A game theory approach for RTL security verification resources allocation

被引:0
|
作者
Haoyi Wang
Yici Cai
Qiang Zhou
机构
[1] Tsinghua University,Department of Computer Science and Technology
来源
CCF Transactions on High Performance Computing | 2021年 / 3卷
关键词
Hardware Trojan; Verification resource allocation; Game theory; RTL security vulnerability;
D O I
暂无
中图分类号
学科分类号
摘要
Many Trojan detection technologies are too time-consuming to cover the entire state space in complex designs. The valuable verification resources should be allocated to regions vulnerable to security threats. However, there are few studies on security verification resources allocation. To fill in this gap, we design a security game framework to guide the security verification resources allocation. The framework utilizes the Trojan vulnerability measurement as player utilities, so the utility value determination doesn't need any expert prior knowledge to the specific design under test. A new Stackelberg security game specific to hardware security is also proposed. The new game model minimizes the defender utility loss with the limited verification resources restriction. Due to the lack of study on RTL Trojan vulnerability measurement, we also propose a RTL security vulnerability measurement to measure each logic propagation path vulnerability quantitatively and efficiently. We apply the proposed Stackelberg security game framework to Trust-hub Trojan benchmarks written by Verilog RTL code. The experiments demonstrate that the most suspicious logic propagation path is one part of Trojan in most cases and the proposed RTL security vulnerability measurement is effective. Also, the allocation strategy calculated by security game could get security confidence as high as possible with all available resources and may also cover the Trojan even when the carefully design Trojan evade the vulnerability measurement.
引用
收藏
页码:57 / 69
页数:12
相关论文
共 50 条
  • [1] A game theory approach for RTL security verification resources allocation
    Wang, Haoyi
    Cai, Yici
    Zhou, Qiang
    CCF TRANSACTIONS ON HIGH PERFORMANCE COMPUTING, 2021, 3 (01) : 57 - 69
  • [2] A GAME THEORY APPROACH TO LOGISTICS ALLOCATION
    MOGLEWER, S
    PAYNE, C
    NAVAL RESEARCH LOGISTICS QUARTERLY, 1970, 17 (01): : 87 - &
  • [3] Water Resources Allocation: A Cooperative Game Theoretic Approach
    Wang, L. Z.
    Fang, L.
    Hipel, K. W.
    JOURNAL OF ENVIRONMENTAL INFORMATICS, 2003, 2 (02) : 11 - 22
  • [4] Dynamic Allocation Algorithm of WiFi Access Resources Based on the Game Theory
    Ye X.-T.
    Liu Z.-B.
    Shao S.-J.
    Qi F.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2020, 43 (02): : 10 - 15and58
  • [5] Study on the game-theory method of effective allocation of marketing resources
    Wang, Y
    Proceedings of 2005 International Conference on Construction & Real Estate Management, Vols 1 and 2: CHALLENGE OF INNOVATION IN CONSTRUCTION AND REAL ESTATE, 2005, : 1468 - 1471
  • [6] Study on the game-theory method of effective allocation of marketing resources
    Wang, Y
    Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 2656 - 2659
  • [7] Using Computational Game Theory To Guide Verification and Security in Hardware Designs
    Smith, Andrew M.
    Mayo, Jackson R.
    Kammler, Vivian
    Armstrong, Robert C.
    Vorobeychik, Yevgeniy
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 110 - 115
  • [8] Redistribution of tax resources: a cooperative game theory approach
    Calvo, Emilio
    SERIES-JOURNAL OF THE SPANISH ECONOMIC ASSOCIATION, 2021, 12 (04): : 633 - 686
  • [9] Redistribution of tax resources: a cooperative game theory approach
    Emilio Calvo
    SERIEs, 2021, 12 : 633 - 686
  • [10] A Game Theory Approach in Information Security Risk Study
    Shing, Marn-Ling
    Shing, Chen-Chi
    Chen, Kuo Lane
    Lee, Huei
    E-BUSINESS, MANAGEMENT AND ECONOMICS, 2011, 3 : 201 - +