coq-club AT inria.fr
Subject: The Coq mailing list
List archive
- From: PriSC PC Chairs <prisc.pc.chairs AT gmail.com>
- To: PriSC PC Chairs <prisc.pc.chairs AT gmail.com>
- Subject: [Coq-Club] PriSC @ POPL'25: Call for Presentations
- Date: Mon, 16 Sep 2024 11:16:54 +0200
- Authentication-results: mail3-smtp-sop.national.inria.fr; spf=None smtp.pra=prisc.pc.chairs AT gmail.com; spf=Pass smtp.mailfrom=prisc.pc.chairs AT gmail.com; spf=None smtp.helo=postmaster AT mail-lj1-f172.google.com
- Ironport-data: A9a23:3SA7dK1XVys18mAyQvbD5Xx1kn2cJEfYwER7XKvMYLTBsI5bp2QGm mRMC2yBbKnYZGWmfdtxa4iypxwCv5XWyNU3GVBq3Hw8FHgiRejtVY3IdB+oV8+xBpSeFxw/t 512hv3odp1coqr0/0/1WlTZhSAgk/vOHNIQMcacUghpXwhoVSw9vhxqnu89k+ZAjMOwa++3k YqaT/b3Zhn8g1aYDkpOs/jf8EI24ayo0N8llgVWic5j7Ae2e0Y9V8p3yZGZdxPQXoRSF+imc OfPpJnRErTxon/Bovv8+lrKWhViroz6ZWBiuVIKM0SWuSWukwRpukoN2FXwXm8M49mBt4gZJ NygLvVcQy9xVkHHsLx1vxW1j0iSlECJkVPKCSHXjCCd86HJW0P8xOlqM0MYBJVG+OtYX19oz vVIDj9YO3hvh8ruqF66Yuxlh8BmKMuyeY1G5SsmwjbeAvIrB5vERs0m5/cChGZ21p0IR66OI ZNGM1KDbzyYC/FLEk8NCYk12v+jwHL/ejxCs3qaoKM25y7YywkZPL3FYYSJJ4DbGJ89ckCwu F304ifTXDIgDeOQ82eCz2mTo8H0pHauMG4VPOblr6Y10QP7KnYoIBYRTB6wpeSzolWvXspWb U0S4Csn66YonHFHVfH4Vhy85XqG51sSAoUKVeI97w6Jx+zf5APx6nU4oiBpUMwhqMsJRxITz gGLkvy3OxpUue2zRifInluLlg+aNS8QJG4EQCYLSwoZ/tXuyL3faDqfHr6P94bl3rXI9SHM/ tyckMQpa1wuYSMj0qy6+RXDgWvpqMGWFEg64QLYWm/j5QR8DGJEW2BKwQmEhRqjBN/GJrVkg JTis5bHhAzpJc/R/BFhuM1XQNmUCw+taVUwe2JHEZg77CiK8HW+Z41W6zwWDB42aJhYI2KzP RCK5FM5CHpv0J2CPf8fj2WZW5RC8EQcPY20PhwpRoMRMsgvK1XflM2QTRTJhjiwzCDAbp3Ty b/ALJ/0UidEYUiW5DWxQOgZ3PcqwCt4rV4/triqpylLJYG2PSbPIZ9caAXmRrlgsMus/l+Jm /4BbJDi40sED4XDjtz/qtJ7waYidiVjWfgbaqV/Koa+H+aRMDh9VKCAne9wIN0NcmY8vr6gw 0xRk3RwkDLX7UAr4y3RApy6QOq3Bs4tnmFxJiE2I1ej1l4qZIvlvu9VdII6cfNjvKZvxOJ9B atNMciRIOV9ehKe8RQkbL75sNNDcjavjlmwJCaLWmU0UKNhYA3rweXaWDXT2hMANQeJkPcvg qaB01rbSKUTRg45A8fxbumu/myLvnMcubxTWhLIK+ZMZE/D95hOFB3hqO0WPvNWeAvxnCue8 wOwHx0jhPLsprUt+4LjnpG0rIaOEsp/EHFFHmLd062ECCnC8kenwq5CSOytbxmHcE/VoYKMP f50ydP4O905xGd6iZJ2SetX/Phv9unRqK9/5SU6OnfyNnCAKK5qe1uC1ulx7px9/KdT41aKa xje6+thGOu7Pe3+GwQsPysjVOOI0M8UlhT07fgYJEbb5jd9zIGYUHd9bgW9tyhAEIRbaI8V4 /8tmMoz2TyNjhAHNtWnjCcN00+uKncGcbsst7BEIYvNpzco9Gp/Ys3nOner2K2MVtRCCVl1A