gohil-vasudev / ATTRITION

Supporting material for our RL-based Trojan insertion work at CCS 2022.

Home Page:https://dl.acm.org/doi/10.1145/3548606.3560690

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ATTRITION

Supporting material for our RL-based Trojan insertion work published at CCS 2022.

The original (i.e., Trojan-free) files are in the "original_files" directory. The HT-infested designs are uploaded in a tar format (except for AES) in the "HT_infested_designs" directory. You can use them to evaluate the quality of any given set of test patterns. The other files/directories are auxilliary and are not required to evaluate your test patterns.

CITATION

If you use our tool and/or Trojans in your research, please cite our paper.

@inproceedings{gohil2022attrition,
  title={{ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning}},
  author={Gohil, Vasudev and Guo, Hao and Patnaik, Satwik and Rajendran, Jeyavijayan},
  booktitle={Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security},
  pages={1275--1289},
  year={2022}
}

About

Supporting material for our RL-based Trojan insertion work at CCS 2022.

https://dl.acm.org/doi/10.1145/3548606.3560690

License:BSD 3-Clause "New" or "Revised" License


Languages

Language:Verilog 100.0%Language:SourcePawn 0.0%Language:Shell 0.0%