ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2208.12897
  4. Cited By
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using
  Reinforcement Learning

ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning

26 August 2022
Vasudev Gohil
Hao Guo
Satwik Patnaik
Jeyavijayan
Jeyavijayan Rajendran
ArXivPDFHTML

Papers citing "ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning"

12 / 12 papers shown
Title
LATENT: LLM-Augmented Trojan Insertion and Evaluation Framework for Analog Netlist Topologies
LATENT: LLM-Augmented Trojan Insertion and Evaluation Framework for Analog Netlist Topologies
Jayeeta Chaudhuri
Arjun Chaudhuri
Krishnendu Chakrabarty
21
0
0
09 May 2025
Hardware Design and Security Needs Attention: From Survey to Path Forward
Hardware Design and Security Needs Attention: From Survey to Path Forward
Sujan Ghimire
Muhtasim Alam Chowdhury
B. S. Latibari
M. Mamun
Jaeden Wolf Carpenter
Benjamin Tan
Hammond Pearce
Pratik Satam
Soheil Salehi
3DV
43
0
0
11 Apr 2025
TroLLoc: Logic Locking and Layout Hardening for IC Security Closure
  against Hardware Trojans
TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans
Fangzhou Wang
Qijing Wang
Lilas Alrahis
Bangqi Fu
Shui Jiang
Xiaopeng Zhang
Ozgur Sinanoglu
Tsung-Yi Ho
Evangeline F. Y. Young
J. Knechtel
21
2
0
09 May 2024
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient
  Hardware Trojans
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans
Athanassios Moschos
Fabian Monrose
A. Keromytis
19
0
0
15 Mar 2024
The Seeker's Dilemma: Realistic Formulation and Benchmarking for
  Hardware Trojan Detection
The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection
Amin Sarihi
Ahmad Patooghy
Abdel-Hameed A. Badawy
Peter Jamieson
19
1
0
27 Feb 2024
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement
  Learning
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
D. Kalathil
Jeyavijayan Rajendran
AAML
32
3
0
21 Feb 2024
Canaries and Whistles: Resilient Drone Communication Networks with (or
  without) Deep Reinforcement Learning
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning
Chris Hicks
V. Mavroudis
Myles Foley
Thomas Davies
Kate Highnam
Tim Watson
16
6
0
08 Dec 2023
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
Vasudev Gohil
Rahul Kande
Chen Chen
A. Sadeghi
Jeyavijayan Rajendran
22
8
0
24 Nov 2023
Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in
  Evolving Hardware Trojan Detection
Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection
Rahul Vishwakarma
Amin Rezaei
35
5
0
14 Oct 2023
Trojan Playground: A Reinforcement Learning Framework for Hardware
  Trojan Insertion and Detection
Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
Amin Sarihi
Ahmad Patooghy
Peter Jamieson
Abdel-Hameed A. Badawy
25
7
0
16 May 2023
Reinforcement Learning for Hardware Security: Opportunities,
  Developments, and Challenges
Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges
Satwik Patnaik
Vasudev Gohil
Hao Guo
Jeyavijayan
Jeyavijayan Rajendran
11
3
0
29 Aug 2022
DETERRENT: Detecting Trojans using Reinforcement Learning
DETERRENT: Detecting Trojans using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
Hao Guo
D. Kalathil
Jeyavijayan
Jeyavijayan Rajendran
23
18
0
26 Aug 2022
1