zm2gKGZua9Q6HCfeFUOFF/M/9Fnu7IwhD5wwmQvHW+5wuj+uqdv3Tl60ygGcQBO/xAWj8NxI jdKMmN2F4Wv/hBpps5JYE60ESocBhfDok3V4HkKnV3/UEOHeDHsLmo8GODV52Ef0TtWUQZ69 YGi6lTOcGjVbuCo+QAtS2tJlufFceVh0iHjxOW2ANWjHbQhRDju35+VemsDriX4DfMLhEHoo fdg+MByY/bZMRE8jrIaCY6I86Y5UzGBeXJ/RM9+8JMzHW3zfC+43R6MIRuTfuJPP/n7zl+qO fdxJ85gVwWM6wjWl2o1XZUzGr5TmOIlwPEgebmxfG4PjOa5nwpT6ZnV8nDzuX8vT9BQiv0CE 4L2dQ+ZM2mulHBRyn7srs5FBzKCWuM6RjbAhcK7zOZYMKg4krBIUVoz2b6KrXmqIFNZ3xaLj jjiOY7S7cJfkLpJoaW9PJlHNQuOLfHLaN+p6yG26tRHUsPOO5zBtiQTsVjWAD5VNrowBfVym ai8j9rs+EbjorwNcnv4nqOZHPJj/vSCX+twM+P2IkJFnCCEZtTe3hsb9028Kr1LiNl45PT7Y yedd+2Laoczd/pG4X9aeQxyMkw4MLvmSLXkqQeWjeW+OjJE3SPpdNqYpGLUN0dFfSo2CrjCI w7TudP1w/tHrY5JVSQ2N9s/D7BWeFbcCLYbLfvvvjylD06tsFOImp3msTECsTjrKH21IPzW0 KL/ZCrVVUqN4fnT7dRjrYZNkAUdDy99jckOb0stwYNKpA7gPlEWD9Y2EMsgMY5VoBzQxZujR TDqbUkeMwvfcwlAUy3B5IXEYl/CKM0IY9v3H2l8tQfcISK7H5iJD7Zd5z9tqSU+MCfqyOa8b 8oS4DvsNxy22YtkXvsX+uf9u+p82/fG3TgdzCgRSSAp78o2Wt3mFUCNHTahkQTCGsDJ0UHJf C07HD8eBk68TkH1HIBrfHs99NT1et/w521AUMtN6I+3V0anIClox/j2OuW12boGBCjPDKBbX mv5HgNh/EjPskH+esIVVxYBjqp9CPbNFc+/REMmqcv+gInoglka0wg+cebjgS3sFMOz078Qq 9V030UDOQ==
- Ironport-hdrordr: A9a23:oy3SG6DD3GfANVTlHel855DYdb4zR+YMi2TDtnoBNSC9F/byqy nApoV56feJ4wxhP03I9eruBECrewK/yXcN2/h0AV76ZniChILKFu1fBPXZrgEIQBeOkNK1vJ 0IG5SWbuefMbETt6zHCWKDc+rIruPnzEnmv5an8597JTsaEp2JdGxCe32m+m0dfng9OXKif6 Dsm/Z6mw==
- Ironport-phdr: A9a23:GwO6UxD2m8oOZkVt3tNFUyQUOkoY04WdBeb1wqQuh78GSKm/5ZOqZ BWZua41ygaZAM6CsrptsKn/jePJYS863d65qncMcZhBBVcuqP49uEgeOvODElDxN/XwbiY3T 4xoXV5h+GynYwAOQJ6tL1LdrWev4jEMBx7xKRR6JvjvGo7Vks+7y/2+94fcbghGmDaxe65+I Ra2oAneq8UanJZpJ7osxBfOvnZHdONayH9yK16Ugxjy+Nq78oR58yRXtfIh9spAXrv/cq8lU 7FWDykoPn4s6sHzuhbNUQWA5n0HUmULiRVIGBTK7Av7XpjqrCT3sPd21TSAMs33SbA0Ximi7 7tuRRT1hioLKyI1/WfKgcN3kK9Wrg6tqwFmz4LIfY2eKf5ycr7dcN8fQ2dKQ8RfWDFbAo6kY IQBD+QPM+VFoYfju1QDsACzChOwCO710DJEmmP60K883u88EQ/GxgsgH9cWvXrOttX1NbocX P6ox6fS0zjIcu1b2Tfn54jJaBAhuuyHULVoccrLyEkvDB/Kgk+IqYP5JT+ayuQNvHKa7+p6T uKikGEnqwRrrTiuwscgkJXGhoUQyl3d8yhy3Yk6K8GiRkFhfd6kDIVftzucN4ZuTc0vX29mt SgnxrAHt5O2cigExZsjyhPbZfKLbZaE7xL+WeueITl1hGxpdbywiRu9/katyO3yWMep3FhFo SdJjt/BvW0D2RzU78iIUPp9/kG51DaU1gDT5flEIUQumqrdMZIhxaQwlpULvUTDGS/2hFn5j