Search Results for author: Satwik Patnaik

Found 6 papers, 0 papers with code

AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning

no code implementations21 Feb 2024 Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran

We target five GNN-based techniques for four crucial classes of problems in hardware security: IP piracy, detecting/localizing HTs, reverse engineering, and hardware obfuscation.

reinforcement-learning Reinforcement Learning (RL)

Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

no code implementations29 Aug 2022 Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran

In this brief, we outline the development of RL agents in detecting hardware Trojans, one of the most challenging hardware security problems.

reinforcement-learning Reinforcement Learning (RL)

ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning

no code implementations26 Aug 2022 Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan, Rajendran

Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can bypass the security of critical infrastructures.

reinforcement-learning Reinforcement Learning (RL)

Attacking Split Manufacturing from a Deep Learning Perspective

no code implementations8 Jul 2020 Haocheng Li, Satwik Patnaik, Abhrajit Sengupta, Hao-Yu Yang, Johann Knechtel, Bei Yu, Evangeline F. Y. Young, Ozgur Sinanoglu

The notion of integrated circuit split manufacturing which delegates the front-end-of-line (FEOL) and back-end-of-line (BEOL) parts to different foundries, is to prevent overproduction, piracy of the intellectual property (IP), or targeted insertion of hardware Trojans by adversaries in the FEOL facility.

Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging

no code implementations14 Nov 2017 Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu

Our scheme is based on obfuscating the interconnects (BEOL); it can be readily applied to any design without modifications in the device layer (FEOL).

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.