This repository contains:
- Test vectors generated by reinforcement learning agents to detect hardware Trojans in ISCAS-85 circuits. The details of the inserted Trojans and the three detection techniques can be found in our papers titled: Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection and Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach.
- HT benchmarks (HT_benchmak direcrtory) generated in the paper titled Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
Please cite our papers if you use the hardware Trojan instances ot test vectors in your research studies:
@inproceedings{sarihi2022hardware,
title={Hardware trojan insertion using reinforcement learning},
author={Sarihi, Amin and Patooghy, Ahmad and Jamieson, Peter and Badawy, Abdel-Hameed A},
booktitle={Proceedings of the Great Lakes Symposium on VLSI 2022},
pages={139--142},
year={2022}
}
@article{sarihi2023multi,
title={Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach},
author={Sarihi, Amin and Jamieson, Peter and Patooghy, Ahmad and Badawy, Abdel-Hameed A},
journal={arXiv preprint arXiv:2304.13232},
year={2023}
}
@article{sarihi2023trojan,
title={Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection},
author={Sarihi, Amin and Patooghy, Ahmad and Jamieson, Peter and Badawy, Abdel-Hameed A},
journal={arXiv preprint arXiv:2305.09592},
year={2023}
}