LWOdkk+5ueo7OHnb7P7rZGfL495kh/yPrgql8ClAuk1MhICU3aH9em/zrHv4E/0TKtMg/Yrj KTZtI3aJd8HpqGnGQ9bz4cj6hehADq+zNgVm2QMIkhfdxKdlYfpPknDIPDmAve7hFShiDJry OrHPr3lG5nNKnrDnKr4cbZz9kJRyhQ/wcpQ55JTDbEBL/bzVVHruNPECR85NhS4w+fhCNpjy oMTQXyDDrOdPa/IslKF5vgjL/eQaIIWojrxNvoo6+D2gX88g1AdfK2p3ZUNaHC/G/RrO12ZY WDtgtcaDWgGpBI+Q/DwhFKeUT5cfXeyX7gn5jwgB4KmCJ3MRoGpgLCbwCi7GZhWanhACl+XC XjobZmLW+8QaCKOJc9siiEIWaC7S4A9zRGuqBP6y71/I+XI/S0YrIvv28Rx5+3Ojh4/7id0D sSY02GVVW54hGIIRzks3KB+u0Nx0FmD0bIry8BfQORJ5shiGj8RfbXcxu1gEJimQhjAZdzPU F3gSdWvACsqZt00yt4KJU16HoPxoArE2n+SGb4uvPSzL9Qf8qvdxWO5c95nym3NkrEqyVImS 8pVLkWpg6d+807YAIufwBbRrLqjaalJhH2Fz2yE12fb5RwwuG9YVKzEWStafU7KtZHi4VuES bayCLMhOw8HyMiYK6IMZMe6xU5eSqLFP9LTK3m0h3/2HQyBk6uWbZHhPX0Wmi7dAUkeiCgc+ H+HMU41ASLy63nGAmlWHEn0K1jp7fE4rXq6SkEuyATfd1dgzLHz4hVTjvyVSukI9r0BsSYl7 T5zGQX1xMrYXvyHoQcpZ6BAeZU97VNAgHrerBB4N4e8IrpKg1cfd0FzvRqr2UwoUMNPls8lq H5sxw13QU6B+HVGcT7QnZX5O7mMb3L34AjqcKnOnFfXzNeR/K4LrvU+sVTq+g+zRAIk9D183 t9Z3mH5hN2CBRcOUZ/3Tkc89gRr77DcbC4n4orI1HpqeaCquz7G0tgtCaMr0BGlN9tYNaqFE kf1Hah4T4C2Mu0xkB6xZVQPPOlT7rUcMMavdv/A06mufa5hkD+gkWVb8dVlyEvfkkg0AuXM3 psD37SZxl7dD2a63Arn6Jin39kbP2J3fCL30yXvCY9Pa7cneI8KDTzrOMir3pBlgIarXXdE9 VmlDldA2cmzeBPUYUauuG8YnUkRv3GjnjO1ijJulDR85LKF3TfFhfzpMhEHM29RX0FtiF7tJ c6/iNVQDy3KJ0A50QCo40r33f0RvL5+NGKVWUwOdCj/Lnt5eqS1v7uGJcVI7dl71EcfGPT5a lecRLnnphIc2C62BGpSygcwcDSys4n4lRh34I6EBE56t2GROcR5xBOEocfZWeYUxT0eAi9xl TjQAFG4ediv59Sd0ZnZ4KiyUGeoV5sbdieOr8vIrDG6/mYsGRb5lPC6m8f8OQc/2C7/kdJtU G3EoQ39bY/iy6mhebg/Lw84WRmms5o8Q94k2oIr4fNYkWAXnJCU4WYKnS/oPNNX1Li/JHsBS DgXwsLEtQ3s2UltNHWMlOebHj2WxspsYcX/Y3tDgHpsqZAXTv3MvPodwnEmxzjw5RjcavV8g DoHnP4n6XpBxvoMpBJo1SKFRLYbAUhfOyXo0RWO9dG36qtNNwPNOfC90lRzmde5AfSMuAZZD TzhYJY5Fmlo5YN0MFvNymbb5YTted2WZtUW/E7x8V+In61OJZQ9m+BfzzJ9OHn2+2UujeU7h B10xrm1uYGGLyNm+6fzUXs6fnXlIsgU/D/ql6NXmM2bipuuEptWETIORJL0TPisHWFapbH9O g2JCjF5tmaDFO+VA1qE8Ek/5SGqcdjjJzSNKXIe19knWBSNOBkVnlUPRDtj1p8hSlLxmYq4I R8/vGxOoAa/8EcEy/o0ZUejFD2E/0HxNG9yEN/GfX80pklD/xuHb5LYt7opWXkeptr79ESMM jDJOVoOVz1YHBzcQQikZOHm5MGcobfCQLPiaaKfO/PW7rUOMpXAjZO3jtk5o3DVbJjJZj86S KRlkktbASIgQ5SfwmpQDXxRz2WXNoaavEvuo3Is6JnurLKzHlqovNXqafMaMM0zqUru0OHTa qjJ3nY/cXEBidsN3SOakuFBmgNCzXg/LX/1Vu1R/S/VEPCKw/ERVUVKLXgpcpMPtvNZvEEFL 