? PPREW-4: 4th Program Protection and Reverse Engineering Workshop
  Call for Papers
  Accepted Papers
  Workshop Program
 Past Workshops

4th Program Protection and Reverse Engineering
ACM ICPSWorkshop (PPREW-4)

Hyatt French Quarter, New Orleans, LA
December 9, 2014
Collocated with ACSAC 2014

Early Registration Information

Early registration deadline: November 14, 2014

PPREW-4 is collocated with ACSAC-2014, held at the Hyatt French Quarter in New Orleans, LA, USA. Visit the ACSAC registration site for arrangement information. Registration cost for PPREW of $200 (early) / $250 (late) covers breakfast, lunch, and a welcome reception that evening. Group hotel rates are available for the conference.


Program protection and reverse engineering are dualisms of good and evil. Beneficial uses of reverse engineering abound: malicious software needs to be analyzed and understood in order to prevent their spread and to assess their functional footprint; owners of intellectual property (IP) at times need to recover lost or unmaintained designs. Conversely, malicious reverse engineering allows illegal copying and subversion and designers can employ obfuscation and tamper-proofing on IP to target various attack vectors. In this sense, protecting IP and protecting malware from detection and analysis is a double-edged sword: depending on the context, the same techniques are either beneficial or harmful. Likewise, tools that deobfuscate malware in good contexts become analysis methods that support reverse engineering for illegal activity.

PPREW is a forum for researchers and practitioners in academia, industry, and government who focus on analysis, security, and protection in software and hardware systems. PPREW invites papers on practical and theoretical approaches for program protection and reverse engineering used in beneficial contexts, focusing on analysis/deobfuscation of malicious code and methods/tools that hinder reverse engineering.
Topics of interest include, but are not limited to:

  • Obfuscation / deobfuscation
  • Tamper-proofing
  • Hardware-based protection
  • Side channel analysis vulnerabilities
  • Theoretical analysis frameworks:
    • Abstract Interpretation
    • Homomorphic Encryption
    • Term Rewriting Systems
    • Machine Learning
    • Large Scale Boolean Matching
  • Software watermarking
  • Digital fingerprinting
  • Reverse engineering tools / techniques
  • Program / circuit slicing
  • Component / functional Identification
  • Source code (static/dynamic) analysis
  • Information hiding and discovery
  • Virtualization for protection and/or analysis
  • Forensic and anti-forensic protection
  • Moving target and active cyber defense

Important Dates

Paper Submission: October 10, 2014
Author Notification: November 10, 2014
Pre-Workshop Version: December 3, 2014
Workshop: December 9, 2014
Camera Ready Version: December 20, 2014

Submissions handled through EasyChair.