{"id":97,"date":"2025-12-08T17:17:50","date_gmt":"2025-12-08T17:17:50","guid":{"rendered":"https:\/\/host.conferences.computer.org\/2026\/?page_id=97"},"modified":"2026-01-19T18:39:40","modified_gmt":"2026-01-19T18:39:40","slug":"call-for-tutorials","status":"publish","type":"page","link":"https:\/\/host.conferences.computer.org\/2026\/call-for-tutorials\/","title":{"rendered":"Call For Tutorials"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"97\" class=\"elementor elementor-97\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40a09023 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"40a09023\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f0410b0\" data-id=\"7f0410b0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d59a146 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d59a146\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-25cce2b4\" data-id=\"25cce2b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e03e90a elementor-widget elementor-widget-heading\" data-id=\"7e03e90a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/host.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/6\/2026\/01\/Call-for-Tutorials.pdf\">Call For Tutorials<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-2fce5e1d e-flex e-con-boxed e-con e-parent\" data-id=\"2fce5e1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41ceb969 elementor-widget elementor-widget-text-editor\" data-id=\"41ceb969\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The\u00a0<strong>IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/strong>\u00a0aims to facilitate the rapid growth of hardware-based security research and development, and to highlight new results in the area of hardware security.\u00a0<strong>HOST 2026<\/strong> will organize a multi-session (90-minute or 150-minute each) hardware security tutorial to take place on the first day of the program (<strong>May 4, 2026<\/strong>). We invite contributions to the tutorial sessions related to, but not limited to, the following topics:<\/p><ul class=\"list\"><li><strong>Advances in HW Security through CHIPS Opportunities<\/strong><\/li><li><strong>The Future of Chiplet Architectures and their Impact on Security and Trust<\/strong><\/li><li><strong>Impacts of Artificial Intelligence on HW Security and Trust<\/strong><\/li><li><strong>Post Quantum Cryptography: Where are We Today?<\/strong><\/li><li><strong>Establishing Supply Chain Resilience in a Post-Covid World<\/strong><\/li><li><strong>Fundamentals of Root of Trust<\/strong><\/li><li><strong>Hardware Security Fundamentals<\/strong><\/li><li><strong>Security Verification<\/strong><\/li><\/ul><p><strong>HOST<\/strong>\u00a0welcomes tutorials that target a broad audience &#8211; for both beginners and professionals in the hardware security and trust field. Hence, tutorials should include a mixture of both introductory and in-depth content. Any prerequisites required by the participants must be clearly specified in the proposal (see submission guidelines below).<\/p><h4><span style=\"color: maroon\">Compensation and Requirements<\/span><\/h4><p>Accepted tutorials\u00a0<strong>must<\/strong> must have a minimum of ten registered participants at least ten days before the event or the session may be cancelled. Presenters will be compensated with a percentage of the participant tutorial fees through an honorarium. In the case of multiple presenters for a given tutorial, the honorarium will be equally divided amongst the presenters. <em><u>Members of the Organization Committee are ineligible for compensation through an honorarium but may receive reimbursement towards conference registration fees or hotel costs.<\/u><\/em><\/p><h4><span style=\"color: maroon\">Submission Instructions<\/span><\/h4><p>Tutorial proposals should be 4 pages in length and must include the following sections:<\/p><ul class=\"list\"><li><strong>Presenter information (name, affiliation, e-mail, etc.)<\/strong><\/li><li><strong>Presenters&#8217; short bio<\/strong><\/li><li><strong>Length of the tutorial (either 90 minutes or 150 minutes)<\/strong><\/li><li><strong>Tutorial title<\/strong><\/li><li><strong>Tutorial summary and goals (~250 words)<\/strong><\/li><li><strong>Tutorial organization (schedule and breakdown of the content)<\/strong><\/li><li><strong>Target audience and estimated number of attendees<\/strong><\/li><li><strong>Prerequisites or required materials (if any) for the attendees<\/strong><\/li><li><strong>Information about past offering of the tutorial (if a version of the tutorial was presented at HOST or other venues in the past)<\/strong><\/li><\/ul><p>All tutorial proposals must be submitted to the\u00a0<strong>HOST 2026<\/strong>\u00a0EasyChair website at\u00a0<a href=\"https:\/\/easychair.org\/conferences\/?conf=host2026\" data-feathr-click-track=\"true\" data-feathr-link-aids=\"5cdda43ba3a493000bf82f7f\">https:\/\/easychair.org\/conferences\/?conf=host2026<\/a>.<\/p><h4><span style=\"color: maroon\">Important Dates<\/span><\/h4><p><b><span style=\"color: red\"><s>January 16, 2026<\/s><\/span> January 30, 2026:<\/b>\u00a0Deadline for tutorial proposals<\/p><p><b>February 27, 2026:<\/b>\u00a0Notification of acceptance<\/p><p><b>May 4, 2026:<\/b>\u00a0HOST tutorial day<\/p><h4><span style=\"color: maroon\">Contact Information<\/span><\/h4><h5><span style=\"color: maroon\">HOST Tutorial Chair<\/span><\/h5><p><strong>Matthew Areno<\/strong>, E-mail: <a href=\"mailto:matt@rickertarenoengineering.com\">matt@rickertarenoengineering.com<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Call For Tutorials The\u00a0IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\u00a0aims to facilitate the rapid growth of hardware-based security research and development, and to highlight new results in the area of hardware security.\u00a0HOST 2026 will organize a multi-session (90-minute or 150-minute each) hardware security tutorial to take place on the first day of [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-97","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/97","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/comments?post=97"}],"version-history":[{"count":0,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/97\/revisions"}],"wp:attachment":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/media?parent=97"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}