{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T20:31:56Z","timestamp":1775334716740,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1822848, 2039610"],"award-info":[{"award-number":["1822848, 2039610"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560690","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1275-1289","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning"],"prefix":"10.1145","author":[{"given":"Vasudev","family":"Gohil","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Hao","family":"Guo","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Satwik","family":"Patnaik","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Jeyavijayan","family":"Rajendran","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"e_1_3_2_1_2_1","volume-title":"DARPA Selects Teams to Increase Security of Semiconductor Supply Chain. https:\/\/www.darpa.mil\/news-events\/2020-05--27. [Online","author":"Public Affairs DARPA","year":"2022","unstructured":"DARPA Public Affairs . 2022. DARPA Selects Teams to Increase Security of Semiconductor Supply Chain. https:\/\/www.darpa.mil\/news-events\/2020-05--27. [Online ; last accessed 2- May - 2022 ]. DARPA Public Affairs. 2022. DARPA Selects Teams to Increase Security of Semiconductor Supply Chain. https:\/\/www.darpa.mil\/news-events\/2020-05--27. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"e_1_3_2_1_4_1","volume-title":"Active Hardware Metering for Intellectual Property Protection and Security. In 16th USENIX Security Symposium (USENIX Security 07)","volume":"20","author":"Alkabani Yousra","year":"2007","unstructured":"Yousra Alkabani and Farinaz Koushanfar . 2007 . Active Hardware Metering for Intellectual Property Protection and Security. In 16th USENIX Security Symposium (USENIX Security 07) , Vol. 20 . 1--20. Yousra Alkabani and Farinaz Koushanfar. 2007. Active Hardware Metering for Intellectual Property Protection and Security. In 16th USENIX Security Symposium (USENIX Security 07), Vol. 20. 1--20."},{"key":"e_1_3_2_1_5_1","volume-title":"2012 Workshop on Power-Aware Computing and Systems (HotPower 12)","author":"Balaji Bharathan","year":"2012","unstructured":"Bharathan Balaji , John McCullough , Rajesh K Gupta , and Yuvraj Agarwal . 2012 . Accurate characterization of the variability in power consumption in modern mobile processors . In 2012 Workshop on Power-Aware Computing and Systems (HotPower 12) . Bharathan Balaji, John McCullough, Rajesh K Gupta, and Yuvraj Agarwal. 2012. Accurate characterization of the variability in power consumption in modern mobile processors. In 2012 Workshop on Power-Aware Computing and Systems (HotPower 12)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0115-0"},{"key":"e_1_3_2_1_8_1","volume-title":"Stealthy Dopant-Level Hardware Trojans. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). Springer, 197--214","author":"Becker Georg T","year":"2013","unstructured":"Georg T Becker , Francesco Regazzoni , Christof Paar , and Wayne P Burleson . 2013 . Stealthy Dopant-Level Hardware Trojans. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). Springer, 197--214 . Georg T Becker, Francesco Regazzoni, Christof Paar, and Wayne P Burleson. 2013. Stealthy Dopant-Level Hardware Trojans. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). Springer, 197--214."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00026"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2360432"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2602554"},{"key":"e_1_3_2_1_13_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1598--1603","author":"Cruz Jonathan","year":"2018","unstructured":"Jonathan Cruz , Yuanwen Huang , Prabhat Mishra , and Swarup Bhunia . 2018 . An automated configurable Trojan insertion framework for dynamic trust benchmarks. In 2018 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1598--1603 . Jonathan Cruz, Yuanwen Huang, Prabhat Mishra, and Swarup Bhunia. 2018. An automated configurable Trojan insertion framework for dynamic trust benchmarks. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1598--1603."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/degate.readthedocs.io\/en\/latest\/. [Online","year":"2022","unstructured":"Degate. 2022. Degate. https:\/\/degate.readthedocs.io\/en\/latest\/. [Online ; last accessed 2- May - 2022 ]. Degate. 2022. Degate. https:\/\/degate.readthedocs.io\/en\/latest\/. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_12"},{"key":"e_1_3_2_1_16_1","volume-title":"Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. In The Network and Distributed System Security Symposium (NDSS). 