Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense

被引:1
|
作者
Yang, Daming [1 ]
Gao, Cheng [1 ]
Huang, Jiaoying [1 ]
机构
[1] Beihang Univ, Sch Reliabil & Syst Engn, Beijing 100191, Peoples R China
关键词
Integrated circuits; Games; Hardware; Security; Trojan horses; Manufacturing; Logic gates; Hardware trojan; chip security; dynamic game;
D O I
10.1109/ACCESS.2020.3040395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The offshore outsourcing introduces serious threats to semiconductor suppliers and integrated circuit(IC) users for the possibility of hardware trojans (HTs). To alleviate this threat, IC designers use the active defenses against HTs which are implanted by the malicious manufacturer. In this paper, a game-theoretic framework based on fuzzy theory is proposed to obtain the optimal strategy. It analyzes the interactions between the active defense designer and the malicious manufacturer. The attack and defense on IC is formulated as a noncooperative dynamic game. The active defense strategy is decided in IC design. And the overall payoff including design costs and losses avoided is optimized. Subsequently, the HT is implanted considering the implantation cost as well as the damage caused by it. To solve the problem of uncertain payoff caused by insufficient information, fuzzy variable is used to represent the influence of the defense coverage rate on the payoff. In order to verify the applicability of fuzzy variable in dynamic game framework, the existence of pure strategy Nash equilibrium in the game is proved. A solution algorithm for pure strategy Nash Equilibrium is proposed to obtain the optimal strategy of attacker and defender. Thanks to the case study of Field Programmable Gate Array (FPGA), the proposed framework is feasible for HT attack and defense game.
引用
收藏
页码:213094 / 213103
页数:10
相关论文
共 50 条
  • [41] Neural-network-based hardware trojan attack prediction and security defense mechanism in optical networks-on-chip
    He, Xiangyu
    Guo, Pengxing
    Zhou, Jiahao
    Li, Jingsi
    Zhang, Fan
    Hou, Weigang
    Guo, Lei
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2024, 16 (09) : 881 - 893
  • [42] Optimal Network Defense Strategy Selection Based on Markov Bayesian Game
    Wang, Zengguang
    Lu, Yu
    Li, Xi
    Nie, Wei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5631 - 5652
  • [43] Defense Strategy Selection Model Based on Multistage Evolutionary Game Theory
    Liu Y.
    Chen H.
    Zhang H.
    Liu X.
    Security and Communication Networks, 2021, 2021
  • [44] Optimal Strategy Selection for Moving Target Defense Based on Markov Game
    Lei, Cheng
    Ma, Duo-He
    Zhang, Hong-Qi
    IEEE ACCESS, 2017, 5 : 156 - 169
  • [45] Hardware Trojan Detection Game: A Prospect-Theoretic Approach
    Saad, Walid
    Sanjab, Anibal
    Wang, Yunpeng
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) : 7697 - 7710
  • [46] Hardware Trojans: The Defense and Attack of Integrated Circuits
    Reece, Trey
    Robinson, William H.
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 293 - 296
  • [47] Hardware Trojans: The defense and attack of integrated circuits
    Vanderbilt University, EECS Department, Nashville, TN, United States
    Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (293-296):
  • [48] Nash equilibrium strategy and attack-defense game model for naval support base
    Zeng, Bin
    Wang, Rui
    Li, Houpu
    Zhang, Hongqiang
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (08): : 2570 - 2580
  • [49] ICPS false injection attack defense strategy based on multi-channel game
    Sun Z.-W.
    Hong T.
    Kongzhi yu Juece/Control and Decision, 2022, 37 (05): : 1357 - 1366
  • [50] A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision
    Jiang, Wei
    Tian, Zhi-hong
    Zhang, Hong-li
    Song, Xin-fang
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 648 - +