The rise of new processor hardware extensions that permit fine-grained and flexible trusted execution, such as Intel’s SGX, ARM’s TrustZone, or AMD’s SEV, introduces numerous novel challenges and opportunities for developers of secure applications. There is a burning need for cross-cutting systems support of such Trusted Execution Environments (TEEs) that spans all the layers of the software stack, from the OS through runtime to compilers and programming models.
The 4th Workshop on System Software for Trusted Execution (SysTEX) will focus on systems research challenges related to TEEs, and explore new ideas and strategies for the implementation of trustworthy systems with TEEs. The workshop is also open to papers exploring attacks on current TEEs and strategies for mitigating such attacks.
This is the fourth installment of the workshop that follows three successful workshops collocated with primary systems venues Middleware 2016, SOSP 2017 and CCS 2018 respectively.
Topics of interest include but are not limited to: - Architecture, applications and implementation technologies for trusted platforms and trustworthy infrastructures - Middleware for distributed trusted execution - OS support for trusted execution - Trustworthy infrastructures and services for cloud computing (including resilience) - Attestation and integrity verification - Cryptographic aspects of trusted and trustworthy computing - Intrusion resilience in trusted computing - Virtualization for trusted platforms - Security policy and management of trusted computing - Privacy aspects of trusted computing - Verification of trusted computing architectures - Usability and end-user interactions with trusted platforms - Limitations of trusted computing - Usability and user perceptions of trustworthy systems and risks - Use case studies of trusted execution - Validation and performance evaluation of trusted hardware
|Submissions:||August 15, 2019|
|Notification:||September 6, 2019|
|Event:||October 27, 2019-October 27, 2019|