SysTEX '24

7th Workshop on System Software for Trusted Execution (SysTEX 2024)

July 8th, 2024

Important dates

All deadlines are Anywhere on Earth (AoE = UTC-12h).

March 14 March 26, 2024 (23:59 AoE) Paper submission
April 30, 2024 Notification of acceptance
May 15, 2024 Camera ready version
July 8, 2024 Workshop

Call for Papers

The 7th Workshop on System Software for Trusted Execution (SysTEX) will focus on research challenges related to Trusted Execution Environments (TEEs) and explore new ideas and strategies for implementing trustworthy systems with TEEs. The workshop aims to foster collaboration and discussion among researchers and practitioners in this field. In recent years all major hardware manufacturers have developed some form of TEE support, making this technology widely available in consumer devices today, e.g., Intel SGX, AMD SEV-SNP, ARM TrustZone, IBM Z and PEF. These TEE primitives enable fine-grained and flexible trusted execution, but also introduce numerous novel challenges and opportunities for developers of secure applications. Hence, there is a burning need for cross-cutting systems support and security analysis of such TEEs that span all the layers of the software stack, from the OS through runtime to compilers, programming models, and novel applications. Furthermore, several new TEE extensions, such as Intel TDX, ARM Morello and CCA, NVIDIA Confidential Computing, will soon be available in the market, further pushing the research field of trusted execution. The workshop will also invite discussion on the challenges and opportunities for emerging TEE technologies, such as RISC-V's Keystone and Microsoft's Pluton, and the integration of TEE-based solutions with pervasive 5G networks, IoT, and AI applications.

Topics of interest include but are not limited to:

  • Architecture, applications, and implementation technologies for trusted platforms and trustworthy infrastructures
  • Limitations of trusted computing
  • Validation and performance evaluation of trusted hardware
  • Side-channel attacks and defenses for TEEs
  • Formal verification of TEE architectures, attestation protocols, and software
  • Cryptographic aspects of trusted and trustworthy computing
  • Privacy aspects of trusted computing
  • Secure OS and virtualization support for trusted execution
  • Cross-platform standardization of TEEs and interoperability issues
  • Heterogeneous confidential computing across TEEs
  • Energy-efficient trusted computing for sustainable infrastructures
  • Trusted I/O virtualization
  • TEE support for hardware accelerators
  • Usability and user perceptions of trustworthy systems and risks
  • Use case studies of trusted execution
  • Intrusion resilience in trusted computing
  • Emerging challenges in integrating TEEs with 5G and edge networks

Format of the workshop

SysTEX is a well-established, mature workshop that has been successfully organized six times. The goal of the workshop is to foster collaboration and discussion to encourage and advance innovative TEE security research. SysTEX has a particularly strong track record of attracting submissions from both industry and academia and encouraging intersection and cross-pollination of ideas in the systems and security fields, a natural fit for TEE research.

The workshop will be one full day. The program will primarily include original research presentations by authors of accepted papers (the workshop will have proceedings in IEEE Xplore), followed by interactive Q&A with the audience. The workshop may, furthermore, include a relevant keynote speaker.

Submission Guidelines

In line with the call for papers from previous editions, we invite both original research papers, as well as short research statements to encourage discussion at the workshop (as proven successful in last editions). Furthermore, for the upcoming edition, we want to explicitly recognize the importance of high-quality reusable software and hardware tools to aid research in the fast-changing TEE ecosystem (e.g., reverse-engineering and attack frameworks, binary and compiler defenses, open-source enclave processors).

Thus, SysTEX welcomes submissions in three formats:

  1. Regular research papers (6 pages, excluding references and well-marked appendices) to describe original work that is not previously published or concurrently submitted elsewhere.
  2. Short research statements (1-2 pages, excluding references and well-marked appendices) to encourage discussion and collaboration. Research statements may summarize research published elsewhere or outline new emerging ideas.
  3. Tool paper submissions (4 pages, excluding references and well-marked appendices) that describe open-source tools with a (potential for) meaningful impact for security and privacy research on TEEs. These papers will be evaluated based on their potential merit and usability, prioritizing practical value over novelty. Submissions may introduce entirely new tools or present incremental extensions to existing tools.

All submissions should be in PDF and must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template supplied by IEEE EuroS&P: Please do not use other IEEE templates.

Reviewing is double-blind and submissions must be anonymous and in English, taking care to refer to any previous work in the third person. Submissions will be treated confidentially by the PC chairs and the program committee members. Each paper will receive at least three reviews from members of the program committee. Submissions that do not respect the formatting requirement may be rejected without review.

Accepted papers will be published in the workshop proceedings through IEEE Xplore. Authors of accepted short research statement or tool papers may choose to opt-out from being published in the proceedings upon request.

At least one author of each accepted paper is required to attend the workshop and present the paper.

Submissions site:

Optional Artifact Evaluation (New )

Recognizing the importance of open science and reproducible artifacts for the security community, authors of accepted papers will be invited to optionally participate in a lightweight artifact evaluation. This initiative aims to add an optional "artifacts evaluated" badge on the website, linking to the corresponding open-source repository. The presence of this badge will not only acknowledge the commitment to open science by the authors but also enhance the visibility of these efforts.

The optional, non-mandotory artifact evaluation will be carried out by a dedicated volunteer artifact evaluation committee. The explicit focus will be on providing constructive feedback and cooperatively improving the quality and reproducibility of any code or data research artifacts.

Further details on the artifact-evaluation process will be communicated to authors upon acceptance.