{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:27:10Z","timestamp":1756463230696,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1908131"],"award-info":[{"award-number":["1908131"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.1145\/3400302.3415710","type":"proceedings-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T01:19:19Z","timestamp":1608254359000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Test generation using reinforcement learning for delay-based side-channel analysis"],"prefix":"10.1145","author":[{"given":"Zhixin","family":"Pan","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Jennifer","family":"Sheldon","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Prabhat","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. ISCAS89 Sequential Benchmark Circuits. https:\/\/filebox.ece.vt.edu\/~mhsiao\/iscas89.html.  [n. d.]. ISCAS89 Sequential Benchmark Circuits. https:\/\/filebox.ece.vt.edu\/~mhsiao\/iscas89.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624854"},{"key":"e_1_3_2_1_3_1","volume-title":"Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors. In Workshop on Power-Aware Computing and Systems.","author":"Balaji Bharathan","year":"2012","unstructured":"Bharathan Balaji , 2012 . Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors. In Workshop on Power-Aware Computing and Systems. Bharathan Balaji, et al. 2012. Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors. In Workshop on Power-Aware Computing and Systems."},{"key":"e_1_3_2_1_4_1","volume-title":"MERO: A Statistical Approach for Hardware Trojan Detection. In Cryptographic Hardware and Embedded Systems. 396--410.","author":"Chakraborty Rajat Subhra","year":"2009","unstructured":"Rajat Subhra Chakraborty 2009 . MERO: A Statistical Approach for Hardware Trojan Detection. In Cryptographic Hardware and Embedded Systems. 396--410. Rajat Subhra Chakraborty et al. 2009. MERO: A Statistical Approach for Hardware Trojan Detection. In Cryptographic Hardware and Embedded Systems. 396--410."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2041846"},{"key":"e_1_3_2_1_6_1","first-page":"502","article-title":"Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection. IEICE","volume":"2","author":"Choo","year":"2020","unstructured":"H, Choo et al. 2020 . Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A. 2 (2020), 502 -- 509 . H, Choo et al. 2020. Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A. 2 (2020), 502--509.","journal-title":"Trans. Fundam. Electron. Commun. Comput. Sci. 103-A."},{"key":"e_1_3_2_1_7_1","volume-title":"Hardware Trojan Detection Using ATPG and Model Checking. In International Conference on VLSI Design. 91--96","author":"Cruz Jonathan","year":"2018","unstructured":"Jonathan Cruz , Farimah Farahmandi , Alif Ahmed , and Prabhat Mishra . 2018 . Hardware Trojan Detection Using ATPG and Model Checking. In International Conference on VLSI Design. 91--96 . Jonathan Cruz, Farimah Farahmandi, Alif Ahmed, and Prabhat Mishra. 2018. Hardware Trojan Detection Using ATPG and Model Checking. In International Conference on VLSI Design. 91--96."},{"key":"e_1_3_2_1_8_1","volume-title":"Automation & Test in Europe Conference (DATE). 1598--1603","author":"Cruz Jonathan","year":"2018","unstructured":"Jonathan Cruz , Yuanwen Huang , Prabhat Mishra , and Swarup Bhunia . 2018 . An automated configurable Trojan insertion framework for dynamic trust benchmarks. In Design , Automation & Test in Europe Conference (DATE). 1598--1603 . Jonathan Cruz, Yuanwen Huang, Prabhat Mishra, and Swarup Bhunia. 2018. An automated configurable Trojan insertion framework for dynamic trust benchmarks. In Design, Automation & Test in Europe Conference (DATE). 1598--1603."},{"key":"e_1_3_2_1_9_1","volume-title":"14th International Conference, TACAS. 337--340","author":"de Moura Leonardo Mendon\u00e7a","year":"2008","unstructured":"Leonardo Mendon\u00e7a de Moura and Nikolaj Bj\u00f8rner . 2008 . Z3: An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems , 14th International Conference, TACAS. 337--340 . Leonardo Mendon\u00e7a de Moura and Nikolaj Bj\u00f8rner. 2008. Z3: An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS. 337--340."