Quantitative Assessment and Grading of Hardware Trojan Threat Based on Rough Set Theory

被引:1
作者
Yang, Daming [1 ]
Gao, Cheng [1 ]
Huang, Jiaoying [1 ]
机构
[1] Beihang Univ, Sch Reliabil & Syst Engn, Beijing 100191, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
关键词
Hardware Trojan; rough set theory; quantitative assessment; k-means; GAME;
D O I
10.3390/app12115576
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The globalization of integrated circuit (IC) design and fabrication has given rise to severe concerns with respect to modeling strategic interaction between malicious attackers and Hardware Trojan (HT) defenders using game theory. The quantitative assessment of attacker actions has made the game very challenging. In this paper, a novel rough set theory framework is proposed to analyze HT threat. The problem is formulated as an attribute weight calculation and element assessment in an information system without decision attributes. The proposed method introduces information content in the rough set that allows calculation of the weight of both core attributes and non-core attributes. For quantitative assessment, the HT threat is characterized by the closeness coefficient. In order to allow HT defenders to use fast and effective countermeasures, a threat classification method based on the k-means algorithm is proposed, and the Best Workspace Prediction (BWP) index is used to determine the number of clusters. Statistical tests were performed on the benchmark circuits in Trust-hub in order to demonstrate the effectiveness of the proposed technique for assessing HT threat. Compared with k-means, equidistant division-based k-means, and k-means++, our method shows a significant improvement in both cluster accuracy and running time.
引用
收藏
页数:14
相关论文
共 26 条
  • [21] Work safety evaluation in Mainland China using grey theory
    Wei, Jiuchang
    Zhou, Lei
    Wang, Fei
    Wu, Desheng
    [J]. APPLIED MATHEMATICAL MODELLING, 2015, 39 (02) : 924 - 933
  • [22] Wolff F, 2008, DES AUT TEST EUROPE, P1474
  • [23] Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense
    Yang, Daming
    Gao, Cheng
    Huang, Jiaoying
    [J]. IEEE ACCESS, 2020, 8 (213094-213103) : 213094 - 213103
  • [24] Fuzzy Comprehensive Evaluation Method on Water Environmental Quality based on Entropy Weight with Consideration of Toxicology of Evaluation Factors
    Yang, Junyao
    Zhang, Leilei
    [J]. PROGRESS IN ENVIRONMENTAL SCIENCE AND ENGINEERING (ICEESD2011), PTS 1-5, 2012, 356-360 : 2383 - 2388
  • [25] A2: Analog Malicious Hardware
    Yang, Kaiyuan
    Hicks, Matthew
    Dong, Qing
    Austin, Todd
    Sylvester, Dennis
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 18 - 37
  • [26] Zhou Shi-bing, 2010, Journal of Computer Applications, V30, P1995, DOI 10.3724/SP.J.1087.2010.01995