Asian Hardware Oriented Security and Trust Symposium (AsianHOST)

December 16-17, 2019
Aoxiang International Conference Center
Xi'an, P.R. China

Asian Hardware Oriented Security and Trust Symposium (AsianHOST) is an annual symposium which aims to facilitate the rapid growth of hardware-based security research and development. Another goal of this conference is to help build hardware security community in Asian and Pacific area.

Selected accepted papers will be invited for extended journal paper submission to the approved IEEE Transactions on Computer Aided Design of Circuits and Systems (TCAD) Special Issue for AsianHOST 2019 on Hardware Oriented Security and Trust: Threats, Countermeasures and Design Tools.

Featured Speakers / Panelists

Massimo Alioto
INVITED SPEAKER
Massimo Alioto
National University of Singapore
Bernhard Lippmann
INVITED SPEAKER
Bernhard Lippmann
Infineon Technologies AG
Yu Yao
INVITED SPEAKER
Yu Yao
Northeastern University
Zongyao Wen
INVITED SPEAKER
Zongyao Wen
Synopsys

Hardware has long been viewed as a trusted party supporting the whole computer system and is often treated as an abstract layer running instructions passed through the software layer. Historically, cybersecurity community believed that the integrated circuit (IC) supply chain is well protected. However, the IC supply chain, which is now spread around the globe, has become more vulnerable to attacks than before. The heavy reliance on third-party resources/services breeds security concerns and invalidates the illusion that attackers cannot easily access the isolated IC supply chain. Formal methods have been proven to be effective in security verification on hardware code. Trustworthy hardware is also under development for the construction of the root-of-trust. The intrinsic properties of existing and emerging devices, MOSFET, memristor, spintronics, etc. are leveraged for security primitives and applications. Another trend in the hardware security area is the development of security enhanced hardware infrastructure for system level protection. The goal is to provide a fully operational software and hardware platform that ensures secure design, manufacturing, and deployment of modern computer systems.
MORE


Privacy policy: https://www.ieee.org/security-privacy.html

Equity, Diversity and Inclusion Statement