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858388"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2868362"},{"key":"e_1_3_2_1_13_1","volume-title":"Placement Optimization with Deep Reinforcement Learning. CoRR abs\/2003.08445","author":"Goldie Anna","year":"2020","unstructured":"Anna Goldie and Azalia Mirhoseini . 2020. Placement Optimization with Deep Reinforcement Learning. CoRR abs\/2003.08445 ( 2020 ). Anna Goldie and Azalia Mirhoseini. 2020. Placement Optimization with Deep Reinforcement Learning. CoRR abs\/2003.08445 (2020)."},{"volume-title":"Proceedings of the 2017 ACM. 1095--1108","author":"Han Yi","key":"e_1_3_2_1_14_1","unstructured":"Yi Han , Sriharsha Etigowni , Hua Liu , Saman A. Zonouz , and Athina P. Petropulu . 2017. Watch Me, but Don't Touch Mel Contactless Control Flow Monitoring via Electromagnetic Emanations . In Proceedings of the 2017 ACM. 1095--1108 . Yi Han, Sriharsha Etigowni, Hua Liu, Saman A. Zonouz, and Athina P. Petropulu. 2017. Watch Me, but Don't Touch Mel Contactless Control Flow Monitoring via Electromagnetic Emanations. In Proceedings of the 2017 ACM. 1095--1108."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978396"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833059"},{"key":"e_1_3_2_1_17_1","volume-title":"Reinforcement-Learning-Based Variational Quantum Circuits Optimization for Combinatorial Problems. CoRR abs\/1911.04574","author":"Khairy Sami","year":"2019","unstructured":"Sami Khairy , Ruslan Shaydulin , Lukasz Cincio , Yuri Alexeev , and Prasanna Balaprakash . 2019. Reinforcement-Learning-Based Variational Quantum Circuits Optimization for Combinatorial Problems. CoRR abs\/1911.04574 ( 2019 ). Sami Khairy, Ruslan Shaydulin, Lukasz Cincio, Yuri Alexeev, and Prasanna Balaprakash. 2019. Reinforcement-Learning-Based Variational Quantum Circuits Optimization for Combinatorial Problems. CoRR abs\/1911.04574 (2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0025-y"},{"key":"e_1_3_2_1_19_1","volume-title":"Automation & Test in Europe Conference (DATE). 408--413","author":"Lyu Yangdi","year":"2019","unstructured":"Yangdi Lyu and Prabhat Mishra . 2019 . Efficient Test Generation for Trojan Detection using Side Channel Analysis. In Design , Automation & Test in Europe Conference (DATE). 408--413 . Yangdi Lyu and Prabhat Mishra. 2019. Efficient Test Generation for Trojan Detection using Side Channel Analysis. In Design, Automation & Test in Europe Conference (DATE). 408--413."},{"key":"e_1_3_2_1_20_1","volume-title":"Automation & Test in Europe Conference (DATE).","author":"Lyu Yangdi","year":"2020","unstructured":"Yangdi Lyu and Prabhat Mishra . 2020 . Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis. In Design , Automation & Test in Europe Conference (DATE). Yangdi Lyu and Prabhat Mishra. 2020. Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis. In Design, Automation & Test in Europe Conference (DATE)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1628506"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224966"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6607015"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"e_1_3_2_1_26_1","article-title":"Explore Deep Neural Network and Reinforcement Learning to Large-scale Tasks Processing in Big","volume":"33","author":"Chunyi Wu","year":"2019","unstructured":"Chunyi Wu et al. 2019 . Explore Deep Neural Network and Reinforcement Learning to Large-scale Tasks Processing in Big Data. Int. J. Pattern Recognit Artif. Intell. 33 , 13 (2019), 1951010:1--1951010:29. Chunyi Wu et al. 2019. Explore Deep Neural Network and Reinforcement Learning to Large-scale Tasks Processing in Big Data. Int. J. Pattern Recognit Artif. Intell. 33, 13 (2019), 1951010:1--1951010:29.","journal-title":"Data. Int. J. Pattern Recognit Artif. Intell."}],"event":{"name":"ICCAD '20: IEEE\/ACM International Conference on Computer-Aided Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE CS"],"location":"Virtual Event USA","acronym":"ICCAD '20"},"container-title":["Proceedings of the 39th International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415710","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:52Z","timestamp":1750197772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":26,"alternative-id":["10.1145\/3400302.3415710","10.1145\/3400302"],"URL":"https:\/\/doi.org\/10.1145\/3400302.3415710","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}