Using Computational Game Theory To Guide Verification and Security in Hardware Designs

被引:0
|
作者
Smith, Andrew M. [1 ,2 ]
Mayo, Jackson R. [3 ]
Kammler, Vivian [4 ]
Armstrong, Robert C. [1 ]
Vorobeychik, Yevgeniy [5 ]
机构
[1] Sandia Natl Labs, Digital & Quantum Informat Syst, Livermore, CA 94551 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Sandia Natl Labs, Scalable Modeling & Anal Syst, Livermore, CA 94551 USA
[4] Sandia Natl Labs, Embedded Syst Anal, Albuquerque, NM 87185 USA
[5] Vanderbilt Univ, Dept Comp Sci, Nashville, TN 37235 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2017年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Verifying that hardware design implementations adhere to specifications is a time intensive and sometimes intractable problem due to the massive size of the system's state space. Formal methods techniques can be used to prove certain tractable specification properties; however, they are expensive, and often require subject matter experts to develop and solve. Nonetheless, hardware verification is a critical process to ensure security and safety properties are met, and encapsulates problems associated with trust and reliability. For complex designs where coverage of the entire state space is unattainable, prioritizing regions most vulnerable to security or reliability threats would allow efficient allocation of valuable verification resources. Stackelberg security games model interactions between a defender, whose goal is to assign resources to protect a set of targets, and an attacker, who aims to inflict maximum damage on the targets after first observing the defender's strategy. In equilibrium, the defender has an optimal security deployment strategy, given the attacker's best response. We apply this Stackelberg security framework to synthesized hardware implementations using the design's network structure and logic to inform defender valuations and verification costs. The defender's strategy in equilibrium is thus interpreted as a prioritization of the allocation of verification resources in the presence of an adversary. We demonstrate this technique on several open-source synthesized hardware designs.
引用
收藏
页码:110 / 115
页数:6
相关论文
共 50 条
  • [31] Hardware/Software Formal Co-Verification using Hardware Verification Techniques
    Nguyen, Minh D.
    Kunz, Wolfgang
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2012, : 465 - 470
  • [32] Security Protocol Verification: Symbolic and Computational Models
    Blanchet, Bruno
    PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 3 - 29
  • [33] Transys: Leveraging Common Security Properties Across Hardware Designs
    Zhang, Rui
    Sturton, Cynthia
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1713 - 1727
  • [34] Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs
    Singh, Simranjeet
    Zahoor, Furqan
    Rajendran, Gokul
    Patkar, Sachin
    Chattopadhyay, Anupam
    Merchant, Farhad
    2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 449 - 454
  • [35] Computational Game Unit Balancing based on Game Theory
    Onal, Emre
    Bulbul, Abdullah
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2025, 31 (01) : 3 - 21
  • [36] Hardware Trojan Detection and Diagnosis through Synthesis and Validation using Game Theory
    Sankar, Vaishnavi
    Devi, Nirmala M.
    Jayakumar, M.
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [37] SMASHUP: a toolchain for unified verification of hardware/software co-designs
    Lugou F.
    Apvrille L.
    Francillon A.
    Journal of Cryptographic Engineering, 2017, 7 (1) : 63 - 74
  • [38] Trends in formal verification techniques for C-based hardware designs
    Fujita, Masahiro
    IPSJ Transactions on System LSI Design Methodology, 2009, 2 : 2 - 17
  • [39] Using Game Theory to Guide the Classification of Inhibitors of Human Iodide Transporters
    Khuri, Natalia
    Prasanna, Anish
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 916 - 923
  • [40] Functional & timing in-hardware verification of FPGA-based designs using unit testing frameworks
    Caba, Julian
    Rincon, Fernando
    Daniel Dondo, Julio
    2017 27TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2017,