• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Conferences
  • Home
  • /Conferences

Call for Submissions: IEEE HOST 2026

4 – 7 May 2026 | Washington, D.C.

Conference dates: 4 - 7 May 2026 | Washington, D.C.

IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development.

The contribution deadlines are 19 Aug 2025 (first round) and 1 Dec 2025 (second round).

Learn More


Why Participate?

  • Share your work with international experts and peers, and gain valuable feedback

Opportunities

  • Present your emerging ideas and applications
  • Showcase your demos of innovative systems, tools, prototypes andinteractive experiences
  • Utilize your platform to share new advances, ideas, and solutions
  • Highlight your contributions
  • Contribute to event programming and technical content
  • Experience groundbreaking keynote speeches, peer-reviewed technical papers, and posters
  • Take part in emerging presentations and demos

Topics

  • Hot Topics in Hardware Security
    • e.g., advanced packaging security, chiplet security, AI for hardware security, and security of AI chips.
  • Computer-aided Design (CAD) for Hardware Security Verification
    • e.g., automatic techniques and metrics for life cycle security management and detecting security vulnerabilities.
  • Hardware Security Primitives
    • e.g., cryptographic modules, PUFs, TRNGs, post-quantum cryptography, odometers.
  • Hardware Attack and Defense
    • e.g., hardware Trojans, fault injection, side-channels, hardware reverse engineering, hardware obfuscation.
  • Architecture Security
    • e.g., architectural side-channels, trusted execution environment, FPGA and reconfigurable fabric security.
  • System Security
    • e.g., machine learning security, SoC/IP security, CPS/IoT security, sensor network security, and cloud security.
  • Security and Privacy Threats and Solutions
    • e.g., privacy-enhancing architecture, blockchain, and cryptocurrency security.

Submit your content

In addition to submitting your paper to IEEE HOST 2026, you are also encouraged to upload the data related to your paper to IEEE DataPort.  IEEE DataPort is IEEE's data platform that supports the storage and publishing of datasets while also providing access to thousands of research datasets. Uploading your dataset to IEEE DataPort will strengthen your paper and will support research reproducibility.  Your paper and the dataset can be linked, providing a good opportunity for you to increase the number of citations you receive.  Data can be uploaded to IEEE DataPort prior to submitting your paper or concurrent with the paper submission.  Thank you!

LATEST NEWS
Computing’s Top 30: Li Yang
Computing’s Top 30: Li Yang
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Computing’s Top 30: Rohan Basu Roy
Computing’s Top 30: Rohan Basu Roy
Episode 3 | How IEEE Can Support and Enhance Academia
Episode 3 | How IEEE Can Support and Enhance Academia
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

Computing’s Top 30: Li Yang

Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists

Automating Compliance in Life Sciences for Real-Time Audit Readiness

Computing’s Top 30: Rohan Basu Roy

Episode 3 | How IEEE Can Support and Enhance Academia

Behind the Scenes: How SC Volunteers Power One of the World’s Fastest Growing Conferences and Trade Show

Computing’s Top 30: Bo Han

From Clicks to Conversations: How HCI Is Evolving in an AI-First World