The growing ubiquity of software systems as a means of providing critical services make protecting software contents, data, and intellectual property an important aspect of software development and a necessity for successful industrial applications. Without strong software security and protection techniques, software-based systems at the heart of medical informatics, digital rights management, voting systems, power distribution systems, transportation systems, and financial systems, to name a few, will be vulnerable to devastating attacks.

Software Security and Protection is a discipline that lies at the crossroads of security, cryptography, networks, software engineering, computer architecture, operating systems, and compiler design. The summer school will bring together internationally-recognized experts to describe the advanced techniques that are used for protecting software from tampering, reverse engineering, and piracy. The courses will cover methods of software security and protection including code obfuscation to protect against reverse engineering, HW/SW attack, software watermarking to protect against software piracy, tamper-proofing to protect against integrity-violations of software, and models of security for specifying attack strategies, metrics, and principles.

The school, which is the third in the series after Beijing 2010 and Gent 2011, will help to address the very high demand in ICT professionals and researchers in the areas of software security and software intellectual property protection, with a particular attention towards the growing demand of advanced software security technologies and solutions in the US market.

Important dates
  • April 30, 2012: deadline for application

Courses
  • Bjorn De Sutter: "HW & SW attacks"
  • Christian Collberg: "Software protection and MATE attacks: The Practice and Theory of Software Protection"
  • Jack Davidson: "Software Security by Dynamic Translation"
  • Roberto Giacobazzi: "Theory and practice of code attack: Static analysis, semantics and code transformation"
  • Yuan Xiang Gu: "Software security patterns: White-Box Attacks and Software Protection Technology"

Schedule

Venue
Gould-Simpson Building

Sponsors

© ISSISP