands)
- Yves Roudier (Institut Eurecom, France)
- Frederic Stumpf (Fraunhofer Institut Sichere
  Informationstechnologie, Germany)
- Eric Vetillard (Trusted Labs, France)
- Dan Wallach (Rice University, Houston, USA)
- Alf Zugenmaier (DOCOMO Euro-Labs, Germany)

» ²ÂÄãϲ»¶

½¡¿µ²ÅÊÇÍõµÀÌìµÀ³êÇÚÒ»ÇÐΪÁË¿ÆÑÐÒ»ÆðΪÁËÊÂÒµÒ»ÇÐΪÁËHAPPY
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ maplewzx µÄÖ÷Ìâ¸üÐÂ
×î¾ßÈËÆøÈÈÌûÍÆ¼ö [²é¿´È«²¿] ×÷Õß »Ø/¿´ ×îºó·¢±í
[¿¼ÑÐ] 343Çóµ÷¼Á +4 ÔùÎÒÒ»±¾Êé 2026-03-23 4/200 2026-03-27 00:40 by wxiongid
[¿¼ÑÐ] 342Çóµ÷¼Á +3 ¼ÓÓÍaÀîzs 2026-03-26 3/150 2026-03-27 00:29 by wxiongid
[¿¼ÑÐ] µ÷¼ÁÇóÊÕÁô +7 ¹ûÈ»ÓÐÎÒ 2026-03-26 7/350 2026-03-27 00:26 by wxiongid
[¿¼ÑÐ] »¯Ñ§308·ÖÇóµ÷¼Á +5 ÄãºÃÃ÷ÌìÄãºÃ 2026-03-23 5/250 2026-03-26 23:43 by ´ß»¯´ó°×
[¿¼ÑÐ] 349Çóµ÷¼Á +4 Àîľ×Ó°¡¹þ¹þ 2026-03-25 4/200 2026-03-26 22:49 by fmesaito
[¿¼ÑÐ] 08¹¤Ñ§µ÷¼Á +13 Óû§573181 2026-03-20 20/1000 2026-03-26 21:22 by Óû§573181
[¿¼ÑÐ] »úеѧ˶310·Ö£¬ÊýÒ»Ó¢Ò»£¬Ò»Ö¾Ô¸211±¾¿ÆË«·ÇÕÒµ÷¼ÁÐÅÏ¢ +3 @357 2026-03-25 3/150 2026-03-26 16:34 by by.MENG
[¿¼ÑÐ] 0856µ÷¼Á +4 ÇóÇóÈÃÎÒÓÐÊé¶Á° 2026-03-26 5/250 2026-03-26 15:54 by dick_runner
[¿¼ÑÐ] 281Çóµ÷¼Á +6 Koxui 2026-03-24 7/350 2026-03-26 15:37 by Î޼ʵIJÝÔ­
[¿¼ÑÐ] 299Çóµ÷¼Á +4 15188958825 2026-03-25 4/200 2026-03-25 22:56 by 418490947
[¿¼ÑÐ] Ò»Ö¾Ô¸ÄϺ½ 335·Ö | 0856²ÄÁÏ»¯¹¤ | GPA 4.07 | ÓпÆÑо­Àú +6 cccchenso 2026-03-23 6/300 2026-03-25 22:25 by 544594351
[¿¼ÑÐ] BÇø¿¼Ñе÷¼Á +4 yqdszhdap£­ 2026-03-22 5/250 2026-03-25 08:51 by baoball
[¿¼ÑÐ] ²ÄÁÏѧÇóµ÷¼Á +6 Stella_Yao 2026-03-20 6/300 2026-03-25 00:37 by baoball
[¿¼ÑÐ] Ò»Ö¾Ô¸ÎäÀí085500»úеרҵ×Ü·Ö300Çóµ÷¼Á +3 an10101 2026-03-24 7/350 2026-03-25 00:00 by ɽ¹í0-
[¿¼ÑÐ] 306Çó0703µ÷¼ÁÒ»Ö¾Ô¸»ªÖÐʦ·¶ +10 Ö½Óãly 2026-03-21 11/550 2026-03-24 17:22 by qingfeng258
[¿¼ÑÐ] ²ÄÁÏר˶331Çóµ÷¼Á +4 Ïʵ±Å£ 2026-03-24 4/200 2026-03-24 15:58 by JourneyLucky
[¿¼ÑÐ] Çóµ÷¼ÁÒ»Ö¾Ô¸Î人Àí¹¤´óѧ²ÄÁϹ¤³Ì£¨085601£© +5 WW.' 2026-03-23 7/350 2026-03-24 14:50 by sprinining
[¿¼ÑÐ] 276Çóµ÷¼Á¡£ÓаëÄêµç³ØºÍ°ëÄê¸ß·Ö×Óʵϰ¾­Àú +9 ²ÄÁÏѧ257Çóµ÷¼Á 2026-03-23 10/500 2026-03-24 07:36 by wangy0907
[¿¼ÑÐ] 298Çóµ÷¼Á +8 Éϰ¶6666@ 2026-03-20 8/400 2026-03-23 11:02 by laoshidan
[¿¼ÑÐ] 070300£¬Ò»Ö¾Ô¸±±º½320Çóµ÷¼Á +3 Jerry0216 2026-03-22 5/250 2026-03-23 09:16 by ¡£¡£ÌÃÌÃ
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û