{"id":29,"date":"2025-09-04T19:33:58","date_gmt":"2025-09-04T19:33:58","guid":{"rendered":"https:\/\/host.conferences.computer.org\/2026\/about\/"},"modified":"2025-10-19T00:44:02","modified_gmt":"2025-10-19T00:44:02","slug":"about","status":"publish","type":"page","link":"https:\/\/host.conferences.computer.org\/2026\/about\/","title":{"rendered":"About"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"29\" class=\"elementor elementor-29\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c47bff8 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2c47bff8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3fd461a0\" data-id=\"3fd461a0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-41a7e2b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41a7e2b6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2e396629\" data-id=\"2e396629\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b1d9721 elementor-widget elementor-widget-heading\" data-id=\"3b1d9721\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">About the Conference<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-eb481bc e-flex e-con-boxed e-con e-parent\" data-id=\"eb481bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79cd48c elementor-widget elementor-widget-text-editor\" data-id=\"79cd48c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Rapid proliferation of computing and communication systems with increasing computational power and connectivity into every sphere of modern life has brought security to the forefront of system design, test, and validation processes. The emergence of new application spaces for these systems in the internet-of-things (IoT) regime is creating new attack surfaces as well as new requirements for secure and trusted system operation. Additionally, the design, manufacturing and the distribution of microchip, PCB, as well as other electronic components are becoming more sophisticated and globally distributed with a number of potential security vulnerabilities. Therefore, hardware plays an increasingly important and integral role in system security with many emerging system and application vulnerabilities and defense mechanisms relating to hardware.\u00a0<strong>IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/strong>\u00a0aims to facilitate the rapid growth of hardware-based security research and development. HOST highlights new results in the area of hardware and system security. Relevant research topics include techniques, tools, design\/test methods, architectures, circuits, and applications of secure hardware.<\/p><p>Additional guidance for HOST reviewers on preprint, double-blind, multiple-submissions, and related IEEE policy can be found on the\u00a0<a href=\"https:\/\/host.conferences.computer.org\/2026\/publication-policies\/\" data-feathr-click-track=\"true\" data-feathr-link-aids=\"5cdda43ba3a493000bf82f7f\"><u>HOST Publication Policies<\/u><\/a>\u00a0page.<\/p><h4><span style=\"color: maroon\">Contact Information<\/span><\/h4><h5><span style=\"color: maroon\">General Chairs<\/span><\/h5><p>Saverio Fazzari,\u00a0<strong>Email: <\/strong><span class=\"mailto\"><a href=\"mailto:Saverio.Fazzari.ctr@darpa.mil\" data-feathr-click-track=\"true\" data-feathr-link-aids=\"5cdda43ba3a493000bf82f7f\">Saverio.Fazzari.ctr@darpa.mil<\/a><\/span><br \/>Sandip Ray,\u00a0<strong>Email: <\/strong><span class=\"mailto\"><a href=\"mailto:sandip@ece.ufl.edu\" data-feathr-click-track=\"true\" data-feathr-link-aids=\"5cdda43ba3a493000bf82f7f\">sandip@ece.ufl.edu<\/a><\/span><\/p><h4><span style=\"color: maroon\">IEEE Open Conference Statement<\/span><\/h4><p>Expanding participation in computing is central to the goals of the IEEE Computer Society and all of its conferences. The IEEE Computer Society is firmly committed to broad participation in all sponsored activities, including but not limited to, technical communities, steering committees, conference organizations, standards committees, and ad hoc committees that welcome the entire global community.<\/p><p>IEEE\u2019s mission to foster technological innovation and excellence to benefit humanity requires the talents and perspectives of people with many disciplinary backgrounds.<\/p><p>All individuals are entitled to participate in any IEEE Computer Society activity free of discrimination and harassment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About the Conference Rapid proliferation of computing and communication systems with increasing computational power and connectivity into every sphere of modern life has brought security to the forefront of system design, test, and validation processes. The emergence of new application spaces for these systems in the internet-of-things (IoT) regime is creating new attack surfaces as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-29","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":0,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"wp:attachment":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}