An Efficient ML-based Hardware Trojan Localization Framework for RTL Security Analysis
Abstract
References
Index Terms
- An Efficient ML-based Hardware Trojan Localization Framework for RTL Security Analysis
Recommendations
TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning
MLCAD '24: Proceedings of the 2024 ACM/IEEE International Symposium on Machine Learning for CADThe Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently played a key role in ...
Hardware Trojan Detection Using Machine Learning: A Tutorial
With the growth and globalization of IC design and development, there is an increase in the number of Designers and Design houses. As setting up a fabrication facility may easily cost upwards of $20 billion, costs for advanced nodes may be even greater. ...
Hardware Trojan Detection and High-Precision Localization in NoC-Based MPSoC Using Machine Learning
ASPDAC '23: Proceedings of the 28th Asia and South Pacific Design Automation ConferenceNetworks-on-Chips (NoC) based Multi-Processor System-on-Chip (MPSoC) are increasingly employed in industrial and consumer electronics. Outsourcing third-party IPs (3PIPs) and tools in NoC-based MPSoC is a prevalent development way in most fabless ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Hussam Amrouch,
- Jiang Hu,
- Program Chairs:
- Siddharth Garg,
- Yibo Lin
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 74Total Downloads
- Downloads (Last 12 months)74
- Downloads (Last 6 weeks)23
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in