Games, Dollars, Splits: A Game-Theoretic Analysis of Split Manufacturing

被引:0
|
作者
Gohil V. [1 ]
Tressler M. [1 ]
Sipple K. [1 ]
Patnaik S. [1 ]
Rajendran J. [1 ]
机构
[1] Department of Electrical and Computer Engineering, Texas AM University, College Station, TX
基金
美国国家科学基金会;
关键词
game theory; Hardware security; IP protection; routing perturbation; split manufacturing;
D O I
10.1109/TIFS.2021.3122827
中图分类号
学科分类号
摘要
Split manufacturing has been proposed as a defense to prevent threats like intellectual property (IP) piracy and illegal overproduction of integrated circuits (ICs). Over the last few years, researchers have developed a plethora of attack and defense techniques, creating a cat-and-mouse game between defending designers and attacking foundries. In this paper, we take an orthogonal approach to this ongoing research in split manufacturing; rather than developing an attack or a defense technique, we propose a means to analyze different attack and defense techniques. To that end, we develop a game-theoretic framework that helps researchers evaluate their new and existing attack and defense techniques. We model two attack scenarios using two different types of games and obtain the optimal defense strategies. We perform extensive simulations with our proposed framework, using nine different attacks and a class of placement and routing-based defense techniques on various benchmarks to gain deeper insights into split manufacturing. For instance, our framework indicates that the optimal defense techniques in the two attack scenarios are the same. Moreover, larger benchmarks are secure by naïve split manufacturing and do not require any additional defense technique under our cost model and considered attacks. We also uncover a counter-intuitive finding - an attacker using the network-flow attack should not use all the hints; instead, she should use only a subset. © 2005-2012 IEEE.
引用
收藏
页码:5077 / 5092
页数:15
相关论文
共 50 条
  • [31] Channel coordination and transaction cost: A game-theoretic analysis
    Chen, MS
    Chang, HJ
    Huang, CW
    Liao, CN
    INDUSTRIAL MARKETING MANAGEMENT, 2006, 35 (02) : 178 - 190
  • [32] Game-theoretic modeling and analysis of cyberbullying spreading on OSNs
    Chu, Qi
    Qin, Yang
    Yang, Lu-Xing
    Yang, Xiaofan
    INFORMATION SCIENCES, 2024, 659
  • [33] Quantitative Analysis of Systems Using Game-Theoretic Learning
    Seshia, Sanjit A.
    Rakhlin, Alexander
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2012, 11
  • [34] Game-theoretic Modeling and Stability Analysis of Blockchain Channels
    Zhang, PeiYun
    Li, ChenXi
    Zhou, MengChu
    2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 836 - 840
  • [35] Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy
    Shokri, Reza
    Theodorakopoulos, George
    Troncoso, Carmela
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2017, 19 (04)
  • [36] Picking vs. Guessing Secrets: A Game-Theoretic Analysis
    Khouzani, M. H. R.
    Mardziel, Piotr
    Cid, Carlos
    Srivatsa, Mudhakar
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 243 - 257
  • [37] Game-Theoretic Decision Making for Intelligent Power Consumption Analysis
    Bhatia, Munish
    Ahanger, Tariq Ahamed
    Alqahtani, Abdullah
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7537 - 7544
  • [38] Representations and solutions for game-theoretic problems
    Koller, D
    Pfeffer, A
    ARTIFICIAL INTELLIGENCE, 1997, 94 (1-2) : 167 - 215
  • [39] Probabilistic Game-Theoretic Traffic Routing
    Benenati, Emilio
    Grammatico, Sergio
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (10) : 13080 - 13090
  • [40] A game-theoretic approach to decision in FDI
    Darkhovski, B
    Staroswiecki, M
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2003, 48 (05) : 853 - 858