Quantitative Assessment and Grading of Hardware Trojan Threat Based on Rough Set Theory

被引:1
作者
Yang, Daming [1 ]
Gao, Cheng [1 ]
Huang, Jiaoying [1 ]
机构
[1] Beihang Univ, Sch Reliabil & Syst Engn, Beijing 100191, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
关键词
Hardware Trojan; rough set theory; quantitative assessment; k-means; GAME;
D O I
10.3390/app12115576
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The globalization of integrated circuit (IC) design and fabrication has given rise to severe concerns with respect to modeling strategic interaction between malicious attackers and Hardware Trojan (HT) defenders using game theory. The quantitative assessment of attacker actions has made the game very challenging. In this paper, a novel rough set theory framework is proposed to analyze HT threat. The problem is formulated as an attribute weight calculation and element assessment in an information system without decision attributes. The proposed method introduces information content in the rough set that allows calculation of the weight of both core attributes and non-core attributes. For quantitative assessment, the HT threat is characterized by the closeness coefficient. In order to allow HT defenders to use fast and effective countermeasures, a threat classification method based on the k-means algorithm is proposed, and the Best Workspace Prediction (BWP) index is used to determine the number of clusters. Statistical tests were performed on the benchmark circuits in Trust-hub in order to demonstrate the effectiveness of the proposed technique for assessing HT threat. Compared with k-means, equidistant division-based k-means, and k-means++, our method shows a significant improvement in both cluster accuracy and running time.
引用
收藏
页数:14
相关论文
共 26 条
  • [1] Arthur D, 2007, PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P1027
  • [2] A region based approach for the identification of hardware Trojans
    Banga, Mainak
    Hsiao, Michael S.
    [J]. 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 40 - 47
  • [3] Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
    Bhunia, Swarup
    Abramovici, Miron
    Agrawal, Dakshi
    Bradley, Paul
    Hsiao, Michael S.
    Plusquellic, Jim
    Tehranipoor, Mohammad
    [J]. IEEE DESIGN & TEST, 2013, 30 (03) : 6 - 17
  • [4] Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
  • [5] The Risk Assessment of Tunnels Based on Grey Correlation and Entropy Weight Method
    Gao C.-L.
    Li S.-C.
    Wang J.
    Li L.-P.
    Lin P.
    [J]. Geotechnical and Geological Engineering, 2018, 36 (3) : 1621 - 1631
  • [6] Graf J, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P91, DOI 10.1109/HST.2016.7495563
  • [7] Guo XL, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P91, DOI 10.1109/HST.2019.8740840
  • [8] Guobin Li, 2010, Proceedings 2010 3rd International Symposium on Computational Intelligence and Design (ISCID 2010), P167, DOI 10.1109/ISCID.2010.131
  • [9] Construction Projects Assessment Based on the Sustainable Development Criteria by an Integrated Fuzzy AHP and Improved GRA Model
    Hatefi, Seyed Morteza
    Tamosaitiene, Jolanta
    [J]. SUSTAINABILITY, 2018, 10 (04)
  • [10] Hardware Trojans in Wireless Cryptographic ICs
    Jin, Yier
    Makris, Yiorgos
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 26 - 35