Abbrevation
HOST
City
Washington
Country
United States
Deadline Paper
Start Date
End Date
Abstract

The focus of modern computational and communication systems has been shifting from effectivesharing of well&#8211;protected, scarce, and expensive resources to large&#8211;scale information exchangeamong a plurality of users that communicate using protected mobile devices and sensors, whichcan be placed in potentially hostile environments&#046; Additionally, integrated circuit synthesis andmanufacturing techniques are now complex and distributed with a number of potential securityvulnerabilities&#046; Security has emerged as a metric of paramount importance&#046; The scope of systemsecurity now includes, in addition to encrypted communication, properties such as privacy,anonymity, and trust&#046; The starting and ending points for all system and application vulnerabilitiesand defense mechanisms are hardware&#046; The initial impetus was provided by government agenciesand individual efforts, but recently a number of coordinated research projects have beenundertaken by essentially all hardware and system companies&#046;<br>The IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aimsto facilitate the rapid growth of hardware&#8211;based security research and development&#046; HOST seeksoriginal contributions in the area of hardware and system security&#046; Relevant research topics includetechniques, tools, design/test methods, architectures, circuits, and applications of secure hardware&#046; HOST 2015 invites contributions that are related to, but not limited by, the following topics&#046;<br>Hardware Trojan attacks and detection techniques<br>Hardware&#8211;based security primitives (PUFs, PPUFs, HRNG)<br>Security, privacy, and trust protocols using hardware security primitives<br>Trusted information flow<br>Trusted design using untrusted tools<br>Trusted manufacturing including split manufacturing<br>Remote integrated circuits enabling and disabling and IP watermarking<br>Undeniable hardware metering techniques<br>Techniques and metrics for hardware system data confidentiality and hardware design confidentiality, integrity, and authenticity<br>Reverse engineering and hardware obfuscation<br>Side&#8211;channel attacks and techniques for their prevention<br>Supply chain risks mitigation including counterfeit detection &amp; avoidance<br>Hardware tampering attacks<br>Hardware authentication techniques<br>Hardware techniques that ensure software and/or system security<br>Trusted remote sensing and computing<br>Hardware attestation techniques<br>