| |||||||||||||||
HOST 2011 : IEEE Int. Symposium on Hardware-Oriented Security and TrustConference Series : Hardware-Oriented Security and Trust | |||||||||||||||
Link: http://www.hostsymposium.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
A wide range of applications, from secure RFID tagging to high-end trusted computing,
relies on dedicated and trusted hardware platforms. The security and trustworthiness of such hardware designs are critical to their successful deployment and operation. Recent advances in tampering and reverse engineering show that important challenges lie ahead. For example, secure electronic designs may be affected by malicious circuits, Trojans that alter system operation. Furthermore, dedicated secure hardware implementations are susceptible to novel forms of attack that exploit side-channel leakage and faults. Third, the globalized, horizontal semiconductor business model raises concerns of trust and intellectual-property protection. HOST 2011 is a forum for novel solutions to address these challenges. Innovative test mechanisms may reveal Trojans in a design before they are able to do harm. Implementation attacks may be thwarted using side-channel resistant design or fault-tolerant designs. New security- aware design tools can assist a designer in implementing critical and trusted functionality, quickly and efficiently. The IEEE International Symposium on Hardware Oriented Security and Trust seeks original contributions in the area of hardware-oriented security. This includes tools, design methods, architectures, and circuits. In addition, novel applications of secure hardware are especially welcome. HOST 2011 seeks contributions based on, but not limited to, the following topics. Trojan detection and isolation Implementation Attacks and Countermeasures Side channel Analysis and Fault Analysis Intellectual Property Protection and Metering Tools and Methodologies for Secure Hardware Design Hardware Architectures for Cryptography Hardware Security Primitives: PUFs and TRNGs Applications of Secure Hardware Interaction of Secure Hardware and Software |
|