Hardware has long been viewed as a trusted party supporting the whole computer system and is often treated as an abstract layer running instructions passed through the software layer. Historically, cybersecurity community believed that the integrated circuit (IC) supply chain is well protected. However, the IC supply chain, which is now spread around the globe, has become more vulnerable to attacks than before. The heavy reliance on third-party resources/services breeds security concerns and invalidates the illusion that attackers cannot easily access the isolated IC supply chain. Formal methods have been proven to be effective in security verification on hardware code. Trustworthy hardware is also under development for the construction of the root-of-trust. The intrinsic properties of existing and emerging devices, MOSFET, memristor, spintronics, etc. are leveraged for security primitives and applications. Another trend in the hardware security area is the development of security enhanced hardware infrastructure for system level protection. The goal is to provide a fully operational software and hardware platform that ensures secure design, manufacturing, and deployment of modern computer systems.
Asian Hardware Oriented Security and Trust Symposium (AsianHOST) aims to facilitate the rapid growth of hardware security research and development in Asia and South Pacific areas. AsianHOST highlights new results in the area of hardware and system security. Relevant research topics include techniques, tools, design/test methods, architectures, circuits, and applications of secure hardware. AsianHOST 2017 invites original contributions related to, but not limited by, the following topics.
AsianHOST 2018 invites original contributions related to, but not limited by, the following topics.
Security analysis and protection of Internet of Things (IoT)
Cyber-physical system (CPS) security and resilience
Architectural and microarchitectural attacks and defenses
Analysis of real attacks and threat evaluation
Hardware Trojan attacks and detection techniques
Side-channel attacks and countermeasures
Metrics, policies, and standards related to hardware security
Secure system-on-chip (SoC) architecture
Security rule checks at IP, IC, and System levels
Hardware IP trust (watermarking, metering, trust verification)
Trusted manufacturing including split manufacturing, 2.5D, and 3D ICs
Emerging nanoscale technologies in hardware security applications
Reverse engineering and hardware obfuscation at all levels of abstraction
Supply chain risks mitigation including counterfeit detection & avoidance
12月17日
2018
12月18日
2018
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
2024年12月16日 日本 Kobe
2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)2023年12月13日 中国 Tianjin
2023 Asian Hardware Oriented Security and Trust Symposium2021年12月16日 中国 Shanghai
2021 Asian Hardware Oriented Security and Trust Symposium2017年10月19日 中国 东城区
2017 Asian Hardware Oriented Security and Trust Symposium
留言