no code implementations • 29 Aug 2022 • Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran
In this brief, we outline the development of RL agents in detecting hardware Trojans, one of the most challenging hardware security problems.
no code implementations • 26 Aug 2022 • Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan, Rajendran
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can bypass the security of critical infrastructures.
no code implementations • 26 Aug 2022 • Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, Jeyavijayan, Rajendran
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat.