Security Proofs for Embedded Systems
The 11th International Workshop on Security Proofs for Embedded
Systems (PROOFS) will be held as an online workshop. It is colocated
with CHES, the Conference on
Cryptographic Hardware and Embedded Systems.
PROOFS will be a hybrid event this year.
The goal of the PROOFS workshop is to promote methodologies that increase
the confidence in the security of embedded systems, especially those which
contain cryptographic algorithms. Concretely, the PROOFS workshop seeks
contributions in both theory and practice of methods and tools applied to
the security of embedded systems. Examples include formal and semi-formal
methods, novel side-channel or fault attacks, simulation-based leakage
evaluation and security checks, protocol verification techniques, test and
verification of secure embedded systems (software and hardware), provable security for
physical attacks, and design tools for early security assessment.
This year, we solicit research papers on topics covering well-motivated
computer security problems. Techniques which identify real-world
threats, detect them, mitigate them or analyse the consequences will
remain the major target of the workshop.
Topics of interest include, but are not limited to, the following:
- (Automated) security proofs
- Applications of formal methods in security
- Protocol verification
- Security evaluation of real-world systems
- Leakage-resilient cryptography
- Side-channel analysis and countermeasures
- Fault attacks and defenses
- Intrusion detection and prevention
- Information leakage models
- Tamper-resistant hardware
- Countermeasure against hardware Trojan horses
- Early leakage detection, e.g. based on simulators
- Vulnerability assessment techniques for side channels
- Synergies between security and reliability
- On-chip monitoring of physical attacks
- Case studies and industrial practice for secure design
- Cyber physical systems security and threats against critical infrastructures
This year, the workshop proceedings will be published in the French open
archive HAL.
Additionally, revised versions of the accepted papers will be published
in a special issue of the Journal of Cryptographic Engineering (JCEN).