| |||||||||||||||
HOST 2010 : IEEE International Symposium on Hardware-Oriented Security and TrustConference Series : Hardware-Oriented Security and Trust | |||||||||||||||
Link: http://www.engr.uconn.edu/HOST/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
** Our apologies if you receive multiple copies of this announcement **
-------------------------------------------------------------- CALL FOR PAPERS AND PARTICIPATION HOST-2010: IEEE International Symposium on Hardware-Oriented Security and Trust Co-located with DAC-2010: The 47th Design Automation Conference June 13-14, 2010 Anaheim Convention Center, Anaheim, CA http://www.engr.uconn.edu/HOST/ -------------------------------------------------------------- OVERVIEW The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust (HOST) issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g., to act as a 'kill switch' to disable a chip, to integrated circuit (IC) piracy, and to attacks designed to extract encryption keys and IP from a chip. HOST covers security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. The mission of HOST is to provide a forum for the presentation and discussion of research that is of critical significance to the security of, and trust in, modern society's microelectronic-supported infrastructures. SCOPE AND TOPICS The IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010) provides an open forum for discussions on all issues related to hardware security and trust. Papers and presentations that address any of the following "hot topics" are of high interest to the symposium. Papers addressing HOST issues outside of these areas will be considered equally relevant in the review process. * Trojan Detection and Isolation * Authenticating Foundry of Origin * Side Channel Analysis/Attacks * Watermarking * FPGA Design Security * Hardware focused Cryptography * IC Metering * Physical Unclonable Functions * Embedded and Distributed Systems Security * Hardware Intrusion Detection and Prevention * Security Engineering * Scan chain Encryption * IP Security & Trust PAPER SUBMISSION AND FORMATTING To present at the symposium, submit an Acrobat (PDF) version of your paper via the Easy-Chair webpage at http://www.easychair.org/conferences/?conf=host2010. Note that extended abstracts will be at a disadvantage. The maximum page limit is 6, double column, IEEE format, minimum 10 pt font size. Your paper MUST NOT identify the author(s) anywhere on the manuscript, with all references to the author(s)'s own previous work in the citations being in the 3rd person. Accepted papers will appear in IEEE Xplore. Proposals for Embedded Tutorials, Debates, Panel Discussion, or "Spot-Light" presentations describing industrial experiences are also invited. IMPORTANT DATES Submission of Paper/Extended Abstract: March 26, 2010 Notification of Acceptance: May 7, 2010 Camera Ready Paper: May 21, 2008 GENERAL CHAIR Jim Plusquellic Electrical and Computer Engineering Department University of New Mexico Tel: (505) 277-0785, x-1439 (FAX) E-mail: jimp@ece.unm.edu PROGRAM CHAIR Ken Mai Electrical and Computer Engineering Department Carnegie Mellon University Tel: (412) 268-8335, x-1374 (FAX) E-mail: kenmai@ece.cmu.edu |
|