HOST 2015 - IEEE Int. Symposium on Hardware-Oriented Security and Trust
Topics/Call fo Papers
The focus of modern computational and communication systems has been shifting from effectivesharing of well-protected, scarce, and expensive resources to large-scale information exchangeamong a plurality of users that communicate using protected mobile devices and sensors, whichcan be placed in potentially hostile environments. Additionally, integrated circuit synthesis andmanufacturing techniques are now complex and distributed with a number of potential securityvulnerabilities. Security has emerged as a metric of paramount importance. The scope of systemsecurity now includes, in addition to encrypted communication, properties such as privacy,anonymity, and trust. The starting and ending points for all system and application vulnerabilitiesand defense mechanisms are hardware. The initial impetus was provided by government agenciesand individual efforts, but recently a number of coordinated research projects have beenundertaken by essentially all hardware and system companies.
The IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aimsto facilitate the rapid growth of hardware-based security research and development. HOST seeksoriginal contributions in the area of hardware and system security. Relevant research topics includetechniques, tools, design/test methods, architectures, circuits, and applications of secure hardware. HOST 2015 invites contributions that are related to, but not limited by, the following topics.
Hardware Trojan attacks and detection techniques
Hardware-based security primitives (PUFs, PPUFs, HRNG)
Security, privacy, and trust protocols using hardware security primitives
Trusted information flow
Trusted design using untrusted tools
Trusted manufacturing including split manufacturing
Remote integrated circuits enabling and disabling and IP watermarking
Undeniable hardware metering techniques
Techniques and metrics for hardware system data confidentiality and hardware design confidentiality, integrity, and authenticity
Reverse engineering and hardware obfuscation
Side-channel attacks and techniques for their prevention
Supply chain risks mitigation including counterfeit detection & avoidance
Hardware tampering attacks
Hardware authentication techniques
Hardware techniques that ensure software and/or system security
Trusted remote sensing and computing
Hardware attestation techniques
To present at the symposium, submit an Acrobat (PDF) version of your paper on the symposiumsubmission website. The page limit is 6 pages, double column, IEEE format, with a minimum fontsize of 10 points. Submissions must be anonymous and must not identify the authors, directly orindirectly, anywhere in the manuscript.
Important Dates
Registration of Title + Abstract: October 24, 2014
Submission of Paper: October 31, 2014
Notification of Acceptance: January 16, 2015
Camera-ready version: February 20, 2015
The IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aimsto facilitate the rapid growth of hardware-based security research and development. HOST seeksoriginal contributions in the area of hardware and system security. Relevant research topics includetechniques, tools, design/test methods, architectures, circuits, and applications of secure hardware. HOST 2015 invites contributions that are related to, but not limited by, the following topics.
Hardware Trojan attacks and detection techniques
Hardware-based security primitives (PUFs, PPUFs, HRNG)
Security, privacy, and trust protocols using hardware security primitives
Trusted information flow
Trusted design using untrusted tools
Trusted manufacturing including split manufacturing
Remote integrated circuits enabling and disabling and IP watermarking
Undeniable hardware metering techniques
Techniques and metrics for hardware system data confidentiality and hardware design confidentiality, integrity, and authenticity
Reverse engineering and hardware obfuscation
Side-channel attacks and techniques for their prevention
Supply chain risks mitigation including counterfeit detection & avoidance
Hardware tampering attacks
Hardware authentication techniques
Hardware techniques that ensure software and/or system security
Trusted remote sensing and computing
Hardware attestation techniques
To present at the symposium, submit an Acrobat (PDF) version of your paper on the symposiumsubmission website. The page limit is 6 pages, double column, IEEE format, with a minimum fontsize of 10 points. Submissions must be anonymous and must not identify the authors, directly orindirectly, anywhere in the manuscript.
Important Dates
Registration of Title + Abstract: October 24, 2014
Submission of Paper: October 31, 2014
Notification of Acceptance: January 16, 2015
Camera-ready version: February 20, 2015
Other CFPs
- 11th Software Engineering Institute (SEI) Architecture Technology User Network (SATURN)
- 2015 : Web Information Systems Engineering
- 7th International Symposium on Cyberspace Safety and Security (CSS 2015)
- International Journal of Computing and Network Technology (IJCNT)
- International Conference on Industrial Instrumentation and Control (ICIC 2015)
Last modified: 2014-10-12 16:37:24