? PPREW-4: 4th Program Protection and Reverse Engineering Workshop
  Call for Papers
  Accepted Papers
  Workshop Program
 Past Workshops

4th Program Protection and Reverse Engineering
ACM ICPSWorkshop (PPREW-4)

Hyatt French Quarter, New Orleans, LA
December 9, 2014
Collocated with ACSAC 2014

Keynote Speakers

At this year's workshop we are fortunate to hear from several leading researchers working in software security analysis and protection.

Alvaro A. Cárdenas, Cyber Security Research and Education Institute (UT Dallas)

Talk: "Cyber-Physical Systems: Security and Privacy"

Alvaro A. Cárdenas is an Assistant Professor at the Department of Computer Science in the Erik Jonsson School of Engineering at the University of Texas at Dallas, where he is a member of the Cyber Security Research and Education Institute. He holds M.S. and Ph.D. degrees from the University of Maryland, College Park, and a B.S. from Universidad de los Andes, Colombia.

Before joining UT Dallas he was a postdoctoral scholar at the University of California, Berkeley, and a research staff at Fujitsu Laboratories of America in Sunnyvale California. He has also been an invited visiting professor at the University of Cagliari in Italy, an intern at INRIA-LORIA in France, and a SCADA intern working on ladder logic to replace legacy relay boxes at Occidental Petroleum Corporation in Caño Limón, Cobeñas, Colombia.

His research interests focus on computer security, cyber-physical systems, network intrusion detection, and wireless networks.

Edward J. Schwartz, Research Scientist, Software Engineering Institute (SEI)

Talk: "Leveraging Automated Program Analysis for Reverse Engineering"

Edward J. Schwartz is a research scientist at Carnegie Mellon University's Software Engineering Institute. He received his Ph.D. in Computer Engineering from Carnegie Mellon, where he studied how binary programs can be efficiently analyzed by recovering and utilizing high-level program abstractions, and was one of the primary developers of BAP, the Binary Analysis Platform.

He is broadly interested in leveraging formal methods and program analysis to automatically discover, exploit, and defend against software vulnerabilities.