Security Proofs for Embedded Systems

The 11th International Workshop on Security Proofs for Embedded Systems (PROOFS) will be held as an online workshop. It is colocated with CHES, the Conference on Cryptographic Hardware and Embedded Systems.

PROOFS will be a hybrid event this year.

Goals of the Workshop

The goal of the PROOFS workshop is to promote methodologies that increase the confidence in the security of embedded systems, especially those which contain cryptographic algorithms. Concretely, the PROOFS workshop seeks contributions in both theory and practice of methods and tools applied to the security of embedded systems. Examples include formal and semi-formal methods, novel side-channel or fault attacks, simulation-based leakage evaluation and security checks, protocol verification techniques, test and verification of secure embedded systems (software and hardware), provable security for physical attacks, and design tools for early security assessment.

This year, we solicit research papers on topics covering well-motivated computer security problems. Techniques which identify real-world threats, detect them, mitigate them or analyse the consequences will remain the major target of the workshop.

Topics of interest include, but are not limited to, the following:

  • (Automated) security proofs
  • Applications of formal methods in security
  • Protocol verification
  • Security evaluation of real-world systems
  • Leakage-resilient cryptography
  • Side-channel analysis and countermeasures
  • Fault attacks and defenses
  • Intrusion detection and prevention
  • Information leakage models
  • Tamper-resistant hardware
  • Countermeasure against hardware Trojan horses
  • Early leakage detection, e.g. based on simulators
  • Vulnerability assessment techniques for side channels
  • Synergies between security and reliability
  • On-chip monitoring of physical attacks
  • Case studies and industrial practice for secure design
  • Cyber physical systems security and threats against critical infrastructures


This year, the workshop proceedings will be published in the French open archive HAL. Additionally, revised versions of the accepted papers will be published in a special issue of the Journal of Cryptographic Engineering (JCEN).