Using Computational Game Theory To Guide Verification and Security in Hardware Designs

被引:0
|
作者
Smith, Andrew M. [1 ,2 ]
Mayo, Jackson R. [3 ]
Kammler, Vivian [4 ]
Armstrong, Robert C. [1 ]
Vorobeychik, Yevgeniy [5 ]
机构
[1] Sandia Natl Labs, Digital & Quantum Informat Syst, Livermore, CA 94551 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Sandia Natl Labs, Scalable Modeling & Anal Syst, Livermore, CA 94551 USA
[4] Sandia Natl Labs, Embedded Syst Anal, Albuquerque, NM 87185 USA
[5] Vanderbilt Univ, Dept Comp Sci, Nashville, TN 37235 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2017年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Verifying that hardware design implementations adhere to specifications is a time intensive and sometimes intractable problem due to the massive size of the system's state space. Formal methods techniques can be used to prove certain tractable specification properties; however, they are expensive, and often require subject matter experts to develop and solve. Nonetheless, hardware verification is a critical process to ensure security and safety properties are met, and encapsulates problems associated with trust and reliability. For complex designs where coverage of the entire state space is unattainable, prioritizing regions most vulnerable to security or reliability threats would allow efficient allocation of valuable verification resources. Stackelberg security games model interactions between a defender, whose goal is to assign resources to protect a set of targets, and an attacker, who aims to inflict maximum damage on the targets after first observing the defender's strategy. In equilibrium, the defender has an optimal security deployment strategy, given the attacker's best response. We apply this Stackelberg security framework to synthesized hardware implementations using the design's network structure and logic to inform defender valuations and verification costs. The defender's strategy in equilibrium is thus interpreted as a prioritization of the allocation of verification resources in the presence of an adversary. We demonstrate this technique on several open-source synthesized hardware designs.
引用
收藏
页码:110 / 115
页数:6
相关论文
共 50 条
  • [41] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [42] Property Based Formal Security Verification for Hardware Trojan Detection
    Qin, Maoyuan
    Hu, Wei
    Mu, Dejun
    Tai, Yu
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 62 - 67
  • [43] Hardware Trojan Detection through Information Flow Security Verification
    Nahiyan, Adib
    Sadi, Mehdi
    Vittal, Rahul
    Contreras, Gustavo
    Forte, Domenic
    Tehranipoor, Mark
    2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [44] Hardware and Software Co-Verification from Security Perspective
    Chen, Kejun
    Deng, Qingxu
    Hou, Yumin
    Jin, Yier
    Guo, Xiaolong
    2019 20TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR/SOC TEST, SECURITY AND VERIFICATION (MTV 2019), 2019, : 50 - 55
  • [45] Formal Security Verification of Concurrent Firmware in SoCs using Instruction-Level Abstraction for Hardware
    Huang, Bo-Yuan
    Ray, Sayak
    Gupta, Aarti
    Fung, Jason M.
    Malik, Sharad
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [46] Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    arXiv, 2022,
  • [47] Runtime Hardware Security Verification Using Approximate Computing: A Case Study on Video Motion Detection
    Ye, Mengmei
    Feng, Xianglong
    Wei, Sheng
    PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2019,
  • [48] Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, : 236 - 241
  • [49] Hardware Security Analysis of Arbiters: Trojan Modeling and Formal Verification
    Ibrahim, Hala
    Azmi, Haytham
    El-Kharashi, M. Watheq
    Safar, Mona
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 86 - 91
  • [50] Property Specific Information Flow Analysis for Hardware Security Verification
    Hu, Wei
    Ardeshiricham, Armaiti
    Gobulukoglu, Mustafa S.
    Wang, Xinmu
    Kastner, Ryan
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,