15th European Workshop on Systems Security
April 5, 2022
The 15th European Workshop on Systems Security (EuroSec) aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The objective of the workshop is to discuss novel, practical, systems-oriented work. The workshop will precede the EuroSys 2022 conference.
EuroSec encourages systems security researchers to share early iterations of bleeding-edge ideas with the community, before they are further developed into full papers. Reciprocally, authors receive feedback to help steer and improve their research to its full potential. Many EuroSec papers later form the basis for full conference papers presented at one of the top venues in computer security.
EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to):
In accordance with the spirit of EuroSys, we also seek:
You are invited to submit papers of up to 6 pages in double-column ACM format, excluding the bibliography. Submitted papers must use the latest ACM sigconf proceedings template. You should not modify key aspects of the template, such as font face, spacing, etc. The template, as well as instructions on how to use it, can be found here.
All submissions will be reviewed by the Program Committee. Only original, novel work will be considered for publication. Accepted papers will be published in the Proceedings of EuroSec in the ACM Digital Library. One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.
Submissions should be made online at https://eurosec2022.hotcrp.com.
Registration Information: Registration to EuroSec 2022 must be made through EuroSys 2022 registration page: as the main conference, the workshop will be held online on Apr 05 (tentative program here below, on CEST timezone);
|08:45–09:00||Welcome message from the PC Chairs|
|09:00–10:00||Invited Keynote: Prof. Yan Shoshitaishvili (@Zardus), Arizona State University, USA|
|How Cyber Reasoning Systems Stub Their Toes|
|10:30–12:00||Session 1 - System Security|
|Tiered Trust for Useful Embedded Systems Security
H. Ayers, P. Dutta, P. Levis, A. Levy, P. Pannuto, J. Van Why, J. Watson
|Look Ma, No Constants: Practical Constant Blinding in GraalVM
F. Berlakovich, M. Neugschwandtner, G. Barany
|RetTag: Hardware-assisted Return Address Integrity on RISC-V
Y. Wang, J. Wu, T. Yue, Z. Ning, F. Zhang
|13:45–14:45||Invited Keynote: Dr. Clémentine Maurice (@BloodyTangerine), CNRS, France|
|Reproducible Research: from Paper to Artifact Evaluation|
|14:45–15:45||Session 2 - Web and Browser Security|
|On the Effectiveness of Same-Domain Memory Deduplication
A. Costi, B. Johannesmeyer, E. Bosman, C. Giuffrida, H. Bos
|Towards Securely Migrating WebAssembly Enclaves
V. Pop, A. Niemi, V. Manea, A. Rusanen, J. Ekberg
|16:20–18:20||Session 3 - Security and Privacy in Distributed and Decentralized Systems|
|A Systematic Analysis of the Event-Stream Incident
I. Arvanitis, G. Ntousakis, S. Ioannidis, N. Vasilakis
|Where the Sidewalk Ends: Privacy of Opportunistic Backhaul
T. Despres, S. Patil, A. Tan, J. Watson, P. Dutta
|OUTOPIA: Private User Discovery on the Internet
P. Papadopoulos, M. Pachilakis, A. Chariton, E. Markatos
|DeFIRED: decentralized authorization with receiver-revocable and refutable delegations
P. Vrielynck, E. Beni, K. Jannes, B. Lagaisse, W. Joosen