posted by user: HOST_CFP || 8914 views || tracked by 7 users: [display]

HOST 2015 : IEEE Int. Symposium on Hardware-Oriented Security and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Hardware-Oriented Security and Trust
 
Link: http://www.hostsymposium.org/
 
When May 5, 2015 - May 7, 2015
Where Washington DC Metropolitan Area
Abstract Registration Due Oct 24, 2014
Submission Deadline Oct 31, 2014
Notification Due Jan 16, 2015
Final Version Due Feb 20, 2015
Categories    hardware security   security   trust
 

Call For Papers

CALL FOR PAPERS: HOST 2015

The focus of modern computational and communication systems has been shifting from effective sharing of well-protected, scarce, and expensive resources to large-scale information exchange among a plurality of users that communicate using protected mobile devices and sensors, which can be placed in potentially hostile environments. Additionally, integrated circuit synthesis and manufacturing techniques are now complex and distributed with a number of potential security vulnerabilities. Security has emerged as a metric of paramount importance. The scope of system security now includes, in addition to encrypted communication, properties such as privacy, anonymity, and trust. The starting and ending points for all system and application vulnerabilities and defense mechanisms are hardware. The initial impetus was provided by government agencies and individual efforts, but recently a number of coordinated research projects have been undertaken by essentially all hardware and system companies.

The IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aims to facilitate the rapid growth of hardware-based security research and development. HOST seeks original contributions in the area of hardware and system security. Relevant research topics include techniques, tools, design/test methods, architectures, circuits, and applications of secure hardware. HOST 2015 invites contributions that are related to, but not limited by, the following topics.
• Hardware Trojan attacks and detection techniques
• Hardware-based security primitives (PUFs, PPUFs, HRNG)
• Security, privacy, and trust protocols using hardware security primitives
• Trusted information flow
• Trusted design using untrusted tools
• Trusted manufacturing including split manufacturing
• Remote integrated circuits enabling and disabling and IP watermarking
• Undeniable hardware metering techniques
• Techniques and metrics for hardware system data confidentiality and hardware design confidentiality, integrity, and authenticity
• Reverse engineering and hardware obfuscation
• Side-channel attacks and techniques for their prevention
• Supply chain risks mitigation including counterfeit detection & avoidance
• Hardware tampering attacks
• Hardware authentication techniques
• Hardware techniques that ensure software and/or system security
• Trusted remote sensing and computing
• Hardware attestation techniques

For students:
• Best paper award for a paper whose first author is a full-time student at the submission time.
• Best presentation award for a speaker who is a full-time student at the presentation time.
• Travel grants for undergraduate and graduate students.
To present at the symposium, submit an Acrobat (PDF) version of your paper on the symposium submission website. The page limit is 6 pages, double column, IEEE format, with a minimum font size of 10 points. Submissions must be anonymous and must not identify the authors, directly or indirectly, anywhere in the manuscript.

SCHEDULE:
Submission of Abstract: October 24, 2014
Submission of Paper: October 31, 2014
Notification of Acceptance: January 16, 2015

Conference Website: http://www.hostsymposium.org
Facebook Page: https://www.facebook.com/HOST.IEEE

Technical Program: M. Potkonjak
UC Los Angeles
Tel: (310)825-0790
E-mail: miodrag@cs.ucla.edu

General Information: W.H. Robinson
Vanderbilt U.
Tel: (615)322-1507
Email: william.h.robinson@vanderbilt.edu

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
FLAIRS-ST XAI, Fairness, and Trust 2025   FLAIRS-38 Special Track on Explainable, Fair, and Trustworthy AI
IEEE-MLCIPR 2025   2025 2nd International Conference on Machine Learning, Computational Intelligence and Pattern Recognition-EI/Scopus
IEEE AIxVR 2026   8th International Conference on Artificial Intelligence & extended and Virtual Reality
IEEE ICCT-PACIFIC 2026   2026 IEEE 2nd International Conference on Consumer Technology - Pacific (ICCT-Pacific 2026)
ACMSE 2026   ACM SouthEast Conference