Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense

被引:1
作者
Yang, Daming [1 ]
Gao, Cheng [1 ]
Huang, Jiaoying [1 ]
机构
[1] Beihang Univ, Sch Reliabil & Syst Engn, Beijing 100191, Peoples R China
关键词
Integrated circuits; Games; Hardware; Security; Trojan horses; Manufacturing; Logic gates; Hardware trojan; chip security; dynamic game;
D O I
10.1109/ACCESS.2020.3040395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The offshore outsourcing introduces serious threats to semiconductor suppliers and integrated circuit(IC) users for the possibility of hardware trojans (HTs). To alleviate this threat, IC designers use the active defenses against HTs which are implanted by the malicious manufacturer. In this paper, a game-theoretic framework based on fuzzy theory is proposed to obtain the optimal strategy. It analyzes the interactions between the active defense designer and the malicious manufacturer. The attack and defense on IC is formulated as a noncooperative dynamic game. The active defense strategy is decided in IC design. And the overall payoff including design costs and losses avoided is optimized. Subsequently, the HT is implanted considering the implantation cost as well as the damage caused by it. To solve the problem of uncertain payoff caused by insufficient information, fuzzy variable is used to represent the influence of the defense coverage rate on the payoff. In order to verify the applicability of fuzzy variable in dynamic game framework, the existence of pure strategy Nash equilibrium in the game is proved. A solution algorithm for pure strategy Nash Equilibrium is proposed to obtain the optimal strategy of attacker and defender. Thanks to the case study of Field Programmable Gate Array (FPGA), the proposed framework is feasible for HT attack and defense game.
引用
收藏
页码:213094 / 213103
页数:10
相关论文
共 35 条
  • [1] [Anonymous], 2017, J. Hardw. Syst. Security, P85, DOI DOI 10.1007/S41635-017-0001-6
  • [2] Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique
    Ba, Papa-Sidy
    Dupuis, Sophie
    Palanichamy, Manikandan
    Marie-Lise-Flottes
    Di Natale, Giorgio
    Rouzeyre, Bruno
    [J]. 2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 254 - 259
  • [3] Innovations in IoT for a Safe, Secure, and Sustainable Future
    Bhunia, Swarup
    [J]. GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, 2019, : 7 - 7
  • [4] Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup
    Hsiao, Michael S.
    Banga, Mainak
    Narasimhan, Seetharam
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
  • [5] Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs
    Bi, Yu
    Gaillardon, Pierre-Emmanuel
    Hu, X. Sharon
    Niemier, Michael
    Yuan, Jiann-Shiun
    Jin, Yier
    [J]. 2014 IEEE 23RD ASIAN TEST SYMPOSIUM (ATS), 2014, : 342 - 347
  • [6] Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games
    Brooks, R. R.
    Pang, Jing-En
    Griffin, C.
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2008, 38 (06): : 1281 - 1294
  • [7] Chang M, 2017, INT C REHAB ROBOT, P369, DOI 10.1109/ICORR.2017.8009275
  • [8] Circuit Camouflage Integration for Hardware IP Protection
    Cocchi, Ronald P.
    Baukus, James P.
    Chow, Lap Wai
    Wang, Bryan J.
    [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [9] An Unsupervised Detection Approach for Hardware Trojans
    Dong, Chen
    Liu, Yulin
    Chen, Jinghui
    Liu, Ximeng
    Guo, Wenzhong
    Chen, Yuzhong
    [J]. IEEE ACCESS, 2020, 8 : 158169 - 158183
  • [10] A Locating Method for Multi-Purposes HTs Based on the Boundary Network
    Dong, Chen
    Zhang, Fan
    Liu, Ximeng
    Huang, Xing
    Guo, Wenzhong
    Yang, Yang
    [J]. IEEE ACCESS, 2019, 7 : 110936 - 110950