ROOTS solicits contributions that focus on theorems and root shells: things you absolutely cannot argue with in security.
The first European symposium of its kind, ROOTS aims to provide an industry-friendly academic platform to discuss trends in exploitation, reversing, offensive techniques, and effective protections. Submissions should provide novel attack forms, describe novel reversing techniques, or effective deployable defenses. Submissions can also provide a comprehensive overview of the state-of-the-art, and pinpoint promising areas that have not received appropriate attention in the past.
Topics of interest include but are not limited to:
- New exploitation techniques and methodologies
- New reverse engineering techniques and methodologies
- The role of exploitation in the science of security
- The role of reverse engineering in the science of security
- New unintended models of programming and execution wherein the program is encoded in data, metadata, descriptors, etc.
- Formal models of exploitation and formal methods for exploitation
- Systematization of knowledge in exploitation
- Systematization of knowledge in reverse engineering
- Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.
- Reverse engineering of trending platforms and architectures: IoT, cloud, SDNs, etc.
- Exploitation perspectives on emerging trust models: SGX, blockchains, etc.