Using Computational Game Theory To Guide Verification and Security in Hardware Designs

被引:0
|
作者
Smith, Andrew M. [1 ,2 ]
Mayo, Jackson R. [3 ]
Kammler, Vivian [4 ]
Armstrong, Robert C. [1 ]
Vorobeychik, Yevgeniy [5 ]
机构
[1] Sandia Natl Labs, Digital & Quantum Informat Syst, Livermore, CA 94551 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Sandia Natl Labs, Scalable Modeling & Anal Syst, Livermore, CA 94551 USA
[4] Sandia Natl Labs, Embedded Syst Anal, Albuquerque, NM 87185 USA
[5] Vanderbilt Univ, Dept Comp Sci, Nashville, TN 37235 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2017年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Verifying that hardware design implementations adhere to specifications is a time intensive and sometimes intractable problem due to the massive size of the system's state space. Formal methods techniques can be used to prove certain tractable specification properties; however, they are expensive, and often require subject matter experts to develop and solve. Nonetheless, hardware verification is a critical process to ensure security and safety properties are met, and encapsulates problems associated with trust and reliability. For complex designs where coverage of the entire state space is unattainable, prioritizing regions most vulnerable to security or reliability threats would allow efficient allocation of valuable verification resources. Stackelberg security games model interactions between a defender, whose goal is to assign resources to protect a set of targets, and an attacker, who aims to inflict maximum damage on the targets after first observing the defender's strategy. In equilibrium, the defender has an optimal security deployment strategy, given the attacker's best response. We apply this Stackelberg security framework to synthesized hardware implementations using the design's network structure and logic to inform defender valuations and verification costs. The defender's strategy in equilibrium is thus interpreted as a prioritization of the allocation of verification resources in the presence of an adversary. We demonstrate this technique on several open-source synthesized hardware designs.
引用
收藏
页码:110 / 115
页数:6
相关论文
共 50 条
  • [21] Trust Games: How Game Theory Can Guide the Development of Hardware Trojan Detection Methods
    Graf, Jonathan
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 91 - 96
  • [22] Improved verification of hardware designs through antecedent conditioned slicing
    Vasudevan S.
    Emerson E.A.
    Abraham J.A.
    International Journal on Software Tools for Technology Transfer, 2007, 9 (1) : 89 - 101
  • [23] Game Theory for Network Security
    Liang, Xiannuan
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 472 - 486
  • [24] Game Theory and Information Security
    Meng Xianghong
    Wang Xiaoli
    ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +
  • [25] SHarPen: SoC Security Verification by Hardware Penetration Test
    Al-Shaikh, Hasan
    Vafaei, Arash
    Rahman, Mridha Md Mashahedur
    Azar, Kimia Zamiri
    Rahman, Fahim
    Farahmandi, Farimah
    Tehranipoor, Mark
    2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 579 - 584
  • [26] Security Verification of Hardware-enabled Attestation Protocols
    Zhang, Tianwei
    Szefer, Jakub
    Lee, Ruby B.
    2012 IEEE/ACM 45TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE WORKSHOPS, 2012, : 47 - 54
  • [27] Hardware Security at the Limit: Nuclear Verification and Arms Control
    Glaser, Alexander
    PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, : 40 - 40
  • [28] Using Game Theory to Address New Security Risks in the IoT
    Antoniou J.
    EAI/Springer Innovations in Communication and Computing, 2020, : 21 - 42
  • [29] Increasing the Confidence in Security Assurance Cases using Game Theory
    Welzel, Antonia
    Wohlrab, Rebekka
    Mohamad, Mazen
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [30] Fault Tolerance and Security in Forwarding Packets Using Game Theory
    Chen, Jing
    Du, Ruiying
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 534 - 537