posted by user: sadegh_rk || 3380 views || tracked by 2 users: [display]

PROOFS 2022 : 11th International Workshop on Security Proofs for Embedded Systems

FacebookTwitterLinkedInGoogle

Link: https://www.proofs-workshop.org/2022/index.html
 
When Sep 22, 2022 - Sep 22, 2022
Where Leuven, Belgium
Abstract Registration Due Jul 8, 2022
Submission Deadline Jul 15, 2022
Notification Due Aug 5, 2022
Categories    security   formal methods   embedded systems
 

Call For Papers

The goal of the PROOFS workshop is to promote methodologies that increase the confidence in the security of embedded systems, especially those which contain cryptographic algorithms. Concretely, the PROOFS workshop seeks contributions in both theory and practice of methods and tools applied to the security of embedded systems. Examples include (semi-)formal methods, simulation-based leakage evaluation and security checks, protocol verification techniques, test and verification of secure embedded systems (software and hardware), and provable security for physical attacks.

This year, we solicit research papers on topics covering well-motivated computer security problems. Techniques which identify real-world threats, detect them, mitigate them or analyse the consequences will remain the major target of the workshop.

===========
List of Topics
===========

Topics of interest include, but are not limited to, the following:

* (Automated) security proofs
* Applications of formal methods in security
* Protocol verification
* Security evaluation of real-world systems
* Leakage-resilient cryptography
* Side-channel analysis and countermeasures
* Fault attacks and defenses
* Intrusion detection and prevention
* Information leakage models
* Tamper-resistant hardware
* Countermeasure against hardware Trojan horses
* Early leakage detection, e.g. based on simulators
* Vulnerability assessment techniques for side channels
* Synergies between security and reliability
* On-chip monitoring of physical attacks
* Case studies and industrial practice for secure design
* Cyber physical systems security and threats against critical infrastructures

========
Publication
========
As in previous years, there will be online open access proceedings of PROOFS. Additionally, Revised versions of the accepted papers are published in a special issue of the Journal of Cryptographic Engineering (JCEN).

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-EMC² 2026   2026 International Conference on Embedded Systems, Mobile Communication and Computing
IJCTCM 2026   International Journal of Control Theory and Computer Modelling
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
COIT 2026   6th International Conference on Computing and Information Technology
SNLP 2026   7thInternational Conference on Semantic & Natural Language Processing
IJASA 2026   The International Journal of Ambient Systems and applications
DNLP 2026   7th International Conference on Data Mining and NLP
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
BIO 2026   8th International Conference on Bioscience & Engineering