posted by user: sadegh_rk || 2727 views || tracked by 2 users: [display]

PROOFS 2022 : 11th International Workshop on Security Proofs for Embedded Systems

FacebookTwitterLinkedInGoogle

Link: https://www.proofs-workshop.org/2022/index.html
 
When Sep 22, 2022 - Sep 22, 2022
Where Leuven, Belgium
Abstract Registration Due Jul 8, 2022
Submission Deadline Jul 15, 2022
Notification Due Aug 5, 2022
Categories    security   formal methods   embedded systems
 

Call For Papers

The goal of the PROOFS workshop is to promote methodologies that increase the confidence in the security of embedded systems, especially those which contain cryptographic algorithms. Concretely, the PROOFS workshop seeks contributions in both theory and practice of methods and tools applied to the security of embedded systems. Examples include (semi-)formal methods, simulation-based leakage evaluation and security checks, protocol verification techniques, test and verification of secure embedded systems (software and hardware), and provable security for physical attacks.

This year, we solicit research papers on topics covering well-motivated computer security problems. Techniques which identify real-world threats, detect them, mitigate them or analyse the consequences will remain the major target of the workshop.

===========
List of Topics
===========

Topics of interest include, but are not limited to, the following:

* (Automated) security proofs
* Applications of formal methods in security
* Protocol verification
* Security evaluation of real-world systems
* Leakage-resilient cryptography
* Side-channel analysis and countermeasures
* Fault attacks and defenses
* Intrusion detection and prevention
* Information leakage models
* Tamper-resistant hardware
* Countermeasure against hardware Trojan horses
* Early leakage detection, e.g. based on simulators
* Vulnerability assessment techniques for side channels
* Synergies between security and reliability
* On-chip monitoring of physical attacks
* Case studies and industrial practice for secure design
* Cyber physical systems security and threats against critical infrastructures

========
Publication
========
As in previous years, there will be online open access proceedings of PROOFS. Additionally, Revised versions of the accepted papers are published in a special issue of the Journal of Cryptographic Engineering (JCEN).

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ICCS--EI 2025   2025 7th International Conference on Circuits and Systems (ICCS 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
IJCSITY 2024   International Journal of Computational Science and Information Technology
TAP 2024   18th International Conference on Tests and Proofs
ICONS 2025   The Twentieth International Conference on Systems