Important Dates
Paper Submission Deadline | |
Notification to authors | |
Camera-ready versions |
Note: all deadlines are Anywhere On Earth (AOE) time
In today’s digital age, the need for software protection is crucial more than ever. With cyber attacks becoming increasingly sophisticated and pervasive, obfuscation and other forms of software protection are of interest not only to legitimate software developers seeking to safeguard their code and intellectual property, but also to malware writers seeking to create new viruses able to evade antivirus detection and to attackers in general, with the goal to steal sensitive information, compromise code integrity, or insert backdoors into targeted systems. Software protection is a complex and interdisciplinary field that intersects with many different fields such as cryptography, networks, computer architecture, operating systems, programming languages and compilers. The Workshop on Attacks and Software Protection (WASP) will provide a meeting point dedicated to exploring and advancing the latest research and techniques in software attacks, analysis and protection both from the offensive and the defensive perspective. WASP will focus on new models and techniques to defend software from tampering, reverse engineering, and piracy, as well as the development of new analysis techniques and new attack strategies that highlight the need for more complete defenses.
We invite submissions of original research papers on topics related to software attacks and protection. Possible topics include, but are not limited to:
- Software attacks and defenses
- Program Analysis
- Symbolic Execution
- Reverse Engineering
- Malware Analysis
- Software Obfuscation and De-obfuscation
- Software Watermarking and Fingerprinting
- Software Tampering and Anti-Tampering
- Software Piracy
- Software Steganography
- Software Similarity Analysis
- Authorship Attribution and Plagiarism Detection
- Side Channel Attacks
- Software Attestation
- Anti-Debugging and Anti-Simulation
- Machine and Deep Learning for Software Attack, Analysis and Protection
- IoT Software Attack and Defenses
- Hardware-based Software Protection
- Trusted Execution Environments, Trusted Platform Modules and Secure Elements
- Digital Rights Management
- Cloud Software Protection
Submission Details
All accepted papers will be published in the Springer LNCS series. Extended versions of selected papers will also be invited to a Special Issue of Journal of Information Security and Applications.
Submitted papers must not substantially overlap with previously published or currently under review papers for journals or conferences. The only accepted format for submission is pdf. All submissions must be written in English and follow the LNCS template available here, with a maximum length of 14 pages excluding appendices and bibliography, and 16 pages total. Appendices should be well-marked, but it’s not mandatory for the committee to review them. The review process is single-blind. Failure to comply with these guidelines may lead to rejection without considering the content’s quality. If accepted, authors must agree to the Springer LNCS copyright and present their papers at the workshop.
Submission site: https://easychair.org/conferences/?conf=wasp2023