May 17, 2023, 1:10 a.m. | Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

cs.CR updates on arXiv.org arxiv.org

Current Hardware Trojan (HT) detection techniques are mostly developed based
on a limited set of HT benchmarks. Existing HT benchmarks circuits are
generated with multiple shortcomings, i.e., i) they are heavily biased by the
designers' mindset when they are created, and ii) they are created through a
one-dimensional lens, mainly the signal activity of nets. To address these
shortcomings, we introduce the first automated reinforcement learning (RL) HT
insertion and detection framework. In the insertion phase, an RL agent explores …

benchmarks current designers detection framework generated hardware mindset techniques trojan

Senior Security Engineer - Detection and Response

@ Fastly, Inc. | US (Remote)

Application Security Engineer

@ Solidigm | Zapopan, Mexico

Defensive Cyber Operations Engineer-Mid

@ ISYS Technologies | Aurora, CO, United States

Manager, Information Security GRC

@ OneTrust | Atlanta, Georgia

Senior Information Security Analyst | IAM

@ EBANX | Curitiba or São Paulo

Senior Information Security Engineer, Cloud Vulnerability Research

@ Google | New York City, USA; New York, USA