Call for papers

Sixteenth Smart Card Research and Advanced Application Conference

To download the call please click here


Since its creation, CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications. Those objects are part of our daily life for years now: banking cards, SIM cards, electronic passports, etc. But the world is changing; the smartcard, as a secure element is more and more often the hardware root of trust of bigger systems. Their applications and use cases are also increasing through M2M and massive IoT. As such, smartcard-security is key since the security of entire systems relies on it. With the growing use of smartcard technology, the attack surface is also increasing, from physical attacks to logical attacks, from local attacks to remote attacks. Combined attacks are also to be considered. It is more important than ever that we understand how smart cards, and related systems, can be secured.

The sixteenth Smart Card Research and Advanced Application Conference is organized by ALaRI and will be held in Lugano, Switzerland on November 13-15, 2017.


The program committee is seeking original papers on all aspects of the security of smart cards and embedded systems as well as their applications. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of smart cards and related technologies. Topics of interest include, but are not limited to:

  • Physical attacks and countermeasures
  • Reverse engineering of secure embedded systems
  • Efficient cryptographic implementations for smart cards and embedded systems
  • Smart cards and their applications (identification, mobile payment, access controls, pay TV)
  • Security of automotive devices and applications
  • Security of IoT devices and applications
  • Security of Systems on Chip (SoC)
  • Security of mobile connected devices (mobile handset, Set Top Boxes, ...)
  • Trusted computing (TPMs, TEE, Whitebox Cryptography, ...)
  • Hardware architectures for secure embedded systems
  • Software architectures for secure embedded systems (operating systems, ยต-kernel, hypervisors, virtual machines, ...)
  • PUFs, anti-cloning and anti-counterfeiting technologies
  • Software security


Authors are invited to submit papers (PDF format) with novel contributions electronically using the submission form available on the following web site:

Submitted papers must be original, unpublished, anonymous and not submitted to journals or other conferences/workshops that have proceedings. Submissions must be written in English, strictly follow Springer LNCS format (with default margins, font size, etc.) and should be at most 15 pages, excluding references. Papers not meeting these guidelines risk rejection without consideration. All submissions will be blind-refereed. Submission implies the willingness of at least one of the authors to register and present the paper. Revised selected papers will be published as a post-proceedings in Springer Lecture Notes in Computer Science (LNCS). Accepted papers must follow the LNCS default author instructions at conference proceedings guidelines.


Important Dates

31 Jul. 2017Abstracts registration
7 Aug. 2017Full paper submission deadline
12 Sep. 2017Notification of acceptance
13 Oct. 2017Camera-ready for pre-proceedings
13-15 Nov. 2017Workshop date
15 Dec 2017Final version of papers

Organised by: