Deterrent: detecting trojans using reinforcement learning

V Gohil, S Patnaik, H Guo, D Kalathil… - Proceedings of the 59th …, 2022 - dl.acm.org
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat. Since HTs
are activated under rare trigger conditions, detecting them using random logic simulations is …

Mabfuzz: Multi-armed bandit algorithms for fuzzing processors

V Gohil, R Kande, C Chen, AR Sadeghi… - … , Automation & Test …, 2024 - ieeexplore.ieee.org
As the complexities of processors keep increasing, the task of effectively verifying their
integrity and security becomes ever more daunting. The intricate web of instructions …

An Automated Fault Attack Framework for Block Ciphers Through Property Mining and Verification

X Wang, W Hu, S Tang, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fault attacks are effective side-channel attack methods for cryptanalysis. However, existing
fault attack methods involve manual derivation of complex fault models or computation …

LLMs for Hardware Security: Boon or Bane?

R Kande, V Gohil, M DeLorenzo… - 2024 IEEE 42nd …, 2024 - ieeexplore.ieee.org
Large language models (LLMs) have emerged as transformative tools within the hardware
design and verification lifecycle, offering numerous capabilities in accelerating design …