Abbrevation
HOST
City
San Francisco
Country
United States
Deadline Paper
Start Date
End Date
Abstract

A wide range of applications, from secure RFID tagging to high&#8211;end trusted computing,<br>relies on dedicated and trusted hardware platforms&#046; The security and trustworthiness of<br>such hardware designs are critical to their successful deployment and operation&#046; Recent<br>advances in tampering and reverse engineering show that important challenges lie<br>ahead&#046; For example, secure electronic designs may be affected by malicious circuits,<br>Trojans that alter system operation&#046; Furthermore, dedicated secure hardware<br>implementations are susceptible to novel forms of attack that exploit side&#8211;channel<br>leakage and faults&#046; Third, the globalized, horizontal semiconductor business model<br>raises concerns of trust and intellectual&#8211;property protection&#046; HOST 2012 is a forum for<br>novel solutions to address these challenges&#046; Innovative test mechanisms may reveal<br>Trojans in a design before they are able to do harm&#046; Implementation attacks may be<br>thwarted using side&#8211;channel resistant design or fault&#8211;tolerant designs&#046; New securityaware<br>design tools can assist a designer in implementing critical and trusted<br>functionality, quickly and efficiently&#046;<br>The IEEE International Symposium on Hardware Oriented Security and Trust seeks<br>original contributions in the area of hardware&#8211;oriented security&#046; This includes tools,<br>design methods, architectures, and circuits&#046; In addition, novel applications of secure<br>hardware are especially welcome&#046; HOST 2012 seeks contributions based on, but not<br>limited to, the following topics&#046;<br>Trojan detection and isolation<br>Implementation attacks and countermeasures<br>Side channel analysis and fault analysis<br>Intellectual property protection and metering<br>Tools and methodologies for secure hardware design<br>Hardware architectures for cryptography<br>Hardware security primitives: PUFs and TRNGs<br>Applications of secure hardware<br>Interaction of secure hardware and software<br>