Call for Papers: HOST 2015, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015 Washington DC Metro Area, USA, May 5-7, 2015 (Abstract Submission due 24 October 2014, Paper Submission due 31 October 2014) The focus of modern computational and communication systems has been shifting from effective sharing of well-protected, scarce, and expensive resources to large-scale information exchange among a plurality of users that communicate using protected mobile devices and sensors, which can be placed in potentially hostile environments. Additionally, integrated circuit synthesis and manufacturing techniques are now complex and distributed with a number of potential security vulnerabilities. Security has emerged as a metric of paramount importance. The scope of system security now includes, in addition to encrypted communication, properties such as privacy, anonymity, and trust. The starting and ending points for all system and application vulnerabilities and defense mechanisms are hardware. The initial impetus was provided by government agencies and individual efforts, but recently a number of coordinated research projects have been undertaken by essentially all hardware and system companies. The IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aims to facilitate the rapid growth of hardware-based security research and development. HOST seeks original contributions in the area of hardware and system security. Relevant research topics include techniques, tools, design/test methods, architectures, circuits, and applications of secure hardware. HOST 2015 invites contributions that are related to, but not limited by, the following topics. * Hardware Trojan attacks and detection techniques * Hardware-based security primitives (PUFs, PPUFs, HRNG) * Security, privacy, and trust protocols using hardware security primitives * Trusted information flow * Trusted design using untrusted tools * Trusted manufacturing including split manufacturing * Remote integrated circuits enabling and disabling and IP watermarking * Undeniable hardware metering techniques * Techniques and metrics for hardware system data confidentiality and hardware design confidentiality, integrity, and authenticity * Reverse engineering and hardware obfuscation * Side-channel attacks and techniques for their prevention * Supply chain risks mitigation including counterfeit detection & avoidance * Hardware tampering attacks * Hardware authentication techniques * Hardware techniques that ensure software and/or system security * Trusted remote sensing and computing * Hardware attestation techniques SCHEDULE: Submission of Abstract: October 24, 2014 Submission of Paper: October 31, 2014 Notification of Acceptance: January 16, 2015 CONFERENCE DATES: May 5-7, 2015 LOCATION: Washington DC Metro Area, USA Conference Website: http://www.hostsymposium.org Facebook Page: https://www.facebook.com/HOST.IEEE