AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection

نویسندگان

چکیده

This paper proposes AdaTest, a novel adaptive test pattern generation framework for efficient and reliable Hardware Trojan (HT) detection. HT is backdoor attack that tampers with the design of victim integrated circuits (ICs) . AdaTest improves existing detection techniques in terms scalability accuracy detecting smaller Trojans presence noise variations. To achieve high trigger coverage, leverages Reinforcement Learning (RL) to produce diverse set inputs. Particularly, we progressively generate vectors ‘reward’ values an iterative manner. In each iteration, evaluated adaptively expanded as needed. Furthermore, integrates sampling prioritize samples provide more information detection, thus reducing number while improving samples’ quality faster exploration. We develop Software/Hardware co-design principle optimized on-chip architecture solution. AdaTest’s minimizes hardware overhead two ways: (i) Deploying circuit emulation on programmable accelerate reward evaluation input; (ii) Pipelining computation stage by automatically constructing auxiliary input generation, evaluation, sampling. evaluate performance various benchmarks compare it prior works use logic testing Experimental results show engenders up orders speedup size reduction compared achieving same level or higher rate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Trojan Identification and Detection

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...

متن کامل

On-Chip Sensor Circle Distribution Technique for Real-Time Hardware Trojan Detection

Real-time hardware Trojan detection by monitoring voltage and current consumption using on-chip sensors is shown to be a feasible way to secure critical integrated circuit (IC) applications. This paper investigates the distribution and optimization of on-chip sensors for real-time hardware Trojan detection and localization based on the characteristics of on-chip power distribution network. On-c...

متن کامل

A Hardware Trojan Detection Framework

In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...

متن کامل

An Adaptive Learning Game for Autistic Children using Reinforcement Learning and Fuzzy Logic

This paper, presents an adapted serious game for rating social ability in children with autism spectrum disorder (ASD). The required measurements are obtained by challenges of the proposed serious game. The proposed serious game uses reinforcement learning concepts for being adaptive. It is based on fuzzy logic to evaluate the social ability level of the children with ASD. The game adapts itsel...

متن کامل

An Adaptive Sampling Approach for Bayesian Reinforcement Learning

In this review, we summarized Monte Carlo Bayesian Reinforcement learning, and explored the possible improvements by proposing better sampling strategy by adaptive sampling. Monte Carlo Bayesian Reinforcement learning is a simple and general approach which samples a finite set of hypotheses from the model parameter space. MC-BRL generates a discrete POMDP that approximates the underlying BRL pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions in Embedded Computing Systems

سال: 2023

ISSN: ['1539-9087', '1558-3465']

DOI: https://doi.org/10.1145/3544015