1--14","author":"Massad Mohamed El","year":"2015","unstructured":"Mohamed El Massad , Siddharth Garg , and Mahesh V Tripunitara . 2015 . Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. In The Network and Distributed System Security Symposium (NDSS). 1--14 . Mohamed El Massad, Siddharth Garg, and Mahesh V Tripunitara. 2015. Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. In The Network and Distributed System Security Symposium (NDSS). 1--14."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006197105590566"},{"key":"e_1_3_2_1_18_1","volume-title":"SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Daimeng","unstructured":"Daimeng Wang et al. 2021 . SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. In 30th USENIX Security Symposium (USENIX Security 21) . 2741--2758. Daimeng Wang et al. 2021. SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. In 30th USENIX Security Symposium (USENIX Security 21). 2741--2758."},{"key":"e_1_3_2_1_19_1","unstructured":"Vasudev Gohil. 2022. ATTRITION. https:\/\/github.com\/gohil-vasudev\/ATTRITION.  Vasudev Gohil. 2022. ATTRITION. https:\/\/github.com\/gohil-vasudev\/ATTRITION."},{"key":"e_1_3_2_1_20_1","volume-title":"ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. https:\/\/arxiv.org\/abs\/2208.12897. arXiv preprint arXiv:2208.12897","author":"Gohil Vasudev","year":"2022","unstructured":"Vasudev Gohil , Hao Guo , Satwik Patnaik , and Jeyavijayan Rajendran . 2022 a. ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. https:\/\/arxiv.org\/abs\/2208.12897. arXiv preprint arXiv:2208.12897 (2022). Vasudev Gohil, Hao Guo, Satwik Patnaik, and Jeyavijayan Rajendran. 2022a. ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. https:\/\/arxiv.org\/abs\/2208.12897. arXiv preprint arXiv:2208.12897 (2022)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530518"},{"key":"e_1_3_2_1_22_1","volume-title":"Chip shortages will continue until","author":"Hachman Mark","year":"2023","unstructured":"Mark Hachman . 2022. Chip shortages will continue until 2023 . https:\/\/www.pcworld.idg.com.au\/article\/687673\/chip-shortages-will-continue-until-2023-superfoundry-tsmc-says\/. [Online; last accessed 2-May-2022]. Mark Hachman. 2022. Chip shortages will continue until 2023. https:\/\/www.pcworld.idg.com.au\/article\/687673\/chip-shortages-will-continue-until-2023-superfoundry-tsmc-says\/. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978396"},{"key":"e_1_3_2_1_26_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Imeson Frank","year":"2013","unstructured":"Frank Imeson , Ariq Emtenan , Siddharth Garg , and Mahesh Tripunitara . 2013 . Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation . In 22nd USENIX Security Symposium (USENIX Security 13) . 495--510. Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mahesh Tripunitara. 2013. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation. In 22nd USENIX Security Symposium (USENIX Security 13). 495--510."},{"key":"e_1_3_2_1_27_1","volume-title":"TSMC to Invest Up to $44 Billion in 2022 to Beef Up Chip Production. https:\/\/www.wsj.com\/articles\/tsmc-to-invest-up-to-44-billion-in-2022-to-beef-up-chip-production-11642076019. [Online","author":"Jie Yang","year":"2022","unstructured":"Yang Jie . 2022. TSMC to Invest Up to $44 Billion in 2022 to Beef Up Chip Production. https:\/\/www.wsj.com\/articles\/tsmc-to-invest-up-to-44-billion-in-2022-to-beef-up-chip-production-11642076019. [Online ; last accessed 2- May - 2022 ]. Yang Jie. 2022. TSMC to Invest Up to $44 Billion in 2022 to Beef Up Chip Production. https:\/\/www.wsj.com\/articles\/tsmc-to-invest-up-to-44-billion-in-2022-to-beef-up-chip-production-11642076019. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_28_1","volume-title":"2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). IEEE, 51--57","author":"Jin Yier","year":"2008","unstructured":"Yier Jin and Yiorgos Makris . 2008 . Hardware Trojan detection using path delay fingerprint . In 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). IEEE, 51--57 . Yier Jin and Yiorgos Makris. 2008. Hardware Trojan detection using path delay fingerprint. In 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). IEEE, 51--57."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3505170.3511046"},{"key":"e_1_3_2_1_30_1","unstructured":"Damjan Lampret Chen-Min Chen Marko Mlinar Johan Rydberg Matan Ziv-Av Chris Ziomkowski and etal 2022. OpenRISC 1000Architecture Manual. https:\/\/raw.githubusercontent.com\/openrisc\/doc\/master\/openrisc-arch-1.4-rev0.pdf. [Online; last accessed 2-May-2022].  