HOST 2025 | IEEE International Symposium on Hardware Oriented Security and Trust

HOST 2025 Hardware Hacking Competition

Objective

Are you ready to showcase your hardware security skills and tackle real-world challenges? Join us at the 2025 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), where participants will test their Hardware Hacking expertise in identifying vulnerabilities, breaking barriers, and designing innovative solutions in hardware security.

About the Competition

This event brings together hardware security enthusiasts, students, and professionals to showcase their skills in real-life hardware and embedded systems hacking. Engage with the best minds in the field and display your abilities in secure design, reverse engineering, and vulnerability analysis.

We welcome proposals that highlight:

  • Innovative hardware hacking methodologies.
  • Real-world attack demonstrations on hardware platforms.
  • Countermeasure analyses through practical experiments.
  • Insights into vulnerabilities in modern hardware systems.

Who Can Participate?

Students, researchers, and professionals in hardware security or related fields.

Individuals or teams of up to 3 members are welcome.

Awards and Prizes

Winners will be recognized for their exceptional performance and creativity. Prizes include:

  • 1st Place: $1000
  • 2nd Place: $500
  • 3rd Place: $250

Additional prizes may be awarded for creativity, teamwork, and unique solutions. A panel of experienced jurors, consisting of members from government, industry, and academia, will evaluate the demonstrations to assign the awards.

Submission Guidelines

Submit a two-page proposal in PDF format addressing the following (10pt, single column, A4 size, single spacing):

  1. Title and Abstract: A brief summary of your demonstration.
  2. Objectives: Key takeaways for the audience.
  3. Threat Model: The primary threat being addressed in your demonstration.
  4. Technical Details: Description of the hacking methodology, hardware platforms involved, and security implications.
  5. Novelty: Explain what sets your demonstration apart.
  6. Logistics Requirements: Specify any hardware, software, or network setup needed for the live demo. Indicate any special requests (e.g., additional power supplies, specific space setups, internet connectivity).
  7. Presenter Information: Names, affiliations, and contact details.

Important Dates

Proposal Submission Deadline: February 1st, 2025

Notification of Acceptance: February 22nd, 2025

Final Demo Confirmation: March 15th, 2025

Selection Criteria

Submissions will be evaluated based on innovation, technical rigor, feasibility, and alignment with the conference themes. Preference will be given to demonstrations that engage the audience and provide practical insights into hardware security challenges and solutions.

Live Demo Requirements

Accepted presenters must prepare a 10-15 minute live demonstration to be showcased during the conference. Please ensure all necessary equipment and materials are tested and compatible with the venue setup.

How to Submit

Submit to EasyChair: Choose the track Hardware Hacking.

We look forward to your creative and thought-provoking contributions to IEEE HOST 2025! Join us in advancing the frontier of hardware security.

Contact Information

For questions, please contact the hardware hacking co-chairs:

Kanad Basu, E-mail:kanad.basu@utdallas.edu
Nitin Pundir, E-mail:nitin.pundir@ibm.com