PROOFS 2017: 6th International Workshop on Security Proofs for Embedded Systems
Taipei, Taiwan, September 29, 2017
|Abstract registration deadline||June 23, 2017|
|Submission deadline||June 30, 2017|
The 6th International Workshop on Security Proofs for Embedded Systems (PROOFS) will be held on September 29th, 2017 in Taipei (Taiwan). It is collocated with CHES, the Conference on Cryptographic Hardware and Embedded Systems. This year, there will be a special session on control flow integrity.
The goal of the PROOFS workshop is to promote methodologies that increase the confidence in the security of embedded systems, especially those which contain cryptographic algorithms. Formal methods allow to increase the trust level of digital systems. Some benefits are:
- Specifications review and consistency checks during the modeling stage
- Capturing and verifying security properties in early design phases
- Non-regression testing during refinement and optimization
- Better-than-worst-case performance by using provably effective security measures
The PROOFS workshop seeks contributions in both theory and practice of formal or semi-formal methods applied to the security of embedded systems. We are interested in use-cases where a thorough formalization helps the design and verification engineers to gain confidence in the implementation correctness of security mechanisms. Contributions in the field of software and hardware verification are very welcome.
List of Topics
Topics of interest include, but are not limited to, the following:
- Automated security proof techniques
- Applications of formal methods on secure systems
- Verification of cryptographic functions
- Security evaluation of real-world systems
- New cryptographic algorithms
- Innovative implementations of cryptographic primitives
- Physically unclonable functions
- True random number generators
- Masking schemes for hardware and software
- Side-channel analysis
- Fault attacks
- Information leakage models
- Tamper-resistant hardware
- Security measures at assembler and OS level
- Hardware trojan detection and prevention
- Tagged architectures
- Information flow analysis
For the 2017 edition of PROOFS, we plan a special session on control flow integrity (CFI). The goal of CFI is to force a program to follow the intended control flow graph -- or to detect deviations -- in order to prevent control flow hijacking. There are numerous techniques of variable complexity and acting on various abstraction levels from the hardware up to the operating system.
We encourage submissions in the context of CFI. In particular, we are interested in formally proven guarantees of known or new CFI schemes.
- Alexandro Barenghi, Politecnico di Milano, Italy.
- Begül Bilgin, KU Leuven, Belgium.
- Anupam Chattopadhyay, NTU, Singapore.
- Hubert Comon, LSV ENS de Cachan, France.
- Joan Daemen, STMicroelectronics, Belgium.
- Nadia El Mrabet, EMSE, France.
- Tim Güneysu, University of Bremen & DFKI, Germany.
- Karine Heydemann, LIP6, France.
- Naofumi Homma, Tohoku University, Japan.
- Ulrich Kühne, Télécom ParisTech, France (program chair)
- Debdeep Mukhopadhyay, IIT Kharagpur, India.
- Renaud Pacalet, Télécom ParisTech, France.
- Stjepan Picek, KU Leuven, France.
- Axel Poschmann, NXP, Germany.
- Marie-Laure Potet, VERIMAG, France.
- Mehdi Tibouchi, NTT Secure Platform Laboratories, Japan.
- Chao Wang, VirginiaTech, USA.
- Yongbin Zhou, Chinese Academy of Sciences, China.
- Sylvain Guilley, Télécom ParisTech, France.
- Çetin Kaya Koç, UCSB, USA.
- David Naccache, ENS, France.
- Akashi Satoh, UEC, Japan.
- Werner Schindler, BSI, Germany.
- Chen-Mou Cheng, NTU, Taiwan
The proceedings of PROOFS 2017 will be published in the EPiC open access series. Additionally, the best papers will be invited to publish an extended version in the Journal of Cryptographic Engineering (JCEN).
The conference will be held in Taipei, Taiwan. It is collocated with CHES.
All questions about submissions should be emailed to email@example.com.