TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning
Abstract
References
Index Terms
- TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning
Recommendations
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityStealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can bypass the security of critical infrastructures. Although researchers have proposed many techniques to detect HTs, several critical limitations exist, including: (...
Hardware Trojan Insertion Using Reinforcement Learning
GLSVLSI '22: Proceedings of the Great Lakes Symposium on VLSI 2022This paper utilizes Reinforcement Learning (RL) as a means to automate the Hardware Trojan (HT) insertion process to eliminate the inherent human biases that limit the development of robust HT detection methods. An RL agent explores the design space and ...
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection
AbstractCurrent hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., (i) they are heavily biased by the designers’ mindset ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Hussam Amrouch,
- Jiang Hu,
- Program Chairs:
- Siddharth Garg,
- Yibo Lin
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 174Total Downloads
- Downloads (Last 12 months)174
- Downloads (Last 6 weeks)42
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in