Games, Dollars, Splits: A Game-Theoretic Analysis of Split Manufacturing

被引:0
|
作者
Gohil V. [1 ]
Tressler M. [1 ]
Sipple K. [1 ]
Patnaik S. [1 ]
Rajendran J. [1 ]
机构
[1] Department of Electrical and Computer Engineering, Texas AM University, College Station, TX
基金
美国国家科学基金会;
关键词
game theory; Hardware security; IP protection; routing perturbation; split manufacturing;
D O I
10.1109/TIFS.2021.3122827
中图分类号
学科分类号
摘要
Split manufacturing has been proposed as a defense to prevent threats like intellectual property (IP) piracy and illegal overproduction of integrated circuits (ICs). Over the last few years, researchers have developed a plethora of attack and defense techniques, creating a cat-and-mouse game between defending designers and attacking foundries. In this paper, we take an orthogonal approach to this ongoing research in split manufacturing; rather than developing an attack or a defense technique, we propose a means to analyze different attack and defense techniques. To that end, we develop a game-theoretic framework that helps researchers evaluate their new and existing attack and defense techniques. We model two attack scenarios using two different types of games and obtain the optimal defense strategies. We perform extensive simulations with our proposed framework, using nine different attacks and a class of placement and routing-based defense techniques on various benchmarks to gain deeper insights into split manufacturing. For instance, our framework indicates that the optimal defense techniques in the two attack scenarios are the same. Moreover, larger benchmarks are secure by naïve split manufacturing and do not require any additional defense technique under our cost model and considered attacks. We also uncover a counter-intuitive finding - an attacker using the network-flow attack should not use all the hints; instead, she should use only a subset. © 2005-2012 IEEE.
引用
收藏
页码:5077 / 5092
页数:15
相关论文
共 50 条
  • [21] Game-Theoretic Rough Sets
    Herbert, Joseph P.
    Yao, JingTao
    FUNDAMENTA INFORMATICAE, 2011, 108 (3-4) : 267 - 286
  • [22] Grammars for Games: A Gradient - Based, Game-Theoretic Framework for Optimization in Deep Learning
    Balduzzi, David
    FRONTIERS IN ROBOTICS AND AI, 2016, 2
  • [23] Game-theoretic analysis of international development assistance regimes
    Degterev, D. A.
    MGIMO REVIEW OF INTERNATIONAL RELATIONS, 2011, (05): : 59 - 66
  • [24] Renewable Portfolio Standard Policy: A Game-theoretic Analysis
    Nasiri, Fuzhan
    Zaccour, Georges
    INFOR, 2010, 48 (04) : 251 - 260
  • [25] Game-theoretic analysis of development practices: Challenges and opportunities
    Gavidia-Calderon, Carlos
    Sarro, Federica
    Harman, Mark
    Barr, Earl T.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 159 (159)
  • [26] A Game-Theoretic Analysis of Demand Response in Electricity Markets
    Nekouei, Ehsan
    Alpcan, Tansu
    Chattopadhyay, Deb
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [27] Foreign investigations in the field of game-theoretic analysis of innovations
    I. N. Dubina
    Automation and Remote Control, 2011, 72 : 1753 - 1765
  • [28] A GAME-THEORETIC ANALYSIS OF TCP VEGAS AND FAST TCP
    Liu, Zhenhua
    Zhang, Xiaoping
    Wang, Dong
    Zhao, Youjian
    Guan, Hongtao
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 548 - 552
  • [29] Desuetudo: A Game-Theoretic Approach
    Faroldi, Federico L. G.
    ARCHIV FUR RECHTS- UND SOZIALPHILOSOPHIE, 2021, 107 (02): : 289 - 299
  • [30] What's in a game: game-theoretic analysis for third party planning
    Strasser, Benjamin A.
    OPEN ARCHITECTURE/OPEN BUSINESS MODEL NET-CENTRIC SYSTEMS AND DEFENSE TRANSFORMATION 2021, 2021, 11753