Damjan Lampret Chen-Min Chen Marko Mlinar Johan Rydberg Matan Ziv-Av Chris Ziomkowski and et al. 2022. OpenRISC 1000Architecture Manual. https:\/\/raw.githubusercontent.com\/openrisc\/doc\/master\/openrisc-arch-1.4-rev0.pdf. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.12.013"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436820"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3019984"},{"key":"e_1_3_2_1_35_1","first-page":"701","article-title":"Trigger activation by repeated maximal clique sampling","volume":"16","author":"Mishra Prabhat Kumar","year":"2021","unstructured":"Prabhat Kumar Mishra and Yangdi Lyu . 2021 . Trigger activation by repeated maximal clique sampling . US Patent App. 16\/893 , 701 . Prabhat Kumar Mishra and Yangdi Lyu. 2021. Trigger activation by repeated maximal clique sampling. US Patent App. 16\/893,701.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_36_1","volume-title":"GPS code generator. https:\/\/github.com\/mit-ll\/CEP\/tree\/master\/hdl_cores\/gps. [Online","author":"Lincoln Laboratory MIT","year":"2022","unstructured":"MIT Lincoln Laboratory . 2022. GPS code generator. https:\/\/github.com\/mit-ll\/CEP\/tree\/master\/hdl_cores\/gps. [Online ; last accessed 2- May - 2022 ]. MIT Lincoln Laboratory. 2022. GPS code generator. https:\/\/github.com\/mit-ll\/CEP\/tree\/master\/hdl_cores\/gps. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"e_1_3_2_1_38_1","volume-title":"17th USENIX Security Symposium (USENIX Security 08)","volume":"28","author":"Nohl Karsten","year":"2008","unstructured":"Karsten Nohl , David Evans , Starbug Starbug , and Henryk Pl\u00f6tz . 2008 . Reverse-Engineering a Cryptographic RFID Tag . In 17th USENIX Security Symposium (USENIX Security 08) , Vol. 28 . Karsten Nohl, David Evans, Starbug Starbug, and Henryk Pl\u00f6tz. 2008. Reverse-Engineering a Cryptographic RFID Tag. In 17th USENIX Security Symposium (USENIX Security 08), Vol. 28."},{"key":"e_1_3_2_1_39_1","volume-title":"Securing Defense-Critical Supply Chains. An action plan developed in response to President Biden's Executive Order 14017 (","author":"Department of Defense (DoD). February 2022.","year":"2022","unstructured":"Department of Defense (DoD). February 2022. Securing Defense-Critical Supply Chains. An action plan developed in response to President Biden's Executive Order 14017 ( February 2022 ). [Online; last accessed 2-May-2022]. Department of Defense (DoD). February 2022. Securing Defense-Critical Supply Chains. An action plan developed in response to President Biden's Executive Order 14017 ( February 2022). [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_40_1","volume-title":"Educational 16-bit MIPS Processor. https:\/\/opencores.org\/projects\/mips_16. [Online","year":"2022","unstructured":"OpenCores. 2022. Educational 16-bit MIPS Processor. https:\/\/opencores.org\/projects\/mips_16. [Online ; last accessed 2- May - 2022 ]. OpenCores. 2022. Educational 16-bit MIPS Processor. https:\/\/opencores.org\/projects\/mips_16. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394885.3431595"},{"key":"e_1_3_2_1_42_1","volume-title":"Safeguards against Hidden Effects and Anomalous Trojans in Hardware (SHEATH). https:\/\/www.darpa.mil\/program\/safeguards-against-hidden-effects-and-anomalous-trojans-in-hardware. [Online","author":"Rebello Keith","year":"2022","unstructured":"Keith Rebello . 2022. Safeguards against Hidden Effects and Anomalous Trojans in Hardware (SHEATH). https:\/\/www.darpa.mil\/program\/safeguards-against-hidden-effects-and-anomalous-trojans-in-hardware. [Online ; last accessed 17- April - 2022 ]. Keith Rebello. 2022. Safeguards against Hidden Effects and Anomalous Trojans in Hardware (SHEATH). https:\/\/www.darpa.mil\/program\/safeguards-against-hidden-effects-and-anomalous-trojans-in-hardware. [Online; last accessed 17-April-2022]."},{"key":"e_1_3_2_1_43_1","first-page":"1283","article-title":"A Primer on Hardware Security","volume":"102","author":"Rostami Masoud","year":"2014","unstructured":"Masoud Rostami , Farinaz Koushanfar , and Ramesh Karri . 2014 . A Primer on Hardware Security : Models, Methods, and Metrics. Proc. IEEE , Vol. 102 , 8 (2014), 1283 -- 1295 . Masoud Rostami, Farinaz Koushanfar, and Ramesh Karri. 2014. A Primer on Hardware Security: Models, Methods, and Metrics. Proc. IEEE, Vol. 102, 8 (2014), 1283--1295.","journal-title":"Models, Methods, and Metrics. Proc. IEEE"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_29"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the Great Lakes Symposium on VLSI","author":"Sarihi Amin","year":"2022","unstructured":"Amin Sarihi , Ahmad Patooghy , Peter Jamieson , and Abdel-Hameed A Badawy . 