PROOFS: Security Proofs for Embedded Systems


Accepted Papers

  1. Compositional Verification of Security Properties for Embedded Execution Platforms,
    Christoph Baumann, Oliver Schwarz, and Mads Dam.
  2. Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes,
    Inès Ben El Ouahma, Quentin Meunier, Karine Heydemann, and Emmanuelle Encrenaz.
  3. Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands,
    Poulami Das, Debapriya Basu Roy, and Debdeep Mukhopadhyay.
  4. An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach,
    Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, and Pallab Dasgupta.
  5. Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs,
    Nils Wisiol, Christoph Graebnitz, Marian Margraf, Tudor Soroceanu, and Benjamin Zengin.

Institut Mines-Telecom
Secure-IC S.A.S.