首页> 外文会议>International Conference on Cyber Security and Protection of Digital Services >Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
【24h】

Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory

机译:思考智能,播放愚蠢:使用博弈论分析硬件木马检测中的欺骗

获取原文

摘要

In recent years, integrated circuits (ICs) have become significant for various industries and their security has been given greater priority, specifically in the supply chain. Budgetary constraints have compelled IC designers to offshore manufacturing to third-party companies. When the designer gets the manufactured ICs back, it is imperative to test for potential threats like hardware trojans (HT). In this paper, a novel multi-level game-theoretic framework is introduced to analyze the interactions between a malicious IC manufacturer and the tester. In particular, the game is formulated as a non-cooperative, zero-sum, repeated game using prospect theory (PT) that captures different players’ rationalities under uncertainty. The repeated game is separated into a learning stage, in which the defender learns about the attacker’s tendencies, and an actual game stage, where this learning is used. Experiments show great incentive for the attacker to deceive the defender about their actual rationality by "playing dumb" in the learning stage (deception). This scenario is captured using hypergame theory to model the attacker’s view of the game. The optimal deception rationality of the attacker is analytically derived to maximize utility gain. For the defender, a first-step deception mitigation process is proposed to thwart the effects of deception. Simulation results show that the attacker can profit from the deception as it can successfully insert HTs in the manufactured ICs without being detected.
机译:近年来,集成电路(ICS)对各种行业变得非常重要,其安全在供应链中特别优先考虑。预算限制将IC设计师推向离岸制造给第三方公司。当设计人员获得制造的ICS后,必须测试硬件特洛伊木马(HT)等潜在威胁。本文介绍了一种新型的多级游戏理论框架,分析了恶意IC制造商和测试仪之间的相互作用。特别是,使用前景理论(PT)作为非协作,零和重复游戏的游戏制定为在不确定性下捕获不同的玩家的合理性。重复的游戏分为一个学习阶段,其中防御者了解攻击者的趋势,以及使用这种学习的实际游戏阶段。实验表现出攻击者在学习阶段(欺骗)中“哑视演奏”欺骗后卫的实际合理欺骗后卫的巨大动力。使用超刻表理论捕获此方案以模拟攻击者的游戏视图。攻击者的最佳欺骗合理性在分析衍生中以最大化效用增益。对于后卫,提出了一步的欺骗缓解过程来挫败欺骗的影响。仿真结果表明,攻击者可以从欺骗中获利,因为它可以在未经检测的情况下成功插入制造的IC中的HTS。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号