{"id":515,"date":"2020-08-20T15:14:11","date_gmt":"2020-08-20T15:14:11","guid":{"rendered":"http:\/\/dforte.ece.ufl.edu\/?page_id=515"},"modified":"2026-04-11T18:55:30","modified_gmt":"2026-04-11T23:55:30","slug":"service","status":"publish","type":"page","link":"https:\/\/faculty.eng.ufl.edu\/dforte\/service\/","title":{"rendered":"Service"},"content":{"rendered":"\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n<h1>Conference Organizing Committees and Track Chair Positions<\/h1>\n<\/th><\/tr><tr><td>TPC Subcommittee Chair for \u201cSYS8: Hardware Security: Attack and Defense\u201d, Design Automation Conference (DAC), 2025<\/td><\/tr><tr><td>Co-Program Chair, International Conference on Security, Privacy, and Applied Cryptographic Engineering (SPACE), 2024<\/td><\/tr><tr><td>TPC Subcommittee Chair for &#8220;SEC2: Hardware Security: Attack and Defense&#8221;, Design Automation Conference (DAC), 2024<\/td><\/tr><tr><td>Co-Program Chair, Workshop on Attacks and Solutions in Hardware Security (ASHES), 2023<\/td><\/tr><tr><td>TPC Subcommittee Chair for &#8220;SEC2: Hardware Security: Attack and Defense&#8221;, Design Automation Conference (DAC), 2023<\/td><\/tr><tr><td>Co-Program Chair, Workshop on Attacks and Solutions in Hardware Security (ASHES), 2022<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Registration Chair, IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2021<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Publicity and Industry Liaison Chair, Workshop on Attacks and Solutions in Hardware Security (ASHES), 2021<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Hardware Security Track Co-Chair, IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), 2021<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Steering Committee Member, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020 &#8211; 2023<\/td><\/tr><tr><td>General Chair, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Publicity Chair, Workshop on Attacks and Solutions in Hardware Security (ASHES), 2020<\/td><\/tr><tr><td>Program Chair, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2019<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Publicity Chair, IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2019<\/td><\/tr><tr><td>Vice Program Chair, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2018<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Publicity Chair, Workshop on Attacks and Solutions in Hardware Security (ASHES), 2019<\/td><\/tr><tr><td>Reverse Engineering Track Chair, International Symposium for Testing and Failure Analysis (ISTFA) 2018<\/td><\/tr><tr><td>Publicity Chair, IEEE Asian Hardware-Oriented Security and Trust Symposium (AsianHOST) 2018<\/td><\/tr><tr><td>Publicity Chair, Workshop on Attacks and Solutions in Hardware Security (ASHES), 2018<\/td><\/tr><tr><td>Program Co-Chair, International Verification and Security Workshop (IVSW), 2017<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Tutorial Chair, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2017<\/td><\/tr><tr><td>Publicity Chair, IEEE Asian Hardware-Oriented Security and Trust Symposium (AsianHOST) 2017<\/td><\/tr><tr><td>Poster Chair, FICS Research Annual Conference on Cybersecurity, 2017<\/td><\/tr><tr><td>Reverse Engineering Track Chair, International Symposium for Testing and Failure Analysis (ISTFA) 2016<\/td><\/tr><tr><td>Publicity Chair, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016<\/td><\/tr><tr><td>Publicity Chair, IEEE Asian Hardware-Oriented Security and Trust Symposium (AsianHOST) 2016<\/td><\/tr><tr><td>Publicity Chair, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Hardware Security Challenge Co-Chair, CSI Cybersecurity, Education &amp; Diversity Challenge Week (CyberSEED), 2014<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th colspan=\"2\">\n<h1><b>Program Committee Memberships<\/b><\/h1>\n<\/th><\/tr><tr><td>ACM Conference on