Using Computational Game Theory To Guide Verification and Security in Hardware Designs

被引:0
|
作者
Smith, Andrew M. [1 ,2 ]
Mayo, Jackson R. [3 ]
Kammler, Vivian [4 ]
Armstrong, Robert C. [1 ]
Vorobeychik, Yevgeniy [5 ]
机构
[1] Sandia Natl Labs, Digital & Quantum Informat Syst, Livermore, CA 94551 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Sandia Natl Labs, Scalable Modeling & Anal Syst, Livermore, CA 94551 USA
[4] Sandia Natl Labs, Embedded Syst Anal, Albuquerque, NM 87185 USA
[5] Vanderbilt Univ, Dept Comp Sci, Nashville, TN 37235 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2017年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Verifying that hardware design implementations adhere to specifications is a time intensive and sometimes intractable problem due to the massive size of the system's state space. Formal methods techniques can be used to prove certain tractable specification properties; however, they are expensive, and often require subject matter experts to develop and solve. Nonetheless, hardware verification is a critical process to ensure security and safety properties are met, and encapsulates problems associated with trust and reliability. For complex designs where coverage of the entire state space is unattainable, prioritizing regions most vulnerable to security or reliability threats would allow efficient allocation of valuable verification resources. Stackelberg security games model interactions between a defender, whose goal is to assign resources to protect a set of targets, and an attacker, who aims to inflict maximum damage on the targets after first observing the defender's strategy. In equilibrium, the defender has an optimal security deployment strategy, given the attacker's best response. We apply this Stackelberg security framework to synthesized hardware implementations using the design's network structure and logic to inform defender valuations and verification costs. The defender's strategy in equilibrium is thus interpreted as a prioritization of the allocation of verification resources in the presence of an adversary. We demonstrate this technique on several open-source synthesized hardware designs.
引用
收藏
页码:110 / 115
页数:6
相关论文
共 50 条
  • [1] A game theory approach for RTL security verification resources allocation
    Wang, Haoyi
    Cai, Yici
    Zhou, Qiang
    CCF TRANSACTIONS ON HIGH PERFORMANCE COMPUTING, 2021, 3 (01) : 57 - 69
  • [2] A game theory approach for RTL security verification resources allocation
    Haoyi Wang
    Yici Cai
    Qiang Zhou
    CCF Transactions on High Performance Computing, 2021, 3 : 57 - 69
  • [3] Verification of Chisel Hardware designs with ChiselVerify
    Dobis, Amelia
    Laeufer, Kevin
    Damsgaard, Hans Jakob
    Petersen, Tjark
    Rasmussen, Kasper Juul Hesse
    Tolotto, Enrico
    Andersen, Simon Thye
    Lin, Richard
    Schoeberl, Martin
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 96
  • [4] Verification of Approximate Hardware Designs with ChiselVerify
    Damsgaard, Hans Jakob
    Ometov, Aleksandr
    Nurmi, Jari
    2023 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE, NORCAS, 2023,
  • [5] Formal specification and verification of hardware designs
    Ramesh, S
    Rao, SSSP
    Sivakumar, G
    Bhaduri, P
    PHOTOMASK AND X-RAY MASK TECHNOLOGY V, 1998, 3412 : 261 - 268
  • [6] VERIFICATION AND VALIDATION OF HARDWARE DESIGNS VIA HARDWARE PETRI NETS
    HO, C
    FORWARD, KE
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 1994, 9 (01): : 65 - 72
  • [7] Extensive coverage of functional verification of hardware designs
    Radu, Mihaela
    2007 IEEE International Conference on Microelectronic Systems Education, Proceedings, 2007, : 101 - 102
  • [8] Modular Deductive Verification of Multiprocessor Hardware Designs
    Vijayaraghavan, Muralidaran
    Chlipala, Adam
    Arvind
    Dave, Nirav
    COMPUTER AIDED VERIFICATION, CAV 2015, PT II, 2015, 9207 : 109 - 127
  • [9] Network Security Validation Using Game Theory
    Papadopoulou, Vicky
    Gregoriades, Andreas
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 259 - 266
  • [10] Computational Game Theory
    Codenotti, Bruno
    ALGORITHMIC GAME THEORY, 2011, 6982 : 1 - 1