Notification of intent to submit (mandatory): 13 April 2020
Submission deadline: 20 April 2020
Expected first round of reviews: 20 August 2020
Expected publication date: May 2021
Any topic that could be of interest to secure compilation is in scope.
Secure compilation should be interpreted very broadly to include any work in security, programming languages, architecture, systems or their combination that can be leveraged to preserve security properties of programs when they are compiled or to eliminate low-level vulnerabilities.
Papers that provide a useful outside view or challenge the community are also welcome.
This includes papers on new attack vectors such as microarchitectural side-channels, whose defenses could benefit from compiler techniques.
Specific topics of interest include but are not limited to:
* Attacker models for secure compiler chains.
* Secure compiler properties: fully abstract compilation and similar properties, memory safety, control-flow integrity, preservation of safety, information flow and other (hyper-)properties against adversarial contexts, secure multi-language interoperability.
* Secure interaction between different programming languages: foreign function interfaces, gradual types, securely combining different memory management strategies.
* Enforcement mechanisms and low-level security primitives: static checking, program verification, typed assembly languages, reference monitoring, program rewriting, software-based isolation/hiding techniques (SFI, crypto-based, randomization-based, OS/hypervisor-based), security-oriented architectural features such as Intel’s SGX, MPX and MPK, capability machines, side-channel defenses, object capabilities.
* Experimental evaluation and applications of secure compilers.
* Proof methods relevant to compilation: (bi)simulation, logical relations, game semantics, trace semantics, multi-language semantics, embedded interpreters.
* Formal verification of secure compilation chains (protection mechanisms, compilers, linkers, loaders), machine-checked proofs, translation validation, property-based testing.
We invite authors from across the above spectrum.
Papers will be reviewed as regular JFP submissions, and acceptance in the special issue will be based on both JFP's quality standards and relevance to the theme.
The special issue will also consider high-quality papers on secure compilation which are not traditional "research-result" papers.
This may include pearls, surveys, tutorial papers or educational papers, which will be judged by the JFP standards for such submissions.
Prospective authors of such papers *must* soundboard their idea with the special editors early on in the process, at least two months before submission.
NOTIFICATION OF INTENT
Authors must notify the special-issue editors of their intent to submit by the deadline marked above.
This will help us to speed up the review process.
The notification of intent should be submitted by filling out the following web form which asks for data needed to identify suitable reviewers: https://forms.gle/F8AG4D9cQBKp...
If you miss the notification of intent deadline, but still want to submit, please contact the special issue editors.
Full-length, archival-quality submissions are solicited on all aspects of secure compilation.
Submissions should be sent through the JFP Manuscript Central system. https://mc.manuscriptcentral.com/jfp_submit
Choose “Secure Compilation” as the paper type, so that it gets assigned to the special issue.
Submissions that are based on previously-published conference or workshop papers must clearly describe the relationship with the initial publication, and must differ sufficiently that the author can assign copyright to Cambridge University Press.
Prospective authors are welcome to discuss such submissions with the editors to ensure compliance with this policy.
Dominique Devriese (firstname.lastname@example.org)
Gilles Barthe (email@example.com)
You can contact both editors at firstname.lastname@example.org.