+-----------------------------------------------------------------------------+ | 4th Workshop on System Software for Trusted Execution (SysTEX 2019) | +-----------------------------------------------------------------------------+ Co-located with SOSP 2019 SysTEX, Huntsville, Ontario, Canada, 27th October 2019 [ IMPORTANT DATES (Times are AoE) ] August 21, 2019 Paper submission September 6, 2019 - Notification of acceptance October 1, 2019 - Camera Ready Deadline October 27, 2019 - Workshop The rise of new processor hardware extensions that permit fine-grained and flexible trusted execution, such as Intel's SGX, ARM's TrustZone, or AMD's SEV, introduces numerous novel challenges and opportunities for developers of secure applications. There is a burning need for cross-cutting systems support of such Trusted Execution Environments (TEEs) that spans all the layers of the software stack, from the OS through runtime to compilers and programming models. The 4th Workshop on System Software for Trusted Execution (SysTEX) will focus on systems research challenges related to TEEs, and explore new ideas and strategies for the implementation of trustworthy systems with TEEs. The workshop is also open to papers exploring attacks on current TEEs and strategies for mitigating such attacks. This is the fourth installment of the workshop that follows three successful workshops collocated with primary systems venues Middleware 2016, SOSP 2017 and CCS 2018 respectively. Topics of interest include but are not limited to: - Architecture, applications and implementation technologies for trusted platforms and trustworthy infrastructures - Middleware for distributed trusted execution - OS support for trusted execution - Trustworthy infrastructures and services for cloud computing (including resilience) - Attestation and integrity verification - Cryptographic aspects of trusted and trustworthy computing - Intrusion resilience in trusted computing - Virtualization for trusted platforms - Security policy and management of trusted computing - Privacy aspects of trusted computing - Verification of trusted computing architectures - Usability and end-user interactions with trusted platforms - Limitations of trusted computing - Usability and user perceptions of trustworthy systems and risks - Use case studies of trusted execution - Validation and performance evaluation of trusted hardware [ WORKSHOP CO-CHAIRS ] Kapil Vaswani, Microsoft Research Raoul Strackx, KU Leuven, Belgium Contact: kapilv@microsoft.com, raoul.strackx@cs.kuleuven.be [ PROGRAM COMMITTEE ] Pascal Felber, University of Neuchatel, Switzerland Christof Fetzer, TU Dresden, Germany Rüdiger Kapitza, TU Braunschweig, Germay Peter Pietzuch, Imperial College, United Kingdom Meltem Ozsoy, Intel, USA Vinod Ganapathy, Indian Institute of Science, India Jethro Beekman, Fortanix, USA Han Dongsu, KAIST, Korea Taesoo Kim, Georgia Tech, USA Ofir Weisse, University of Michigan, USA Marina Minkin, University of Michigan, USA Ferdinand Brasser, TU Darmstadt, Germany Tilo Müller, University Erlangen-Nürnberg, Germany Andrew Paverd, Microsoft Research Cambridge, UK Simon Johnson, Intel, USA [ FORMAT OF THE WORKSHOP ] The goal of the workshop is to foster collaboration and discussion among researchers and practitioners in this field. The workshop will be one full day. The program should primarily include presentations by authors of accepted papers (the workshop will have proceedings in the ACM digital library). [ SUBMISSION AND PUBLICATION ] SysTEX welcomes submissions in two formats: Regular research papers of at most 6 pages including references. Research papers should be work that is not previously published or concurrently submitted elsewhere and will be published in the proceedings. Short research statements of at most 1-2 pages. Research statements aim at fostering discussion and collaboration. Research statements may summarize research published elsewhere or outline new emerging ideas. Authors can choose if accepted research statements should be published in the proceedings. All submissions should be in PDF and must follow the ACM SIGPLAN format (http://www.acm.org/publications/proceedings-template). Reviewing is single-blind, and the names and affiliations of the authors must appear in the submitted papers. Each paper will receive at least three reviews from members of the program committee. Submissions that do not respect the formatting requirement may be rejected without review. Submissions site: https://hotcrp.doc.ic.ac.uk/systex19/