Conference: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST (HOST), 2014 Date being held: May 6-7, 2014 Submission Deadline (Abstract): Dec 10, 2013 Submission Deadline (Full paper): Dec 17, 2013 Place: Austin Convention Center, Austin, TX, USA Conference website: http://www.hostsymposium.org/ Concise Text version for the CFP: Hardware trust and security now play critical roles as computing is intimately integrated into many infrastructures that we depend on. Trusted hardware platforms make up the backbone for successful deployment and operation of these infrastructures. Research in recent years show that as tampering and reverse engineering mature in their sophistication, the challenges in guaranteeing the trust and security of these components also grow. For example, backdoors inserted into electronic designs can allow for silent intruders into the system. Furthermore, new forms of attacks that exploit side-channel signals are being developed. Third, intellectual-property protection is becoming a major concern in the globalized, horizontal semiconductor business model. Located at a new location near the greater DC, where many defense agencies reside, HOST 2014 aims to continue to be a premiere forum that invites novel solutions to address these challenges. The IEEE International Symposium on Hardware Oriented Security and Trust seeks original contributions in the area of hardware-oriented security. This includes tools, design methods, architectures, circuits, and novel applications of secure hardware. HOST 2014 seeks contributions based on, but not limited to, the following topics. - Counterfeit detection and avoidance - Cyber-physical security and trust - Trojan detection and isolation - Implementation attacks and countermeasures - Side channel analysis and fault analysis - Intellectual property protection and metering - Hardware architectures for cryptography - Hardware security primitives: PUFs and TRNGs - Reliability-security optimization and tradeoffs - Applications of secure hardware - Tools and methodologies for secure hardware design For students: - Best paper award for a paper whose first author is a full-time student at the submission time. - Best presentation award for a speaker who is a full-time student at the presentation time. - Travel grants for undergraduate and graduate students.