posted by organizer: coflynn || 1224 views || tracked by 2 users: [display]

COSADE 2022 : Constructive Side-Channel Analysis and Secure Design


Conference Series : Constructive Side-Channel Analysis and Secure Design
When Apr 12, 2022 - Apr 14, 2022
Where Leuven, Belgium
Submission Deadline Dec 15, 2021
Notification Due Feb 4, 2022
Final Version Due Feb 15, 2022
Categories    hardware security   power analysis   fault injection

Call For Papers


13th International Workshop on Constructive
Side-Channel Analysis and Secure Design

Leuven, Belgium, April 12-14, 2022


- Paper Submissions : December 15, 2021
- Notification of Acceptance : February 4, 2022
- Final Version Due : February 15, 2022

All deadlines are 23:59:59 Anywhere on Earth (AoE).


- COSADE website: (to be updated)
- Paper Submission:


Side-channel analysis (SCA) and implementation attacks have become an
important field of research and a real threat. In order to enhance the
resistance of cryptographic and security critical implementations within
the design phase, constructive attacks and analyzing techniques may
serve as a quality metric to optimize the design and development
process. Since 2010, COSADE provides an international platform for
researchers, academics, and industry participants to present their work
and their current research topics. The program committee is seeking
original papers on all aspects of the side-channel analysis and other
implementation attacks as well as efficient and secure implementations.

Submission topics include, but are not limited to:

+ Implementation attacks & countermeasures
- Side-channel analysis, fault-injection attacks, probing and
read-out, hardware trojans, cloning and counterfeiting,
side-channel or fault-injection based reverse engineering,
attacks or countermeasures based on machine learning methods

+ Efficient and secure HW/SW implementations
- Efficient and secure implementations of cryptographic
blocks including post-quantum cryptography, lightweight
cryptography, random number generators, physical unclonable
functions, symmetric cryptography, hash functions,
leakage-resilient cryptography, fault-resistant and
tamper-detection designs, white-box cryptography

+ Measurement setups, evaluation platforms, and open benchmarks
- Practical implementation and comparison of physical attacks
including description of measurement setups, test platforms for
evaluation of physical attacks, open benchmarks for physical
attacks and countermeasures

+ Formal analysis and automated tools
- Security and leakage models, formal analysis of secure
implementations, design automation and tools, evaluation tooling,
domain-specific security analysis of e.g., IoT, medical,
automotive, industrial-control systems, 5G, ...

Authors are invited to submit papers (PDF format) electronically
using the submission form available on

Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English, strictly
follow Springer LNCS format (with default margins, font size, etc.)
and should be at most 18 pages, excluding only references. Papers not
meeting these guidelines risk rejection without consideration.
All submissions will be blind-refereed. Submission implies the
willingness of at least one of the authors to register and present
the paper. The proceedings are expected to be published in the
Springer Lecture Notes in Computer Science (LNCS) series.
Accepted papers must follow the LNCS author instructions at:


Steering Committee
Jean-Luc Danger, Telecom Paristech, FR
Werner Schindler, BSI, DE

General Chair
Benedikt Gierlichs, KU Leuven, BE

Program Chairs
Colin O'Flynn, NewAE Technology Inc, CA
Josep Balasch, KU Leuven, BE


Related Resources

SEED 2022   IEEE International Symposium on Secure and Private Execution Environment Design
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
ASONAM 2022   IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
NSDI 2023   20th USENIX Symposium on Networked Systems Design and Implementation
ATVA 2022   The 20th International Symposium on Automated Technology for Verification and Analysis
ICCD 2022   International Conference on Computer Design
EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
PRASAE 2022   Peer-Review, Peer-Assessment, and Self-Assessment in Education, 8th International Workshop
EAI DLI 2022   7th EAI International Conference on Design, Learning & Innovation
NordSec 2022   The 27th Nordic Conference on Secure IT Systems