A Game-Theoretic Approach for Testing for Hardware Trojans

被引:19
|
作者
Kamhoua, Charles A. [1 ]
Zhao, Hong [2 ]
Rodriguez, Manuel [1 ]
Kwiat, Kevin A. [1 ]
机构
[1] US Air Force, Res Lab, Informat Directorate, Cyber Assurance Branch, Rome, NY 13441 USA
[2] Fairleigh Dickinson Univ, Sch Comp Sci & Engn, Teaneck, NJ 07666 USA
关键词
Hardware Trojan; cyber security; game theory; functional testing; integrated circuit;
D O I
10.1109/TMSCS.2016.2564963
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The microcircuit industry is witnessing a massive outsourcing of the fabrication of ICs (Integrated Circuit), as well as the use of third party IP (Intellectual Property) and COTS (Commercial Off-The-Shelf) tools during IC design. These issues raise new security challenges and threats. In particular, it brings up multiple opportunities for the insertion of malicious logic, commonly referred to as a hardware Trojan, in the IC. Testing is typically used along the IC development lifecycle to verify the functional correctness of a given chip. However, the complexity of modern ICs, together with resource and time limitations, makes exhaustive testing commonly unfeasible. In this paper, we propose a game-theoretic approach for testing digital circuits that takes into account the decision-making process of intelligent attackers responsible for the infection of ICs with hardware Trojans. Testing for hardware Trojans is modeled as a zero-sum game between malicious manufacturers or designers (i.e., the attacker) who want to insert Trojans, and testers (i.e., the defender) whose goal is to detect the Trojans. The game results in multiple possible mixed strategy Nash equilibria that allow to identify optimum test sets that increase the probability of detecting and defeating hardware Trojans in digital logic. Results also show that the minimum number of Trojan classes tested by the defender and the fines imposed to the attacker can deter rational as well as irrational attackers from infecting circuits with Trojans.
引用
收藏
页码:199 / 210
页数:12
相关论文
共 50 条
  • [1] Testing for hardware Trojans: A game-theoretic approach
    Kamhoua, Charles A.
    Rodriguez, Manuel
    Kwiat, Kevin A.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8840 : 360 - 369
  • [2] Testing for Hardware Trojans: A Game-Theoretic Approach
    Kamhoua, Charles A.
    Rodriguez, Manuel
    Kwiat, Kevin A.
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 360 - 369
  • [3] Overbuilding: A game-theoretic approach
    Wang, K
    Zhou, YQ
    [J]. REAL ESTATE ECONOMICS, 2000, 28 (03) : 493 - 522
  • [4] Multiple Hypothesis Testing in Adversarial Environments: A Game-theoretic Approach
    Ren, Xiaoqiang
    Mo, Yilin
    [J]. 2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 967 - 972
  • [5] Desuetudo: A Game-Theoretic Approach
    Faroldi, Federico L. G.
    [J]. ARCHIV FUR RECHTS- UND SOZIALPHILOSOPHIE, 2021, 107 (02): : 289 - 299
  • [6] A game-theoretic approach to real-time system testing
    David, Alexandre
    Larsen, Kim G.
    Li, Shuhao
    Nielsen, Brian
    [J]. 2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 2008, : 443 - 448
  • [7] A GAME-THEORETIC APPROACH TO NETWORK EQUILIBRIUM
    HAURIE, A
    MARCOTTE, P
    [J]. MATHEMATICAL PROGRAMMING STUDY, 1986, 26 : 252 - 255
  • [8] A game-theoretic approach to decision in FDI
    Darkhovski, B
    Staroswiecki, M
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2003, 48 (05) : 853 - 858
  • [9] ALOHA networks: a game-theoretic approach
    Marban, Sebastian
    van de Ven, Peter
    Borm, Peter
    Hamers, Herbert
    [J]. MATHEMATICAL METHODS OF OPERATIONS RESEARCH, 2013, 78 (02) : 221 - 242
  • [10] Petty corruption: A game-theoretic approach
    Lambert-Mogiliansky, Ariane
    Majumdar, Mukul
    Radner, Roy
    [J]. INTERNATIONAL JOURNAL OF ECONOMIC THEORY, 2008, 4 (02) : 273 - 297