HOST 2018 - 2018 IEEE International Symposium on Hardware-Oriented Security and Trust
Date2018-05-01 - 2018-05-07
Deadline2017-11-22
VenueWashington DC Metro Area, USA - United States
Keywords
Topics/Call fo Papers
Rapid proliferation of computing and communication systems with increasing computational power and connectivity into every sphere of modern life has brought security to the forefront of system design, test, and validation processes. The emergence of new application spaces for these systems in the internet-of-things (IoT) regime is creating new attack surfaces as well as new requirements for secure and trusted system operation. Additionally, the design, manufacturing and the distribution of microchip, PCB, as well as other electronic components are becoming more sophisticated and globally distributed with a number of potential security vulnerabilities. Therefore, hardware plays an increasingly important and integral role in system security with many emerging system and application vulnerabilities and defense mechanisms relating to hardware. IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aims to facilitate the rapid growth of hardware-based security research and development. HOST highlights new results in the area of hardware and system security. Relevant research topics include techniques, tools, design/test methods, architectures, circuits, and applications of secure hardware.
Call for Paper
HOST 2018 invites original contributions related to, but not limited by, the following topics.
Hardware Trojan attacks, detection techniques and countermeasures
Hardware techniques to facilitate software and/or system security
Hardware-based security primitives (PUFs, RNGs)
FPGA and system-on-chip (SoC) security
Side-channel attacks and protection
Security, privacy, and trust protocols
Metrics, policies, and standards related to hardware security
Hardware IP trust (watermarking, metering, trust verification)
Trusted manufacturing including split manufacturing and 3D ICs
Security analysis and protection of Internet of Things (IoT)
Secure and efficient implementation of crypto algorithms
Reverse engineering and hardware obfuscation
Supply chain risks mitigation including counterfeit detection & avoidance
Hardware tampering attacks and protection
Applications of hardware security to secure system development
Call for Paper
HOST 2018 invites original contributions related to, but not limited by, the following topics.
Hardware Trojan attacks, detection techniques and countermeasures
Hardware techniques to facilitate software and/or system security
Hardware-based security primitives (PUFs, RNGs)
FPGA and system-on-chip (SoC) security
Side-channel attacks and protection
Security, privacy, and trust protocols
Metrics, policies, and standards related to hardware security
Hardware IP trust (watermarking, metering, trust verification)
Trusted manufacturing including split manufacturing and 3D ICs
Security analysis and protection of Internet of Things (IoT)
Secure and efficient implementation of crypto algorithms
Reverse engineering and hardware obfuscation
Supply chain risks mitigation including counterfeit detection & avoidance
Hardware tampering attacks and protection
Applications of hardware security to secure system development
Other CFPs
- 4th Workshop on Advances in Software and Hardware for Big Data to Knowledge Discovery (ASH)
- RW- 200th International Conference on Internet Technologies and Society (ICITS)
- RW- 257th International Conference on Economics and Finance Research (ICEFR)
- RW- 257th International Conference on Communication and Signal Processing (ICCSP)
- RW- 257th International Conference on Chemical and Biochemical Engineering (ICCBE)
Last modified: 2017-08-19 14:34:28