posted by user: anjova || 84 views || tracked by 1 users: [display]

SysTEX 2025 : Workshop on System Software for Trusted Execution

FacebookTwitterLinkedInGoogle

Link: https://systex-workshop.github.io/2025/cfp.html
 
When Jul 4, 2025 - Jul 4, 2025
Where Venice, Italy
Submission Deadline Feb 20, 2025
Notification Due Mar 24, 2025
Final Version Due Apr 7, 2025
 

Call For Papers

Call for Papers

The 8th Workshop on System Software for Trusted Execution (SysTEX) will focus on research challenges related to Trusted Execution Environments (TEEs) and explore new ideas and strategies for implementing trustworthy systems with TEEs. The workshop aims to foster collaboration and discussion among researchers and practitioners in this field. In recent years all major hardware manufacturers have developed some form of TEE support, making this technology widely available in consumer devices today, e.g., Intel SGX/TDX, AMD SEV, ARM TrustZone, IBM Z/PEF or RISC-V. These TEE primitives enable fine-grained and flexible trusted execution, but also introduce numerous novel challenges and opportunities for developers of secure applications. Hence, there is a burning need for cross-cutting systems support and security analysis of such TEEs that span all the layers of the software stack, from the OS through runtime to compilers, programming models, and novel applications. The workshop will also invite discussion on the challenges and opportunities for the integration of TEE-based solutions with pervasive 5G networks, IoT, and AI applications.

Topics of interest include but are not limited to:

Architecture, applications, and implementation technologies for trusted platforms and trustworthy infrastructures
Limitations of trusted computing
Validation and performance evaluation of trusted hardware
Side-channel attacks and defenses for TEEs
Formal verification of TEE architectures, attestation protocols, and software
Cryptographic aspects of trusted and trustworthy computing
Privacy aspects of trusted computing
Secure OS and virtualization support for trusted execution
Cross-platform standardization of TEEs and interoperability issues
Heterogeneous confidential computing across TEEs
Energy-efficient trusted computing for sustainable infrastructures
Trusted I/O virtualization
TEE support for hardware accelerators
Usability and user perceptions of trustworthy systems and risks
Use case studies of trusted execution
Intrusion resilience in trusted computing
Emerging challenges in integrating TEEs with 5G and edge networks
Confidential AI
Secure & trusted supply chains
Format of the workshop
SysTEX is a well-established, mature workshop that has been successfully organized six times. The goal of the workshop is to foster collaboration and discussion to encourage and advance innovative TEE security research. SysTEX has a particularly strong track record of attracting submissions from both industry and academia and encouraging intersection and cross-pollination of ideas in the systems and security fields, a natural fit for TEE research.

The workshop will be one full day. The program will primarily include original research presentations by authors of accepted papers (the workshop will have proceedings in IEEE Xplore), followed by interactive Q&A with the audience. The workshop may, furthermore, include a relevant keynote speaker.

Submission Guidelines

In line with the call for papers from previous editions, we invite both original research papers, short research statements to encourage discussion at the workshop (as proven successful in last editions), and papers describing high-quality reusable software and hardware tools to aid research in the fast-changing TEE ecosystem (e.g., reverse-engineering and attack frameworks, binary and compiler defenses, open-source enclave processors).

Thus, SysTEX welcomes submissions in three formats:

Regular research papers (6 pages, excluding references and well-marked appendices) to describe original work that is not previously published or concurrently submitted elsewhere.

Short research statements (1-2 pages, excluding references and well-marked appendices) to encourage discussion and collaboration. Research statements may summarize research published elsewhere or outline new emerging ideas.
Tool paper submissions (4 pages, excluding references and well-marked appendices) that describe open-source tools with a (potential for) meaningful impact for security and privacy research on TEEs. These papers will be evaluated based on their potential merit and usability, prioritizing practical value over novelty. Submissions may introduce entirely new tools or present incremental extensions to existing tools.
All submissions should be in PDF and must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template supplied by IEEE EuroS&P: eurosp-template.zip Please do not use other IEEE templates.

Reviewing is double-blind and submissions must be anonymous and in English, taking care to refer to any previous work in the third person. Submissions will be treated confidentially by the PC chairs and the program committee members. Each paper will receive at least three reviews from members of the program committee. Submissions that do not respect the formatting requirement may be rejected without review.

Accepted papers will be published in the workshop proceedings through IEEE Xplore. Authors of accepted short research statement or tool papers may choose to opt-out from being published in the proceedings upon request.

At least one author of each accepted paper is required to attend the workshop and present the paper.

Optional Artifact Evaluation

Recognizing the importance of open science and reproducible artifacts for the security community, authors of accepted papers will be invited to optionally participate in a lightweight artifact evaluation. This initiative aims to add an optional "artifacts evaluated" badge on the website, linking to the corresponding open-source repository. The presence of this badge will not only acknowledge the commitment to open science by the authors but also enhance the visibility of these efforts.

The optional, non-mandatory artifact evaluation will be carried out by a dedicated volunteer artifact evaluation committee. The explicit focus will be on providing constructive feedback and cooperatively improving the quality and reproducibility of any code or data research artifacts.

Further details on the artifact-evaluation process will be communicated to authors upon acceptance and is available in the call for artifacts.

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE SRSE 2025   IEEE--2025 The 7th International Conference on System Reliability and Safety Engineering (SRSE 2025)
SOMET 2025   24th International Conference on Intelligent Software Methodologies Tools and Techniques
QRS 2025   The 25th International Conference on Software Quality, Reliability, and Security
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
SEKE 2025   The 37th International Conference on Software Engineering and Knowledge Engineering
ICSEA 2025   The Twentieth International Conference on Software Engineering Advances
ISSSR 2025   The 11th IEEE International Symposium on System Security, Safety, and Reliability