May 17, 2023, 1:10 a.m. | Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

cs.CR updates on arXiv.org arxiv.org

Current Hardware Trojan (HT) detection techniques are mostly developed based
on a limited set of HT benchmarks. Existing HT benchmarks circuits are
generated with multiple shortcomings, i.e., i) they are heavily biased by the
designers' mindset when they are created, and ii) they are created through a
one-dimensional lens, mainly the signal activity of nets. To address these
shortcomings, we introduce the first automated reinforcement learning (RL) HT
insertion and detection framework. In the insertion phase, an RL agent explores …

benchmarks current designers detection framework generated hardware mindset techniques trojan

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Associate Engineer (Security Operations Centre)

@ People Profilers | Singapore, Singapore, Singapore

DevSecOps Engineer

@ Australian Payments Plus | Sydney, New South Wales, Australia

Senior Cybersecurity Specialist

@ SmartRecruiters Inc | Poland, Poland