Post-Quantum and Quantum-based Security (PQQS)<\/td><td>2026<\/td><\/tr><tr><td>ACM\/IEEE International Symposium on Low Power Electronics and Design (ISLPED)<\/td><td>2022<\/td><\/tr><tr><td>ACM Great Lakes Symposium on VLSI (GLSVLSI)<\/td><td>2017-2022<\/td><\/tr><tr><td>DAC PhD Forum<\/td><td>2016-2018<\/td><\/tr><tr><td>Design Automation Conference (DAC)<\/td><td>2015, 2016, 2023-2025<\/td><\/tr><tr><td>Hardwear.io USA and NL<\/td><td>2022, 2023<\/td><\/tr><tr><td>IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST)<\/td><td>2016-2024, 2026<\/td><\/tr><tr><td>IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)<\/td><td>2019<\/td><\/tr><tr><td>IEEE International Conference on Computer Design (ICCD)<\/td><td>2015<\/td><\/tr><tr><td>IEEE International Conference on Automatic Face and Gesture Recognition (FG)<\/td><td>2025<\/td><\/tr><tr><td>IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)<\/td><td>2020-2026<\/td><\/tr><tr><td>IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/td><td>2014-2019 (TPC), 2018 and 2023 (Tutorials)<\/td><\/tr><tr><td>IEEE International Symposium on Quality Electronic Design (ISQED)<\/td><td>2015-2018<\/td><\/tr><tr><td>IEEE International Test Conference (ITC)<\/td><td>2015, 2017, 2018<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>IEEE International Workshop\/Conference on Physical Attacks and Inspection on Electronics (PAINE)<\/td><td>2018-2020<\/td><\/tr><tr><td>IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC)<\/td><td>2021<\/td><\/tr><tr><td>IJCB 2024 Special Session on Face Morphing Attack and Detection Techniques<\/td><td>2024<\/td><\/tr><tr><td>International Conference on Computer-Aided Design (ICCAD)<\/td><td>2015-2017<\/td><\/tr><tr><td>International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE)<\/td><td>2020-2025<\/td><\/tr><tr><td>International Symposium for Testing and Failure Analysis (ISTFA)<\/td><td>2016, 2018<\/td><\/tr><tr><td>International Workshop on Cyberspace Security and Artificial Intelligence (CAI)<\/td><td>2023<\/td><\/tr><tr><td>Network &amp; Distributed System Security Symposium (NDSS)<\/td><td>2017, 2018<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Open Tools, Interfaces and Metrics for Implementation Security Testing (OPTIMIST)<\/td><td>2024<\/td><\/tr><tr><td>Smart Card Research and Advanced Application Conference (CARDIS)<\/td><td>2017-2021<\/td><\/tr><tr><td>USENIX Security Symposium<\/td><td>2022, 2023<\/td><\/tr><tr><td>Workshop on Attacks and Solutions in Hardware Security (ASHES)<\/td><td>2017-2020, 2022-2025<\/td><\/tr><tr><td>Workshop on Embedded Systems Security (WESS)<\/td><td>2013-2015<span class=\"Apple-converted-space\">&nbsp;<\/span><\/td><\/tr><tr><td>Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE)<\/td><td>2014<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n<h1>Editorial Activities<\/h1>\n<\/th><\/tr><tr><td>Associate Editor, Journal of Cryptographic Engineering (JCEN), 2021 &#8211; present<\/td><\/tr><tr><td>Associate Editor, ACM Journal on Emerging Technologies in Computing (JETC), 2020 &#8211; present<\/td><\/tr><tr><td>Associate Editor, Journal of Hardware and Systems Security (HaSS), 2016 &#8211; present<\/td><\/tr><tr><td>Guest Editor, Journal of Hardware and Systems Security (HaSS) Special Issue on &#8220;Secure Crypto&#8221;, 2025<\/td><\/tr><tr><td>Guest Editor, Journal of Cryptographic Engineering (JCEN) Special Issue on &#8220;ASHES 2023&#8221;, 2024<\/td><\/tr><tr><td>Guest Editor, Journal of Hardware and Systems Security (HaSS) Special Issue on &#8220;Multi-tenant Computing Security Challenges and Solutions&#8221;, 2023<\/td><\/tr><tr><td>Guest Editor, Journal of Cryptographic Engineering (JCEN) Special Issue on &#8220;ASHES 2022&#8221;, 2023<\/td><\/tr><tr><td>Guest Editor,&nbsp; ACM Journal on Emerging Technologies in Computing (JETC) Special Issue on &#8220;Emerging Challenges and Solutions in Hardware Security&#8221;, 