...
首页> 外文期刊>IEEE Transactions on Vehicular Technology >Hardware Trojan Detection Game: A Prospect-Theoretic Approach
【24h】

Hardware Trojan Detection Game: A Prospect-Theoretic Approach

机译:硬件木马检测游戏:一种基于前景的理论方法

获取原文
获取原文并翻译 | 示例
           

摘要

Outsourcing integrated circuit (IC) manufacturing to offshore foundries has grown exponentially in recent years. Given the critical role of ICs in the control and operation of vehicular systems and other modern engineering designs, such offshore outsourcing has led to serious security threats due to the potential of insertion of hardware trojans-malicious designs that, when activated, can lead to highly detrimental consequences. In this paper, a novel game-theoretic framework is proposed to analyze the interactions between a hardware manufacturer, acting as an attacker, and an IC testing facility, acting as a defender. The problem is formulated as a noncooperative game in which the attacker must decide on the type of trojan that it inserts while taking into account the detection penalty as well as the damage caused by the trojan. Meanwhile, the resource-constrained defender must decide on the best testing strategy that allows optimizing its overall utility which accounts for both damages and the fines. The proposed game is based on the robust behavioral framework of prospect theory (PT) which allows capturing the potential uncertainty, risk, and irrational behavior in the decision making of both the attacker and defender. For both the standard rational expected utility (EUT) case and the PT case, a novel algorithm based on fictitious play is proposed and shown to converge to a mixed-strategy Nash equilibrium. For an illustrative case study, thorough analytical results are derived for both EUT and PT to study the properties of the reached equilibrium as well as the impact of key system parameters such as the defender-set fine. Simulation results assess the performance of the proposed framework under both EUT and PT and show that the use of PT will provide invaluable insights on the outcomes of the proposed hardware trojan game, in particular, and system security, in general.
机译:近年来,将集成电路(IC)制造外包给离岸铸造厂的数量呈指数增长。鉴于集成电路在车辆系统和其他现代工程设计的控制和操作中的关键作用,由于可能插入硬件木马恶意设计,这种离岸外包已导致严重的安全威胁,而这些恶意设计一旦被激活,则可能导致严重的安全隐患。有害的后果。在本文中,提出了一种新颖的博弈论框架,以分析充当攻击者的硬件制造商与充当防御者的IC测试设施之间的交互。该问题被表述为一种非合作游戏,在这种游戏中,攻击者必须在确定检测到的惩罚以及木马造成的损害的同时,确定其插入的木马的类型。同时,资源受限的辩护人必须决定最佳测试策略,该策略可以优化其总体效用,从而兼顾损害赔偿和罚款。拟议的博弈基于前景理论(PT)的鲁棒行为框架,该框架可捕获攻击者和防御者决策中的潜在不确定性,风险和非理性行为。对于标准理性预期效用(EUT)情况和PT情况,都提出了一种基于虚拟博弈的新颖算法,并证明该算法收敛于混合策略纳什均衡。对于一个说明性的案例研究,EUT和PT都获得了详尽的分析结果,以研究达到的平衡的性质以及关键系统参数(例如防御者设定的罚款)的影响。仿真结果评估了在EUT和PT下拟议框架的性能,并表明PT的使用将对拟议的硬件特洛伊木马程序的结果,尤其是总体上的系统安全性,提供宝贵的见解。

著录项

  • 来源
    《IEEE Transactions on Vehicular Technology》 |2017年第9期|7697-7710|共14页
  • 作者单位

    Bradley Department of Electrical and Computer Engineering, Virginia Tech, Wireless@VT, Blacksburg, VA, USA;

    Bradley Department of Electrical and Computer Engineering, Virginia Tech, Wireless@VT, Blacksburg, VA, USA;

    Electrical and Computer Engineering Department, University of Miami, Coral Gables, FL, USA;

    Air Force Research Laboratory, Information Directorate, Cyber Assurance Branch, Rome, NY, USA;

    Air Force Research Laboratory, Information Directorate, Cyber Assurance Branch, Rome, NY, USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Trojan horses; Integrated circuits; Hardware; Games; Testing; Security;

    机译:特洛伊木马;集成电路;硬件;游戏;测试;安全性;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号