8ffjpmdOqdQqPkzBh8FUFXgnprsfskWOySmM0uBAk+XNbOALDmNwsftYKr6R6cCxONT/wa9v zqWCSqBdnyKiiXpWhazMOpNkDDTPRpQv5u4ewpsDm6rRczvaxmyOtt6xTMsxrh8inTPPG8ae T9yFiEF5qWX9j9di+5jFnZp63NkKayAmX/c4bCHcNAZtvxkBikynOVfoTw7x7ZT8CBYVal1l S/V/bsM6xmtluiCzCYiUQIb8G4awtLW+x86aeOAqcMTPBSMtAgA5miRFRkQ8t5sC9m0/rtV1 sCKj6XrbjFL79PT+8IYQcnSMsOOdnQ7Yn+LUHbZChUISTmzOCTRnUtYxbuK7HyOpd4iod7nm JMPUKRzW1k8F/dcAUNgVo9nQt8/TnY/nLiXgdRdr2K5twXUTd5Gs4rvU/uTBbDrKm/cg+AbP V0HxrT3KYlVPYr+kR8HCBEyjMHBHEzeWspIqytqY1ovoUlDx3N5S3U6x0Pvbg7FCJA7Gvu9n xpwgQx7M71FHNLE7FI+J16Mryw1whFZcTTNhDmQdHv1Lv71U9gJUWz7sE8+Np69SAFwP1Xao A==
- Ironport-sdr: 66e7f793_zMU/fHGOpir9A/UTIeuGplwPZtPYmQsJcPdOpArPNRuiWhm RWEkGuwL1K++xqiVeRN/XRgc04PM5Sohpka3nrA==
================================================
Call for Presentations: PriSC @ POPL 2025
================================================
Secure compilation is an emerging field that puts together advances in security,
programming languages, compilers, verification, systems, and hardware
architectures in order to devise more secure compilation chains that eliminate
many of today's security vulnerabilities and that allow sound reasoning about
security properties in the source language. For a concrete example, all modern
languages provide a notion of structured control flow and an invoked procedure
is expected to return to the right place. However, today's compilation chains
(compilers, linkers, loaders, runtime systems, hardware) cannot efficiently
enforce this abstraction against linked low-level code, which can call and
return to arbitrary instructions or smash the stack, blatantly violating the
high-level abstraction. Other problems arise because today's languages fail to
specify security policies, such as data confidentiality, and the compilation
chains thus fail to enforce them, especially against powerful side-channel
attacks. The emerging secure compilation community aims to address such problems
by identifying precise security goals and attacker models, designing more secure
languages, devising efficient enforcement and mitigation mechanisms, and
developing effective verification techniques for secure compilation chains.
