{"id":110,"date":"2026-01-19T18:37:11","date_gmt":"2026-01-19T18:37:11","guid":{"rendered":"https:\/\/host.conferences.computer.org\/2026\/?page_id=110"},"modified":"2026-01-19T18:37:15","modified_gmt":"2026-01-19T18:37:15","slug":"call-for-phd-dissertation-competition","status":"publish","type":"page","link":"https:\/\/host.conferences.computer.org\/2026\/call-for-phd-dissertation-competition\/","title":{"rendered":"Call for PhD Dissertation Competition"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"110\" class=\"elementor elementor-110\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-54ce5c09 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"54ce5c09\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e2f1835\" data-id=\"4e2f1835\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-242ad83e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"242ad83e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-38bb73d2\" data-id=\"38bb73d2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e176274 elementor-widget elementor-widget-heading\" data-id=\"6e176274\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/host.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/6\/2026\/01\/HOST-Call-for-PhD-Dissertations-2026-v4.pdf\" target=\"_blank\">Call for PhD Dissertation Competition<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-1d30bf65 e-flex e-con-boxed e-con e-parent\" data-id=\"1d30bf65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-588a9758 elementor-widget elementor-widget-text-editor\" data-id=\"588a9758\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The <strong>IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/strong> invites the soon-to-be graduated Ph.D. students (and recent graduates) to participate in the competitive Ph.D. Dissertation Contest. The aim is selecting the dissertations that are advancing the state-of-the-art research in the field of hardware-oriented security and trust. The objective is to simply evaluate the quality of the research carried out during the Ph.D. program.<\/p><h4><span style=\"color: maroon\">Area of Research<\/span><\/h4><ul class=\"list\"><li><strong>Hot Topics in Hardware Security<\/strong><ul class=\"list\"><li>e.g., advanced packaging security, chiplet security, AI for hardware security, and security of AI chips.<\/li><\/ul><\/li><li><strong>Computer-aided Design (CAD) for Hardware Security Verification<\/strong><br \/><ul class=\"list\"><li>e.g., automatic techniques and metrics for life cycle security management and detecting security vulnerabilities.<\/li><\/ul><\/li><li><strong>Hardware Security Primitives<\/strong><br \/><ul class=\"list\"><li>e.g., cryptographic modules, PUFs, TRNGs, post-quantum cryptography, odometers.<\/li><\/ul><\/li><li><strong>Hardware Attack and Defense<\/strong><br \/><ul class=\"list\"><li>e.g., hardware Trojans, fault injection, side-channels, hardware reverse engineering, hardware obfuscation.<\/li><\/ul><\/li><li><strong>Architecture Security<\/strong><br \/><ul class=\"list\"><li>e.g., architectural side-channels, trusted execution environment, FPGA and reconfigurable fabric security.<\/li><\/ul><\/li><li><strong>System security<\/strong><br \/><ul class=\"list\"><li>e.g., machine learning security, SoC\/IP security, CPS\/IoT security, sensor network security, smart grid security, cloud security.<\/li><\/ul><\/li><li><strong>Security and Privacy Threats and Solutions<\/strong><ul><li>e.g., privacy-enhancing architecture, blockchain, and cryptocurrency security.<\/li><\/ul><\/li><\/ul><h4><span style=\"color: maroon\">Eligibility<\/span><\/h4><p>Those who will defend their Ph.D. dissertation no later than May 1, 2027 as well as all Ph.D. alumni who graduated after April 30, 2025 are eligible to participate in the competition.<\/p><h4><span style=\"color: maroon\">Competition Process<\/span><\/h4><p>To ensure the fairness of the process, the competition will follow a <strong>double-blind review<\/strong> process. The first step is submitting a <b>two-page PDF file<\/b> that includes a cover letter (one page) and a <strong>one-page extended abstract. <\/strong>The extended abstract will be reviewed in a double-blind manner. Then the selected contestants will give a short presentation at HOST 2026 without pointing to their names, their advisor(s), school, and publications. The winner will be selected right after the competition and will be announced during the reception event.<\/p><h4><span style=\"color: maroon\">Submission<\/span><\/h4><p>The participants must submit a <strong>one-page cover letter<\/strong> and a <strong>one-page extended abstract<\/strong> of their Ph.D. thesis (including Figures and Tables). Please only submit one PDF file including both the cover letter and the extended abstract. The submission should <strong>NOT<\/strong> include the name of the participant, the advisor(s), or the school.<\/p><p>The cover letter should answer the following questions:<\/p><ol class=\"list\"><li>When will\/did you graduate?<\/li><li>How many papers did you publish totally on your thesis topic?<\/li><li>Please mention ONLY the venues of your publications (for blind review: <strong>without<\/strong> mentioning the publication year, paper title, and author list).<\/li><li>In which of publications you mentioned in the answer to Question 3, you were the first author?<\/li><\/ol><p>The abstract should include problem statements, objectives, novelty, and the approach. Please make sure to explain contributions of your work including why the work is unique and how it advances the state of the art. No references are allowed to follow a <strong>blind review<\/strong> process.<\/p><h4><span style=\"color: maroon\">Important Dates<\/span><\/h4><p><b>February 28, 2026:<\/b> Deadline for applications<\/p><p><b>March 20, 2026:<\/b> Notification of acceptance<\/p><p><strong>Submission Site<\/strong>: <a href=\"https:\/\/easychair.org\/conferences\/?conf=host2026\">https:\/\/easychair.org\/conferences\/?conf=host2026<\/a> (Please make a new submission and choose the <strong>HOST 2026 PhD Competition<\/strong> track)<\/p><h4><span style=\"color: maroon\">Contact Information<\/span><\/h4><h5><span style=\"color: maroon\">HOST PhD Dissertation Competition Chairs<\/span><\/h5><p><strong>Xiaolong Guo<\/strong>, Kansas State University, Email: <a href=\"mailto:guoxiaolong@ksu.edu\">guoxiaolong@ksu.edu\u00a0<\/a><\/p><p><strong>Yukui Luo<\/strong>, Binghamton University, Email: <a href=\"mailto:yluo11@binghamton.edu\">yluo11@binghamton.edu<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Call for PhD Dissertation Competition The IEEE International Symposium on Hardware Oriented Security and Trust (HOST) invites the soon-to-be graduated Ph.D. students (and recent graduates) to participate in the competitive Ph.D. Dissertation Contest. The aim is selecting the dissertations that are advancing the state-of-the-art research in the field of hardware-oriented security and trust. The objective [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-110","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":0,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"wp:attachment":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}