2020<\/td><\/tr><tr><td>Guest Editor, Journal of Hardware and Systems Security (HaSS) Special Issue on &#8220;Reverse Engineering and Obfuscation&#8221;, 2018<\/td><\/tr><tr><td>Guest Editor, IEEE Computer Special Issue on &#8220;Supply Chain Security for Cyber-Infrastructure&#8221;, 2016<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n<h1>Working Groups<\/h1>\n<\/th><\/tr><tr><td>Test Article Development Working Group, Member, 2020 &#8211; present<\/td><\/tr><tr><td>Hardware CWE Special Interest Group (HW CWE SIG), Member, 2020 &#8211; present<\/td><\/tr><tr><td>IEEE P1735 Working Group, Member, 2018 &#8211; present<\/td><\/tr><tr><td>TAME Hardware Vulnerability Database Working Group, Scribe and Member, 2018 &#8211; 2019<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n<h1><b>Proposal Panelist\/Reviewer<\/b><\/h1>\n<\/th><\/tr><tr><td>German Research Foundation (DFG), 2023<\/td><\/tr><tr><td>National Science Foundation (NSF), 2023<\/td><\/tr><tr><td>German Research Foundation (DFG), 2022<\/td><\/tr><tr><td>National Science Foundation (NSF), 2021<\/td><\/tr><tr><td>National Science Foundation (NSF), 2021<\/td><\/tr><tr><td>Army Research Office (ARO), 2021<\/td><\/tr><tr><td>National Science Foundation (NSF), 2020<\/td><\/tr><tr><td>Army Research Office (ARO), 2020<\/td><\/tr><tr><td>National Science Foundation (NSF), 2019<\/td><\/tr><tr><td>National Science Foundation (NSF), 2018<\/td><\/tr><tr><td>Army Research Office (ARO), 2017<\/td><\/tr><tr><td>American Association for the Advancement of Science (AAAS), 2017<\/td><\/tr><tr><td>National Science Foundation (NSF), 2016<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n<h1><b>Tutorials and Training Sessions<\/b><\/h1>\n<\/th><\/tr><tr><td>&#8220;Counterfeit IC Detection and Avoidance&#8221;, International Conference on Security, Privacy, and Applied Cryptographic Engineering (SPACE), 2024<\/td><\/tr><tr><td>&#8220;IC Security and Assurance: Counterfeit IC Detection and Avoidance&#8221;, IEEE International Symposium on Circuits and Systems (ISCAS), 2022<\/td><\/tr><tr><td>&#8220;Logic Locking Hands-on Training&#8221;, The National MicroElectronics Security Training Center (MEST), 2020<\/td><\/tr><tr><td>&#8220;Counterfeit Integrated Circuits: Threats, Detection, and Avoidance&#8221;, Conference on Cryptographic Hardware and Embedded Systems (CHES) 2018<\/td><\/tr><tr><td>&#8220;Test Opportunities and Challenges for Secure Hardware and Verifying Trust in Integrated Circuits&#8221;, IEEE Int. Test Conference (ITC) 2016<\/td><\/tr><tr><td>&#8220;Test Opportunities and Challenges for Secure Hardware and Verifying Trust in Integrated Circuits&#8221;, IEEE Int. Test Conference (ITC) 2015<\/td><\/tr><tr><td>&#8220;All You Need to Know About Hardware Trojans and Counterfeit ICs&#8221;, Design Automation and Test in Europe (DATE) 2014<\/td><\/tr><tr><td>&#8220;All You Need to Know About Hardware Trojans and Counterfeit ICs&#8221;, IEEE Conference on VLSI 2013<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n<h1>Review Activities<\/h1>\n<\/th><\/tr><tr><td>ACM Computing Surveys<\/td><\/tr><tr><td>ACM Journal on Emerging Technologies in Computing Systems (JETC)<\/td><\/tr><tr><td>ACM Transactions on Design Automation of Electronic Systems (TODAES)<\/td><\/tr><tr><td>ACM Transactions on Privacy and Security (TOPS)<\/td><\/tr><tr><td>Biomedical Engineering\/Biomedizinische Technik (BMT)<\/td><\/tr><tr><td>IEEE Access<\/td><\/tr><tr><td>IEEE Communication Letters<\/td><\/tr><tr><td>IEEE Design and Test (D&amp;T)<\/td><\/tr><tr><td>IEEE Journal of Solid-State Circuits (JSSC)<\/td><\/tr><tr><td>IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS)<\/td><\/tr><tr><td>IEEE Transactions on Biomedical Engineering (TBME)<\/td><\/tr><tr><td>IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM)<\/td><\/tr><tr><td>IEEE Transactions on Circuits and Systems I (TCAS1)<\/td><\/tr><tr><td>IEEE Transactions on Circuits and Systems