2022 . Hardware Trojan Insertion Using Reinforcement Learning . In Proceedings of the Great Lakes Symposium on VLSI 2022. 139--142. Amin Sarihi, Ahmad Patooghy, Peter Jamieson, and Abdel-Hameed A Badawy. 2022. Hardware Trojan Insertion Using Reinforcement Learning. In Proceedings of the Great Lakes Symposium on VLSI 2022. 139--142."},{"key":"e_1_3_2_1_48_1","volume-title":"Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347","author":"Schulman John","year":"2017","unstructured":"John Schulman , Filip Wolski , Prafulla Dhariwal , Alec Radford , and Oleg Klimov . 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 ( 2017 ). John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_2"},{"key":"e_1_3_2_1_51_1","volume-title":"mor1kx - an OpenRISC processor IP core. https:\/\/github.com\/openrisc\/mor1kx. [Online","author":"Horne Stafford","year":"2022","unstructured":"Stafford Horne . 2022. mor1kx - an OpenRISC processor IP core. https:\/\/github.com\/openrisc\/mor1kx. [Online ; last accessed 2- May - 2022 ]. Stafford Horne. 2022. mor1kx - an OpenRISC processor IP core. https:\/\/github.com\/openrisc\/mor1kx. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.32"},{"key":"e_1_3_2_1_53_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","unstructured":"Richard S Sutton and Andrew G Barto . 2018. Reinforcement learning: An introduction . MIT press . Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_54_1","unstructured":"Synopsys. 2021. TestMAX ATPG and TestMAX Diagnosis User Guide. Version S-2021.06-SP1.  Synopsys. 2021. TestMAX ATPG and TestMAX Diagnosis User Guide. Version S-2021.06-SP1."},{"key":"e_1_3_2_1_55_1","volume-title":"https:\/\/www.techinsights.com\/analysis-solutions\/reverse-engineering. [Online","author":"Reverse","year":"2022","unstructured":"TechInsights. 2022. TechInsights, \" Reverse engineering\" . https:\/\/www.techinsights.com\/analysis-solutions\/reverse-engineering. [Online ; last accessed 2- May - 2022 ]. TechInsights. 2022. TechInsights, \"Reverse engineering\" . https:\/\/www.techinsights.com\/analysis-solutions\/reverse-engineering. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_56_1","volume-title":"https:\/\/github.com\/timothytrippel\/bomberman\/tree\/master\/third_party\/aes_129. [Online","author":"Trippel Timothy","year":"2022","unstructured":"Timothy Trippel . 2022. AES. https:\/\/github.com\/timothytrippel\/bomberman\/tree\/master\/third_party\/aes_129. [Online ; last accessed 2- May - 2022 ]. Timothy Trippel. 2022. AES. https:\/\/github.com\/timothytrippel\/bomberman\/tree\/master\/third_party\/aes_129. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00083"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00052"},{"key":"e_1_3_2_1_59_1","volume-title":"https:\/\/www.trust-hub.org\/. [Online","year":"2022","unstructured":"Trust-Hub. 2022. Trust-Hub. https:\/\/www.trust-hub.org\/. [Online ; last accessed 2- May - 2022 ]. Trust-Hub. 2022. Trust-Hub. https:\/\/www.trust-hub.org\/. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2147341"},{"key":"e_1_3_2_1_62_1","volume-title":"Reinforcement learning. Adaptation, learning, and optimization","author":"Wiering Marco A","year":"2012","unstructured":"Marco A Wiering and Martijn Van Otterlo . 2012. Reinforcement learning. Adaptation, learning, and optimization , Vol. 12 , 3 ( 2012 ), 729. Marco A Wiering and Martijn Van Otterlo. 2012. Reinforcement learning. Adaptation, learning, and optimization , Vol. 12, 3 (2012), 729."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.10"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00062"},{"key":"e_1_3_2_1_67_1","volume-title":"TSMC's Total 3nm Investment Will Equal At Least $ 23 Billion. https:\/\/wccftech.com\/tsmc-3nm-investment-23-billion-project-end\/. [Online","author":"Zafar Ramish","year":"2022","unstructured":"Ramish Zafar . 2022. TSMC's Total 3nm Investment Will Equal At Least $ 23 Billion. https:\/\/wccftech.com\/tsmc-3nm-investment-23-billion-project-end\/. [Online ; last accessed 2- May - 2022 ]. Ramish Zafar. 2022. TSMC's Total 3nm Investment Will Equal At Least $ 23 Billion. https:\/\/wccftech.com\/tsmc-3nm-investment-23-billion-project-end\/. [Online; last accessed 2-May-2022]."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660289"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2864733"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560690","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560690","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":70,"alternative-id":["10.1145\/3548606.3560690","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560690","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}