A Game-Theoretic Approach for Testing for Hardware Trojans

被引:19
|
作者
Kamhoua, Charles A. [1 ]
Zhao, Hong [2 ]
Rodriguez, Manuel [1 ]
Kwiat, Kevin A. [1 ]
机构
[1] US Air Force, Res Lab, Informat Directorate, Cyber Assurance Branch, Rome, NY 13441 USA
[2] Fairleigh Dickinson Univ, Sch Comp Sci & Engn, Teaneck, NJ 07666 USA
关键词
Hardware Trojan; cyber security; game theory; functional testing; integrated circuit;
D O I
10.1109/TMSCS.2016.2564963
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The microcircuit industry is witnessing a massive outsourcing of the fabrication of ICs (Integrated Circuit), as well as the use of third party IP (Intellectual Property) and COTS (Commercial Off-The-Shelf) tools during IC design. These issues raise new security challenges and threats. In particular, it brings up multiple opportunities for the insertion of malicious logic, commonly referred to as a hardware Trojan, in the IC. Testing is typically used along the IC development lifecycle to verify the functional correctness of a given chip. However, the complexity of modern ICs, together with resource and time limitations, makes exhaustive testing commonly unfeasible. In this paper, we propose a game-theoretic approach for testing digital circuits that takes into account the decision-making process of intelligent attackers responsible for the infection of ICs with hardware Trojans. Testing for hardware Trojans is modeled as a zero-sum game between malicious manufacturers or designers (i.e., the attacker) who want to insert Trojans, and testers (i.e., the defender) whose goal is to detect the Trojans. The game results in multiple possible mixed strategy Nash equilibria that allow to identify optimum test sets that increase the probability of detecting and defeating hardware Trojans in digital logic. Results also show that the minimum number of Trojan classes tested by the defender and the fines imposed to the attacker can deter rational as well as irrational attackers from infecting circuits with Trojans.
引用
收藏
页码:199 / 210
页数:12
相关论文
共 50 条
  • [41] A game-theoretic approach to hedonic housing prices
    Habito, Cielito F.
    Santos, Michael O.
    Victorio, Andres G.
    [J]. World Academy of Science, Engineering and Technology, 2010, 67 : 1 - 4
  • [42] HELPERS AT PARENTS NEST - A GAME-THEORETIC APPROACH
    MOTRO, U
    [J]. JOURNAL OF THEORETICAL BIOLOGY, 1993, 163 (01) : 127 - 134
  • [43] A game-theoretic approach to Artificial Immune networks
    Velez, M
    Nino, F
    Alonso, OM
    [J]. ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS, 2004, 3239 : 372 - 385
  • [44] THE STOCHASTIC CHOICE PROBLEM - A GAME-THEORETIC APPROACH
    MONDERER, D
    [J]. JOURNAL OF MATHEMATICAL PSYCHOLOGY, 1992, 36 (04) : 547 - 554
  • [45] Multirobot Charging Strategies: A Game-Theoretic Approach
    Gao, Tianshuang
    Bhattacharya, Sourabh
    [J]. IEEE ROBOTICS AND AUTOMATION LETTERS, 2019, 4 (03) : 2823 - 2830
  • [46] A Game-Theoretic Approach to Deformable Shape Matching
    Rodola, Emanuele
    Bronstein, Alex M.
    Albarelli, Andrea
    Bergamasco, Filippo
    Torsello, Andrea
    [J]. 2012 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2012, : 182 - 189
  • [47] A GAME-THEORETIC APPROACH TO QUANTITY DISCOUNT PROBLEMS
    CHIANG, WC
    FITZSIMMONS, J
    HUANG, Z
    LI, SX
    [J]. DECISION SCIENCES, 1994, 25 (01) : 153 - 168
  • [48] A Game-Theoretic Approach to a Task Delegation Problem
    Dobakhshari, Donya G.
    Varshney, Lav R.
    Gupta, Vijay
    [J]. 2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 1271 - 1276
  • [49] JUCHE VERSUS SADAE - GAME-THEORETIC APPROACH
    KIM, KH
    ROUSH, FW
    [J]. MATHEMATICAL SOCIAL SCIENCES, 1982, 3 (03) : 305 - 310
  • [50] Game-theoretic approach for partial sharing of information
    Raweewan, Morrakot
    Ferrell, William G., Jr.
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 122 - +