Location via proxy:   
[Report a bug]   [Manage cookies]                

CheckMATE

Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks

The CheckMATE workshop will be collocated with the ACM Conference on Computer and Communications Security (CCS) 2021

MATE (Man-At-The-End) is an attacker model where an adversary has access to the target software and/or hardware environment of his victim and the ability to observe and modify it in order to extract secrets such as cryptographic keys or sensitive information, possibly with the subsequent goal of compromising code integrity or inserting backdoors, among others. A typical example of such a scenario is the case of an attack on a stolen smartphone or against software leveraging protection to offer premium content and/or features such as paid TV channels.

The main focus of CheckMATE is on new models and techniques to defend software from tampering, reverse engineering, and piracy as well as to the development of new attack strategies that highlight the need of more complete defenses.

Conference/workshop registration

You can register for ACM CCS and for the CheckMate workshop here.

Workshop programme

Important information

  • Our CFP is out!
  • Update: paper registration deadline: July 2nd, 20201
  • Paper submission deadline: June 25, 2021 July 9th, 2021
  • Submission website: https://checkmate21.hotcrp.com
  • Paper format: up to 12 pages for regular submissions/up to 6 pages for short submissions
  • Please see/share our announcement flyer

Chairs

  • General Chair: Christophe Hauser, Information Sciences Institute, University of Southern California
  • Program Chair: Yonghwi Kwon, University of Virginia, USA
  • Program Co-Chair: Sebastian Banescu, Technical University of Munich, Germany

Program Committee

  • Mohsen Ahmadvand, SAP Hybris, Germany
  • Tim Blazytko, emproof GmbH, Germany
  • Mariano Cecatto, University of Verona, Italy
  • Sang Kil Cha, KAIST, South Korea
  • Haehyun Cho, Soongsil University, South Korea
  • Jacopo Corbetta, Qualcomm, USA
  • Benjamin Gnahm, Blackberry, Germany
  • Luis Garcia, Information Sciences Institute, University of Southern California, USA
  • Yuseok Jeon, Ulsan National Institute of Science and Technology (UNIST), South Korea
  • Doowon Kim, University of Tennessee, USA
  • Johannes Kinder, Universitat Bundeswehr Munich, Germany
  • Martin Ochoa, Appgate Inc., Colombia
  • Chris Woods, Siemens, USA
  • Stefano Zanero, Politecnico di Milano University, Italy

Steering Committee

  • Sebastien Bardin, CEA LIST, France
  • Christian Collberg, University of Arizona, USA
  • Mila Dalla Preda, University of Verona, Italy
  • Jack Davidson, University of Virginia, USA
  • Bjorn De Sutter, Ghent University, Belgium
  • Paolo Falcarin, Ca’ Foscari University of Venice (Italy)
  • Roberto Giacobazzi, Università di Verona, Italy
  • Yuan Gu, IRDETO, Canada
  • Arun Lakhotia, University of Louisiana, USA
  • Todd McDonald, University of South Alabama, USA
  • Natalia Stakhanova, University of Saskatchewan, Canada
  • Brecht Wyseur, Kudelski IoT Security, Switzerland

Sponsors/acknowledgements

Special thanks to Tim Blazytko and emproof GmbH for their support and for providing their awesome tutorial! emproof GmbH