9th Workshop on Principles of Secure Compilation (PriSC 2025)
=============================================================
The Workshop on Principles of Secure Compilation (PriSC) is an informal 1-day
workshop without any proceedings. The goal of this workshop is to identify
interesting research directions and open challenges and to bring together
researchers interested in working on building secure compilation chains, on
developing proof techniques and verification tools, and on designing software or
hardware enforcement mechanisms for secure compilation. The 9th edition of PriSC
will be held on January 20 in Denver, Colorado, United States together with
the ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), 2025.
Important Dates
===============
* Thu 7 Nov 2024: Submission Deadline
* Thu 5 Dec 2024: Acceptance Notification
* Mon 20 Jan 2025: Workshop
Presentation Proposals and Attending the Workshop
=================================================
Anyone interested in presenting at the workshop should submit an extended
abstract (up to 2 pages, details below) covering past, ongoing, or future work.
Any topic that could be of interest to secure compilation is in scope. Secure
compilation should be interpreted very broadly to include any work in security,
programming languages, architecture, systems or their combination that can be
leveraged to preserve security properties of programs when they are compiled or
to eliminate low-level vulnerabilities. Presentations that provide a useful
outside view or challenge the community are also welcome. This includes
presentations on new attack vectors such as microarchitectural side-channels,
whose defenses could benefit from compiler techniques.
Specific topics of interest include but are not limited to:
* Attacker models for secure compiler chains.
* Secure compiler properties: fully abstract compilation and similar properties,
memory safety, control-flow integrity, preservation of safety, information
flow and other (hyper-)properties against adversarial contexts, secure
multi-language interoperability.
* Secure interaction between different programming languages: foreign function
interfaces, gradual types, securely combining different memory management
strategies.
* Enforcement mechanisms and low-level security primitives: static checking,
program verification, typed assembly languages, reference monitoring, program
rewriting, software-based isolation/hiding techniques (SFI, crypto-based,
randomization-based, OS/hypervisor-based), security-oriented architectural
features such as Intel's SGX, MPX and MPK, capability machines, side-channel
defenses, object capabilities.
* Experimental evaluation and applications of secure compilers.
* Proof methods relevant to compilation: (bi)simulation, logical relations, game
semantics, trace semantics, multi-language semantics, embedded interpreters.
* Formal verification of secure compilation chains (protection mechanisms,
compilers, linkers, loaders), machine-checked proofs, translation validation,
property-based testing.
Guidelines for Submitting Extended Abstracts
============================================
Extended abstracts should be submitted in PDF format and not exceed 2 pages
(references not included). They should be formatted in two-column layout, 10pt
font, and be printable on A4 and US Letter sized paper. We recommend using the
new acmart LaTeX style in sigplan mode. Submissions are not anonymous and should
provide sufficient detail to be assessed by the program committee. Presentation
at the workshop does not preclude publication elsewhere.
Contact and More Information
============================
You can find more information on the workshop website:
https://popl25.sigplan.org/home/prisc-2025
Submission website: https://prisc25.hotcrp.com
For questions please contact the workshop chairs, Marco Patrignani
(marco.patrignani AT unitn.it) and Marco Vassena (m.vassena AT uu.nl).
