posted by user: stoerung || 7693 views || tracked by 8 users: [display]

HOST 2011 : IEEE Int. Symposium on Hardware-Oriented Security and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Hardware-Oriented Security and Trust
 
Link: http://www.hostsymposium.org
 
When Jun 5, 2011 - Jun 6, 2011
Where San Diego
Submission Deadline Jan 19, 2011
Notification Due Mar 21, 2011
Final Version Due Apr 11, 2011
Categories    security   circuits   cryptography
 

Call For Papers

A wide range of applications, from secure RFID tagging to high-end trusted computing,
relies on dedicated and trusted hardware platforms. The security and trustworthiness of
such hardware designs are critical to their successful deployment and operation. Recent
advances in tampering and reverse engineering show that important challenges lie
ahead. For example, secure electronic designs may be affected by malicious circuits,
Trojans that alter system operation. Furthermore, dedicated secure hardware
implementations are susceptible to novel forms of attack that exploit side-channel
leakage and faults. Third, the globalized, horizontal semiconductor business model
raises concerns of trust and intellectual-property protection. HOST 2011 is a forum for
novel solutions to address these challenges. Innovative test mechanisms may reveal
Trojans in a design before they are able to do harm. Implementation attacks may be
thwarted using side-channel resistant design or fault-tolerant designs. New security-
aware design tools can assist a designer in implementing critical and trusted
functionality, quickly and efficiently.
The IEEE International Symposium on Hardware Oriented Security and Trust seeks
original contributions in the area of hardware-oriented security. This includes tools,
design methods, architectures, and circuits. In addition, novel applications of secure
hardware are especially welcome. HOST 2011 seeks contributions based on, but not
limited to, the following topics.

Trojan detection and isolation
Implementation Attacks and Countermeasures
Side channel Analysis and Fault Analysis
Intellectual Property Protection and Metering
Tools and Methodologies for Secure Hardware Design
Hardware Architectures for Cryptography
Hardware Security Primitives: PUFs and TRNGs
Applications of Secure Hardware
Interaction of Secure Hardware and Software

Related Resources

Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
CCCIoT 2026   7th International Conference on Cloud Computing and IoT
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
IEEE AIxVR 2026   8th International Conference on Artificial Intelligence & extended and Virtual Reality
IEEE ICCT-PACIFIC 2026   2026 IEEE 2nd International Conference on Consumer Technology - Pacific (ICCT-Pacific 2026)
SNLP 2026   7thInternational Conference on Semantic & Natural Language Processing
IEEE-Ei/Scopus-ICISC 2026   2025 6th International Conference on Intelligent System and Computing (ICISC 2026)
CACML 2026   2026 5th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2026)