Conference: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and
TRUST (HOST), 2014

Date being held: May 6-7, 2014
Submission Deadline (Abstract): Dec 10, 2013
Submission Deadline (Full paper): Dec 17, 2013
Place: Austin Convention Center, Austin, TX, USA
Conference website: http://www.hostsymposium.org/

Concise Text version for the CFP:

Hardware trust and security now play critical roles as computing is
intimately integrated into many infrastructures that we depend on. Trusted
hardware platforms make up the backbone for successful deployment and
operation of these infrastructures. Research in recent years show that as
tampering and reverse engineering mature in their sophistication, the
challenges in guaranteeing the trust and security of these components also
grow. For example, backdoors inserted into electronic designs can allow for
silent intruders into the system. Furthermore, new forms of attacks that
exploit side-channel signals are being developed. Third,
intellectual-property protection is becoming a major concern in the
globalized, horizontal semiconductor business model. Located at a new
location near the greater DC, where many defense agencies reside, HOST 2014
aims to continue to be a premiere forum that invites novel solutions to
address these challenges.
The IEEE International Symposium on Hardware Oriented Security and Trust
seeks original contributions in the area of hardware-oriented security.
This includes tools, design methods, architectures, circuits, and novel
applications of secure hardware. HOST 2014 seeks contributions based on,
but not limited to, the following topics.

- Counterfeit detection and avoidance
- Cyber-physical security and trust
- Trojan detection and isolation
- Implementation attacks and countermeasures
- Side channel analysis and fault analysis
- Intellectual property protection and metering
- Hardware architectures for cryptography
- Hardware security primitives: PUFs and TRNGs
- Reliability-security optimization and tradeoffs
- Applications of secure hardware
- Tools and methodologies for secure hardware design

For students:
- Best paper award for a paper whose first author is a full-time student at
the submission time.
- Best presentation award for a speaker who is a full-time student at the
presentation time.
- Travel grants for undergraduate and graduate students.