Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Jamieson, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15184  [pdf, other

    cs.CR cs.AR cs.LG

    TrojanForge: Adversarial Hardware Trojan Examples with Reinforcement Learning

    Authors: Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: The Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently been key in advancing HT research. Various novel techniques, such as Reinforcement Learning (RL) and Graph Neural Networks (GNNs), have shown HT insertion and detection cap… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    ACM Class: B.8.1

  2. arXiv:2402.17918  [pdf, other

    cs.CR cs.AR cs.LG

    The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection

    Authors: Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson

    Abstract: This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem as "The Seeker's Dilemma" (an extension of Hide&Seek on a graph), where a detecting agent is unaware of whether circuits are infected by HTs or not.… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    ACM Class: B.8.1

  3. arXiv:2311.06261  [pdf, other

    cs.CY cs.AI

    With ChatGPT, do we have to rewrite our learning objectives -- CASE study in Cybersecurity

    Authors: Peter Jamieson, Suman Bhunia, Dhananjai M. Rao

    Abstract: With the emergence of Artificial Intelligent chatbot tools such as ChatGPT and code writing AI tools such as GitHub Copilot, educators need to question what and how we should teach our courses and curricula in the future. In reality, automated tools may result in certain academic fields being deeply reduced in the number of employable people. In this work, we make a case study of cybersecurity und… ▽ More

    Submitted 26 September, 2023; originally announced November 2023.

  4. Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection

    Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

    Abstract: Current Hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., i) they are heavily biased by the designers' mindset when created, and ii) they are created through a one-dimensional lens, mainly the signal activity of nets. We introduce the first automated Reinforcement Le… ▽ More

    Submitted 20 March, 2024; v1 submitted 16 May, 2023; originally announced May 2023.

    Comments: This paper appears in the Journal of Supercomputing: https://doi.org/10.1007/s11227-024-05963-8

    ACM Class: B.8.1

  5. arXiv:2304.13232  [pdf, other

    cs.AR cs.CR cs.LG

    Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach

    Authors: Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Hardware Trojans (HTs) are undesired design or manufacturing modifications that can severely alter the security and functionality of digital integrated circuits. HTs can be inserted according to various design criteria, e.g., nets switching activity, observability, controllability, etc. However, to our knowledge, most HT detection methods are only based on a single criterion, i.e., nets switching… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    ACM Class: B.8.1

  6. arXiv:2209.00711  [pdf, other

    cs.AI cs.HC

    A Technique to Create Weaker Abstract Board Game Agents via Reinforcement Learning

    Authors: Peter Jamieson, Indrima Upadhyay

    Abstract: Board games, with the exception of solo games, need at least one other player to play. Because of this, we created Artificial Intelligent (AI) agents to play against us when an opponent is missing. These AI agents are created in a number of ways, but one challenge with these agents is that an agent can have superior ability compared to us. In this work, we describe how to create weaker AI agents t… ▽ More

    Submitted 1 September, 2022; originally announced September 2022.

    Comments: 15 pages, 6 figures

    ACM Class: I.2.m

  7. arXiv:2204.04350  [pdf, other

    cs.LG cs.AR cs.CR

    Hardware Trojan Insertion Using Reinforcement Learning

    Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

    Abstract: This paper utilizes Reinforcement Learning (RL) as a means to automate the Hardware Trojan (HT) insertion process to eliminate the inherent human biases that limit the development of robust HT detection methods. An RL agent explores the design space and finds circuit locations that are best for keeping inserted HTs hidden. To achieve this, a digital circuit is converted to an environment in which… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: This paper was accepted for publication in GLSVLSI'22

    ACM Class: B.8.1