II (TCAS2)<\/td><\/tr><tr><td>IEEE Transactions on Computer-Aided Design of Integrated Circuits (TCAD)<\/td><\/tr><tr><td>IEEE Transactions on Computers<\/td><\/tr><tr><td>IEEE Transactions on Dependable and Secure Computing (TDSC)<\/td><\/tr><tr><td>IEEE Transactions on Embedded Computing Systems (TECS)<\/td><\/tr><tr><td>IEEE Transactions on Emerging Topics in Computing (TETC)<\/td><\/tr><tr><td>IEEE Transactions on Industrial Electronics (TIE)<\/td><\/tr><tr><td>IEEE Transactions on Information Forensics and Security (TIFS)<\/td><\/tr><tr><td>IEEE Transactions on Multi-Scale Computing Systems (TMSCS)<\/td><\/tr><tr><td>IEEE Transactions on Nanotechnology (TNANO)<\/td><\/tr><tr><td>IEEE Transactions on Nuclear Science (TNS)<\/td><\/tr><tr><td>IEEE Transactions on VLSI Systems (TVLSI)<\/td><\/tr><tr><td>IET Computers &amp; Digital Techniques<\/td><\/tr><tr><td>Image and Vision Computing Journal<\/td><\/tr><tr><td>Integration, the VLSI Journal<\/td><\/tr><tr><td>Journal of Cryptographic Engineering (JCEN)<\/td><\/tr><tr><td>Journal of Electronic Testing: Theory and Applications (JETTA)<\/td><\/tr><tr><td>Microelectronics Reliability<\/td><\/tr><tr><td>Nature Communications<\/td><\/tr><tr><td>Nature Electronics<\/td><\/tr><tr><td>Neurocomputing<\/td><\/tr><tr><td>Sensors<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>\n<h1>Departmental Appointments and Committees<\/h1>\n<\/th><\/tr><tr><td>Honors and Awards Committee Chair, Spring 2023 &#8211; present<\/td><\/tr><tr><td>ECE Graduate Curriculum Committee, AY 22-23<\/td><\/tr><tr><td>Electronics Area Track Chair, AY 22-23<\/td><\/tr><tr><td>Faculty Search Committee, AY 17-18, AY 21-22, AY 22-23<\/td><\/tr><tr><td>Graduate Recruiting &amp; Admissions Committee (GRAC), AY 15-16, AY 16-17, AY 17-18, AY 18-19, AY 19-20, AY 20-21, AY 21-22<\/td><\/tr><tr><td>EEL 4930\/4712 Programming for EE 2 ABET Course Committee, 2020\u20132022<\/td><\/tr><tr><td>Chair, Computer Engineering Subcommittee on Undergraduate EE Programming, Spring 2019 &#8211; Fall 2020<\/td><\/tr><tr><td>EEE 3000 Intro to ECE ABET Course Committee, 2018\u20132023<\/td><\/tr><tr><td>EEL 3923C ECE Design 1, 2022-2023<\/td><\/tr><tr><td>EEL 4242 Power Electronics 1 ABET Course Committee, 2017-2019<\/td><\/tr><tr><td>EEE 4404 Mixed Signal IC Testing I ABET Course Committee, 2016-2019<\/td><\/tr><tr><td>EEE 4310 Digital Integrated Circuits ABET Course Committee, 2015-2019<\/td><\/tr><tr><td>EEL 3111 Circuits 1 ABET Course Committee, 2015-2017<\/td><\/tr><tr><td>Department Judge- First Annual Graduate Poster Competition, University of Connecticut, 2015<\/td><\/tr><tr><td>Course and Curriculum Committee, University of Connecticut, AY 14-15<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Conference Organizing Committees and Track Chair Positions TPC Subcommittee Chair for \u201cSYS8: Hardware Security: Attack and Defense\u201d, Design Automation Conference (DAC), 2025 Co-Program Chair, International Conference on Security, Privacy, and Applied Cryptographic Engineering (SPACE), 2024 TPC Subcommittee Chair for &#8220;SEC2: Hardware Security: Attack and Defense&#8221;, Design Automation Conference (DAC), 2024 Co-Program Chair, Workshop on Attacks [&hellip;]<\/p>\n","protected":false},"author":1381,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-section-nav.php","meta":{"_acf_changed":false,"inline_featured_image":false,"featured_post":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-515","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/users\/1381"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/comments?post=515"}],"version-history":[{"count":4,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/515\/revisions"}],"predecessor-version":[{"id":3333,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/515\/revisions\/3333"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/media?parent=515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}