征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Hardware has long been viewed as a trusted party supporting the whole computer system and is often treated as an abstract layer running instructions passed through the software layer. Historically, cybersecurity community believed that the integrated circuit (IC) supply chain is well protected. However, the IC supply chain, which is now spread around the globe, has become more vulnerable to attacks than before. The heavy reliance on third-party resources/services breeds security concerns and invalidates the illusion that attackers cannot easily access the isolated IC supply chain. Formal methods have been proven to be effective in security verification on hardware code. Trustworthy hardware is also under development for the construction of the root-of-trust. The intrinsic properties of existing and emerging devices, MOSFET, memristor, spintronics, etc. are leveraged for security primitives and applications. Another trend in the hardware security area is the development of security enhanced hardware infrastructure for system level protection. The goal is to provide a fully operational software and hardware platform that ensures secure design, manufacturing, and deployment of modern computer systems.

Asian Hardware Oriented Security and Trust Symposium (AsianHOST) aims to facilitate the rapid growth of hardware security research and development in Asia and South Pacific areas. AsianHOST highlights new results in the area of hardware and system security. Relevant research topics include techniques, tools, design/test methods, architectures, circuits, and applications of secure hardware. AsianHOST 2017 invites original contributions related to, but not limited by, the following topics.

征稿信息

重要日期

2018-08-03
初稿截稿日期
2018-09-15
初稿录用日期
2018-10-15
终稿截稿日期

征稿范围

AsianHOST 2018 invites original contributions related to, but not limited by, the following topics.
 Security analysis and protection of Internet of Things (IoT)
 Cyber-physical system (CPS) security and resilience
 Architectural and microarchitectural attacks and defenses
 Analysis of real attacks and threat evaluation
 Hardware Trojan attacks and detection techniques
 Side-channel attacks and countermeasures
 Metrics, policies, and standards related to hardware security
 Secure system-on-chip (SoC) architecture
 Security rule checks at IP, IC, and System levels
 Hardware IP trust (watermarking, metering, trust verification)
 Trusted manufacturing including split manufacturing, 2.5D, and 3D ICs
 Emerging nanoscale technologies in hardware security applications
 Reverse engineering and hardware obfuscation at all levels of abstraction
 Supply chain risks mitigation including counterfeit detection & avoidance

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月17日

    2018

    12月18日

    2018

  • 08月03日 2018

    初稿截稿日期

  • 09月15日 2018

    初稿录用通知日期

  • 10月15日 2018

    终稿截稿日期

  • 12月18日 2018

    注册截止日期

主办单位
IEEE Council on Electronic Design Automation
联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询