| |||||||||||||||
PROOFS 2022 : 11th International Workshop on Security Proofs for Embedded Systems | |||||||||||||||
Link: https://www.proofs-workshop.org/2022/index.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The goal of the PROOFS workshop is to promote methodologies that increase the confidence in the security of embedded systems, especially those which contain cryptographic algorithms. Concretely, the PROOFS workshop seeks contributions in both theory and practice of methods and tools applied to the security of embedded systems. Examples include (semi-)formal methods, simulation-based leakage evaluation and security checks, protocol verification techniques, test and verification of secure embedded systems (software and hardware), and provable security for physical attacks.
This year, we solicit research papers on topics covering well-motivated computer security problems. Techniques which identify real-world threats, detect them, mitigate them or analyse the consequences will remain the major target of the workshop. =========== List of Topics =========== Topics of interest include, but are not limited to, the following: * (Automated) security proofs * Applications of formal methods in security * Protocol verification * Security evaluation of real-world systems * Leakage-resilient cryptography * Side-channel analysis and countermeasures * Fault attacks and defenses * Intrusion detection and prevention * Information leakage models * Tamper-resistant hardware * Countermeasure against hardware Trojan horses * Early leakage detection, e.g. based on simulators * Vulnerability assessment techniques for side channels * Synergies between security and reliability * On-chip monitoring of physical attacks * Case studies and industrial practice for secure design * Cyber physical systems security and threats against critical infrastructures ======== Publication ======== As in previous years, there will be online open access proceedings of PROOFS. Additionally, Revised versions of the accepted papers are published in a special issue of the Journal of Cryptographic Engineering (JCEN). |
|