Call for Presentations: PriSC @ POPL 2025
================================================
Secure compilation is an emerging field that puts together advances in security,
programming languages, compilers, verification, systems, and hardware
architectures in order to devise more secure compilation chains that eliminate
many of today's security vulnerabilities and that allow sound reasoning about
security properties in the source language. For a concrete example, all modern
languages provide a notion of structured control flow and an invoked procedure
is expected to return to the right place. However, today's compilation chains
(compilers, linkers, loaders, runtime systems, hardware) cannot efficiently
enforce this abstraction against linked low-level code, which can call and
return to arbitrary instructions or smash the stack, blatantly violating the
high-level abstraction. Other problems arise because today's languages fail to
specify security policies, such as data confidentiality, and the compilation
chains thus fail to enforce them, especially against powerful side-channel
attacks. The emerging secure compilation community aims to address such problems
by identifying precise security goals and attacker models, designing more secure
languages, devising efficient enforcement and mitigation mechanisms, and
developing effective verification techniques for secure compilation chains.
9th Workshop on Principles of Secure Compilation (PriSC 2025)
=============================================================
The Workshop on Principles of Secure Compilation (PriSC) is an informal 1-day
workshop without any proceedings. The goal of this workshop is to identify
interesting research directions and open challenges and to bring together
researchers interested in working on building secure compilation chains, on
developing proof techniques and verification tools, and on designing software or
hardware enforcement mechanisms for secure compilation. The 9th edition of PriSC
will be held on January 20 in Denver, Colorado, United States together with
the ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), 2025.
Important Dates
===============
* Thu 7 Nov 2024: Submission Deadline
* Thu 5 Dec 2024: Acceptance Notification
* Mon 20 Jan 2025: Workshop
Presentation Proposals and Attending the Workshop
=================================================
Anyone interested in presenting at the workshop should submit an extended
abstract (up to 2 pages, details below) covering past, ongoing, or future work.
Any topic that could be of interest to secure compilation is in scope. Secure
compilation should be interpreted very broadly to include any work in security,
programming languages, architecture, systems or their combination that can be
leveraged to preserve security properties of programs when they are compiled or
to eliminate low-level vulnerabilities. Presentations that provide a useful
outside view or challenge the community are also welcome. This includes
presentations on new attack vectors such as microarchitectural side-channels,
whose defenses could benefit from compiler techniques.
Specific topics of interest include but are not limited to:
* Attacker models for secure compiler chains.
* Secure compiler properties: fully abstract compilation and similar properties,
memory safety, control-flow integrity, preservation of safety, information
flow and other (hyper-)properties against adversarial contexts, secure
multi-language interoperability.
* Secure interaction between different programming languages: foreign function
interfaces, gradual types, securely combining different memory management
strategies.
* Enforcement mechanisms and low-level security primitives: static checking,
program verification, typed assembly languages, reference monitoring, program
rewriting, software-based isolation/hiding techniques (SFI, crypto-based,
randomization-based, OS/hypervisor-based), security-oriented architectural
features such as Intel's SGX, MPX and MPK, capability machines, side-channel
defenses, object capabilities.
* Experimental evaluation and applications of secure compilers.
* Proof methods relevant to compilation: (bi)simulation, logical relations, game
semantics, trace semantics, multi-language semantics, embedded interpreters.
* Formal verification of secure compilation chains (protection mechanisms,
compilers, linkers, loaders), machine-checked proofs, translation validation,
property-based testing.
Guidelines for Submitting Extended Abstracts
============================================
Extended abstracts should be submitted in PDF format and not exceed 2 pages
(references not included). They should be formatted in two-column layout, 10pt
font, and be printable on A4 and US Letter sized paper. We recommend using the
new acmart LaTeX style in sigplan mode. Submissions are not anonymous and should
provide sufficient detail to be assessed by the program committee. Presentation
at the workshop does not preclude publication elsewhere.
Contact and More Information
============================
You can find more information on the workshop website:
https://popl25.sigplan.org/home/prisc-2025
Submission website: https://prisc25.hotcrp.com
For questions please contact the workshop chairs, Marco Patrignani
(marco.patrignani AT unitn.it) and Marco Vassena (m.vassena AT uu.nl).
- [Coq-Club] PriSC @ POPL'25: Call for Presentations, PriSC PC Chairs, 09/16/2024
Archive powered by MHonArc 2.6.19+.