7th Workshop on System Software for Trusted Execution (SysTEX 2024)
July 8th, 2024
All deadlines are Anywhere on Earth (AoE = UTC-12h).
Paper submission | ||
April 30, 2024 | Notification of acceptance | |
May 15, 2024 | Camera ready version | |
July 8, 2024 | Workshop |
The 7th Workshop on System Software for Trusted Execution (SysTEX) will focus on research challenges related to Trusted Execution Environments (TEEs) and explore new ideas and strategies for implementing trustworthy systems with TEEs. The workshop aims to foster collaboration and discussion among researchers and practitioners in this field. In recent years all major hardware manufacturers have developed some form of TEE support, making this technology widely available in consumer devices today, e.g., Intel SGX, AMD SEV-SNP, ARM TrustZone, IBM Z and PEF. These TEE primitives enable fine-grained and flexible trusted execution, but also introduce numerous novel challenges and opportunities for developers of secure applications. Hence, there is a burning need for cross-cutting systems support and security analysis of such TEEs that span all the layers of the software stack, from the OS through runtime to compilers, programming models, and novel applications. Furthermore, several new TEE extensions, such as Intel TDX, ARM Morello and CCA, NVIDIA Confidential Computing, will soon be available in the market, further pushing the research field of trusted execution. The workshop will also invite discussion on the challenges and opportunities for emerging TEE technologies, such as RISC-V's Keystone and Microsoft's Pluton, and the integration of TEE-based solutions with pervasive 5G networks, IoT, and AI applications.
Topics of interest include but are not limited to:
SysTEX is a well-established, mature workshop that has been successfully organized six times. The goal of the workshop is to foster collaboration and discussion to encourage and advance innovative TEE security research. SysTEX has a particularly strong track record of attracting submissions from both industry and academia and encouraging intersection and cross-pollination of ideas in the systems and security fields, a natural fit for TEE research.
The workshop will be one full day. The program will primarily include original research presentations by authors of accepted papers (the workshop will have proceedings in IEEE Xplore), followed by interactive Q&A with the audience. The workshop may, furthermore, include a relevant keynote speaker.
In line with the call for papers from previous editions, we invite both original research papers, as well as short research statements to encourage discussion at the workshop (as proven successful in last editions). Furthermore, for the upcoming edition, we want to explicitly recognize the importance of high-quality reusable software and hardware tools to aid research in the fast-changing TEE ecosystem (e.g., reverse-engineering and attack frameworks, binary and compiler defenses, open-source enclave processors).
Thus, SysTEX welcomes submissions in three formats:
All submissions should be in PDF and must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template supplied by IEEE EuroS&P: eurosp2023-template.zip Please do not use other IEEE templates.
Reviewing is double-blind and submissions must be anonymous and in English, taking care to refer to any previous work in the third person. Submissions will be treated confidentially by the PC chairs and the program committee members. Each paper will receive at least three reviews from members of the program committee. Submissions that do not respect the formatting requirement may be rejected without review.
Accepted papers will be published in the workshop proceedings through IEEE Xplore. Authors of accepted short research statement or tool papers may choose to opt-out from being published in the proceedings upon request.
At least one author of each accepted paper is required to attend the workshop and present the paper.
Submissions site: https://systex24.hotcrp.com
Recognizing the importance of open science and reproducible artifacts for the security community, authors of accepted papers will be invited to optionally participate in a lightweight artifact evaluation. This initiative aims to add an optional "artifacts evaluated" badge on the website, linking to the corresponding open-source repository. The presence of this badge will not only acknowledge the commitment to open science by the authors but also enhance the visibility of these efforts.
The optional, non-mandotory artifact evaluation will be carried out by a dedicated volunteer artifact evaluation committee. The explicit focus will be on providing constructive feedback and cooperatively improving the quality and reproducibility of any code or data research artifacts.
Further details on the artifact-evaluation process will be communicated to authors upon acceptance.