Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense

被引:1
|
作者
Yang, Daming [1 ]
Gao, Cheng [1 ]
Huang, Jiaoying [1 ]
机构
[1] Beihang Univ, Sch Reliabil & Syst Engn, Beijing 100191, Peoples R China
关键词
Integrated circuits; Games; Hardware; Security; Trojan horses; Manufacturing; Logic gates; Hardware trojan; chip security; dynamic game;
D O I
10.1109/ACCESS.2020.3040395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The offshore outsourcing introduces serious threats to semiconductor suppliers and integrated circuit(IC) users for the possibility of hardware trojans (HTs). To alleviate this threat, IC designers use the active defenses against HTs which are implanted by the malicious manufacturer. In this paper, a game-theoretic framework based on fuzzy theory is proposed to obtain the optimal strategy. It analyzes the interactions between the active defense designer and the malicious manufacturer. The attack and defense on IC is formulated as a noncooperative dynamic game. The active defense strategy is decided in IC design. And the overall payoff including design costs and losses avoided is optimized. Subsequently, the HT is implanted considering the implantation cost as well as the damage caused by it. To solve the problem of uncertain payoff caused by insufficient information, fuzzy variable is used to represent the influence of the defense coverage rate on the payoff. In order to verify the applicability of fuzzy variable in dynamic game framework, the existence of pure strategy Nash equilibrium in the game is proved. A solution algorithm for pure strategy Nash Equilibrium is proposed to obtain the optimal strategy of attacker and defender. Thanks to the case study of Field Programmable Gate Array (FPGA), the proposed framework is feasible for HT attack and defense game.
引用
收藏
页码:213094 / 213103
页数:10
相关论文
共 50 条
  • [1] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [2] Defense strategy selection based on incomplete information game for the false data injection attack
    Yi, Na
    Xu, Jianjun
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (14) : 2897 - 2913
  • [3] Attack-Defense Confrontation Analysis and Optimal Defense Strategy Selection Using Hybrid Game Theoretic Methods
    Jin, Bao
    Zhao, Xiaodong
    Yuan, Dongmei
    SYMMETRY-BASEL, 2024, 16 (02):
  • [4] Hardware Trojan Attack in Embedded Memory
    Wang, Xinmu
    Hoque, Tamzidul
    Basak, Abhishek
    Karam, Robert
    Hu, Wei
    Qin, Maoyuan
    Mu, Dejun
    Bhunia, Swarup
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (01)
  • [5] Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game
    Chen, Xiayang
    Liu, Xingtong
    Zhang, Lei
    Tang, Chaojing
    IEEE ACCESS, 2019, 7 : 19907 - 19921
  • [6] A survey of hardware Trojan threat and defense
    Li, He
    Liu, Qiang
    Zhang, Jiliang
    INTEGRATION-THE VLSI JOURNAL, 2016, 55 : 426 - 437
  • [7] Network Attack Defense Awareness based on Dynamic Game
    Li, Man
    Cao, Jinjing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 69 - 77
  • [8] Dynamic game model of botnet DDoS attack and defense
    Wang, Yichuan
    Ma, Jianfeng
    Zhang, Liumei
    Ji, Wenjiang
    Lu, Di
    Hei, Xinhong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3127 - 3140
  • [9] Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack
    Guo, Youqi
    Wang, Lingfeng
    Liu, Zhaoxi
    Shen, Yitong
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 131 (131)
  • [10] A practical application of game theory to optimize selection of hardware Trojan detection strategies
    Jonathan Graf
    Whitney Batchelor
    Scott Harper
    Ryan Marlow
    Edward Carlisle
    Peter Athanas
    Journal of Hardware and Systems Security, 2020, 4 (2) : 98 - 119