Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

被引:2
|
作者
Patnaik, Satwik [1 ]
Gohil, Vasudev [1 ]
Guo, Hao [1 ]
Rajendran, Jeyavijayan [1 ]
机构
[1] Texas A&M Univ, Elect & Comp Engn, College Stn, TX 77843 USA
基金
美国国家科学基金会;
关键词
Reinforcement Learning; Hardware Security;
D O I
10.1109/ISOCC56007.2022.10031569
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Reinforcement learning (RL) is a machine learning paradigm where an autonomous agent learns to make an optimal sequence of decisions by interacting with the underlying environment. The promise demonstrated by RL-guided workflows in unraveling electronic design automation problems has encouraged hardware security researchers to utilize autonomous RL agents in solving domain-specific problems. From the perspective of hardware security, such autonomous agents are appealing as they can generate optimal actions in an unknown adversarial environment. On the other hand, the continued globalization of the integrated circuit supply chain has forced chip fabrication to off-shore, untrustworthy entities, leading to increased concerns about the security of the hardware. Furthermore, the unknown adversarial environment and increasing design complexity make it challenging for defenders to detect subtle modifications made by attackers (a.k.a. hardware Trojans). In this brief, we outline the development of RL agents in detecting hardware Trojans, one of the most challenging hardware security problems. Additionally, we outline potential opportunities and enlist the challenges of applying RL to solve hardware security problems.
引用
收藏
页码:217 / 218
页数:2
相关论文
共 50 条
  • [41] Human-in-the-Loop Reinforcement Learning: A Survey and Position on Requirements, Challenges, and Opportunities
    Retzlaff C.O.
    Das S.
    Wayllace C.
    Mousavi P.
    Afshari M.
    Yang T.
    Saranti A.
    Angerschmid A.
    Taylor M.E.
    Holzinger A.
    Journal of Artificial Intelligence Research, 2024, 79 : 359 - 415
  • [42] Supporting adaptive learning pathways through the use of learning analytics: developments, challenges and future opportunities
    Mavroudi, Anna
    Giannakos, Michail
    Krogstie, John
    INTERACTIVE LEARNING ENVIRONMENTS, 2018, 26 (02) : 206 - 220
  • [43] Hardware Trends: Challenges and Opportunities in Distributed Computing
    Harris, Tim
    BULLETIN OF THE EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE, 2015, (116): : 91 - 98
  • [44] Hardware trends: Challenges and opportunities in distributed computing
    Oracle Labs, Cambridge, United Kingdom
    Bull. Eur. Assoc. Theor. Comput. Sci., 116
  • [45] Materials challenges and opportunities for quantum computing hardware
    de Leon, Nathalie P.
    Itoh, Kohei M.
    Kim, Dohun
    Mehta, Karan K.
    Northup, Tracy E.
    Paik, Hanhee
    Palmer, B. S.
    Samarth, N.
    Sangtawesin, Sorawis
    Steuerman, D. W.
    SCIENCE, 2021, 372 (6539) : 253 - +
  • [46] Hardware Accelerators for Deep Reinforcement Learning
    Mishra, Vinod K.
    Basu, Kanad
    Arunachalam, Ayush
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [47] Tunneling Field Effect Transistors for Enhancing Energy Efficiency and Hardware Security of IoT Platforms: Challenges and Opportunities
    Aditya, Japa
    Nagateja, T.
    Vishvakarma, Santosh Kumar
    Yellappa, Palagani
    Choi, Jun Rim
    Vaddi, Ramesh
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [48] Federated Learning for Cloud and Edge Security: A Systematic Review of Challenges and AI Opportunities
    Albshaier, Latifa
    Almarri, Seetah
    Albuali, Abdullah
    ELECTRONICS, 2025, 14 (05):
  • [49] Open RAN security: Challenges and opportunities
    Liyanage, Madhusanka
    Braeken, An
    Shahabuddin, Shahriar
    Ranaweera, Pasika
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 214
  • [50] Security in Internet of Things: Opportunities and Challenges
    Sha, Kewei
    Wei, Wei
    Yang, Andrew T.
    Shi, Weisong
    2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 512 - 518