3rd International Workshop on Software PROtection

Scope of the Workshop

Software Protection techniques aim to defend the confidentiality and integrity of software applications exposed to man-at-the-end (MATE) attacks, performed by a trusted user that shares the execution host and access privileges of the application on a computer system.

MATE attacks can take many forms. In a tampering attack, the user violates the integrity of the code, by modifying it in ways the software vendor didn’t intend. In a malicious reverse-engineering attack, he violates the vendor’s confidentiality rights by extracting intellectual property from the code; in a cloning attack (software piracy), he violates copyright laws by distributing illegal copies. This is an area of growing importance for industry: in many cases the deployment of such techniques is crucial for the survival of their business.

The aim of SPRO workshop is to bring together researchers and industrial practitioners both from software protection and the wider software engineering community to discuss software protection techniques, evaluation methodologies, and practical aspects such as tooling. The objective is to stimulate the community working in this growing area of security, and to increase the synergies between the research areas of software protection engineering and their practical deployment.

Questions that we aim to address include

  • What protection techniques can be designed to protect given assets in software applications?
  • Which threats need to be considered, and how can we evaluate the robustness of protected applications with respect thereto?
  • How can different protection techniques be efficiently combined and what do we gain?
  • What can we learn from existing use cases?
  • How can protection techniques be efficiently tooled and integrated into a build process?

These are only a few of the many questions that practitioners face recurrently.

Desired articles should aim to address these questions. We seek articles that present new software protection techniques and novel insights into the evaluation thereof; and articles that aim to discuss industrial aspects.