RE-TRUST 2008 invites abstract submissions on theory and techiques that
are related to "Remote Entrusting".
We are seeking contributions that will stimulate the discussion in several different areas. Topics
include, but are not limited to:
|
- Computing with encrypted functions and data
- Dynamic software updating
- Hardware assisted software obfuscation
- Obfuscation metrics
- Remote software attestation
- Remote entrusting
- Self modifying code
|
- Software obfuscation techniques
- Software reverse engineering (and complexity)
- Tamper resistant software
- Trust mitigation
- Trusted Computing
- White-box cryptography
- Use of Smart Cards and TPMs for remote entrusting
|
The results themselves may or may not be recent, however we encourage the speakers to position the work
in the context of "Remote Entrusting".
|
You can download the "Call for contribution" in PDF format
here
|
Important Dates
Submissions date: September 5, 2008
Submissions date: September 12, 2008
Notification date: September 17, 2008
Workshop date: October 15 - 16, 2008
|
|
|