Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense

被引:1
|
作者
Yang, Daming [1 ]
Gao, Cheng [1 ]
Huang, Jiaoying [1 ]
机构
[1] Beihang Univ, Sch Reliabil & Syst Engn, Beijing 100191, Peoples R China
关键词
Integrated circuits; Games; Hardware; Security; Trojan horses; Manufacturing; Logic gates; Hardware trojan; chip security; dynamic game;
D O I
10.1109/ACCESS.2020.3040395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The offshore outsourcing introduces serious threats to semiconductor suppliers and integrated circuit(IC) users for the possibility of hardware trojans (HTs). To alleviate this threat, IC designers use the active defenses against HTs which are implanted by the malicious manufacturer. In this paper, a game-theoretic framework based on fuzzy theory is proposed to obtain the optimal strategy. It analyzes the interactions between the active defense designer and the malicious manufacturer. The attack and defense on IC is formulated as a noncooperative dynamic game. The active defense strategy is decided in IC design. And the overall payoff including design costs and losses avoided is optimized. Subsequently, the HT is implanted considering the implantation cost as well as the damage caused by it. To solve the problem of uncertain payoff caused by insufficient information, fuzzy variable is used to represent the influence of the defense coverage rate on the payoff. In order to verify the applicability of fuzzy variable in dynamic game framework, the existence of pure strategy Nash equilibrium in the game is proved. A solution algorithm for pure strategy Nash Equilibrium is proposed to obtain the optimal strategy of attacker and defender. Thanks to the case study of Field Programmable Gate Array (FPGA), the proposed framework is feasible for HT attack and defense game.
引用
收藏
页码:213094 / 213103
页数:10
相关论文
共 50 条
  • [31] Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market
    State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics Engineering and Computer Science, Peking University, Beijing, China
    不详
    TX, United States
    IEEE Trans. Smart Grid, 5 (2273-2282):
  • [32] Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market
    Ma, Jinghuan
    Liu, Yuting
    Song, Lingyang
    Han, Zhu
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) : 2273 - 2282
  • [33] Analysis of SDN Attack and Defense Strategy Based on Zero-Sum Game
    Zhou, Rongfu
    Lin, Jun
    Liu, Lan
    Ye, Min
    Wei, Shunhe
    ADVANCES IN BRAIN INSPIRED COGNITIVE SYSTEMS, 2020, 11691 : 479 - 485
  • [34] A Game Theory Approach to Attack-Defense Strategy for Perception of Connected Vehicles
    Gu, Ziqing
    An, Yunlong
    Tan, Fangyuan
    Li, Yang
    Zheng, Sifa
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 2587 - 2594
  • [35] Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
    Tan, Jing-lei
    Zhang, Heng-wei
    Zhang, Hong-qi
    Lei, Cheng
    Jin, Hui
    Li, Bo-wen
    Hu, Hao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] Multiple fault attack on PRESENT with a hardware trojan implementation in FPGA
    Breier, Jakub
    He, Wei
    arXiv, 2017,
  • [37] Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA
    Breier, Jakub
    He, Wei
    2015 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2015, : 58 - 64
  • [38] Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
    Halak, Basel
    Duarte-Sanchez, Jorge
    2020 IEEE 33RD INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2020, : 43 - 47
  • [39] edAttack: Hardware Trojan Attack on On-Chip Packet Compression
    Kumar, Atul
    Deb, Dipika
    Das, Shirshendu
    Das, Palash
    IEEE DESIGN & TEST, 2023, 40 (06) : 125 - 135
  • [40] Hardware Trojan Enabled Denial of Service Attack on CAN Bus
    Bozdal, Mehmet
    Randa, Maulana
    Samie, Mohammad
    Jennions, Ian
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON THROUGH-LIFE ENGINEERING SERVICES, 2018, 16 : 47 - 52