Security Proofs for Embedded Systems

The 12th International Workshop on Security Proofs for Embedded Systems (PROOFS) is colocated with CHES, the Conference on Cryptographic Hardware and Embedded Systems.

Goals of the Workshop

The goal of the PROOFS workshop is to promote methodologies that increase the confidence in the security of embedded systems, especially those which contain cryptographic algorithms. Concretely, the PROOFS workshop seeks contributions in both theory and practice of methods and tools applied to the security of embedded systems. Examples include formal and semi-formal methods, novel side-channel or fault attacks, simulation-based leakage evaluation and security checks, protocol verification techniques, test and verification of secure embedded systems (software and hardware), provable security for physical attacks, and design tools for early security assessment.

Topics of interest include, but are not limited to, the following:

  • (Automated) security proofs
  • Applications of formal methods in security
  • Protocol verification
  • Security evaluation of real-world systems
  • Leakage-resilient cryptography
  • Side-channel analysis and countermeasures
  • Fault attacks and defenses
  • Information leakage models
  • Tamper-resistant hardware
  • Countermeasure against hardware Trojan horses
  • Early leakage detection, e.g. based on simulators
  • Synergies between security and reliability
  • On-chip monitoring of physical attacks
  • Case studies and industrial practice for secure design


The proceedings of the previous editions of PROOFS are available online in the Kalpa Publications in Computing. We plan to publish this year's proceedings in the same open access series. Additionally, revised versions of the accepted papers are published in a special issue of the Journal of Cryptographic Engineering (JCEN).