首页> 外文期刊>Multi-Scale Computing Systems, IEEE Transactions on >A Game-Theoretic Approach for Testing for Hardware Trojans
【24h】

A Game-Theoretic Approach for Testing for Hardware Trojans

机译:博弈论方法测试硬件木马

获取原文
获取原文并翻译 | 示例

摘要

The microcircuit industry is witnessing a massive outsourcing of the fabrication of ICs (Integrated Circuit), as well as the use of third party IP (Intellectual Property) and COTS (Commercial Off-The-Shelf) tools during IC design. These issues raise new security challenges and threats. In particular, it brings up multiple opportunities for the insertion of malicious logic, commonly referred to as a hardware Trojan, in the IC. Testing is typically used along the IC development lifecycle to verify the functional correctness of a given chip. However, the complexity of modern ICs, together with resource and time limitations, makes exhaustive testing commonly unfeasible. In this paper, we propose a game-theoretic approach for testing digital circuits that takes into account the decision-making process of intelligent attackers responsible for the infection of ICs with hardware Trojans. Testing for hardware Trojans is modeled as a zero-sum game between malicious manufacturers or designers (i.e., the attacker) who want to insert Trojans, and testers (i.e., the defender) whose goal is to detect the Trojans. The game results in multiple possible mixed strategy Nash equilibria that allow to identify optimum test sets that increase the probability of detecting and defeating hardware Trojans in digital logic. Results also show that the minimum number of Trojan classes tested by the defender and the fines imposed to the attacker can deter rational as well as irrational attackers from infecting circuits with Trojans.
机译:微电路行业正在目睹大量的IC制造(集成电路)外包,以及在IC设计过程中使用第三方IP(知识产权)和COTS(现成的商用)工具。这些问题带来了新的安全挑战和威胁。特别是,它为在IC中插入通常被称为硬件Trojan的恶意逻辑带来了很多机会。通常在IC开发生命周期中使用测试来验证给定芯片的功能正确性。但是,现代IC的复杂性以及资源和时间的限制,使得穷举测试通常不可行。在本文中,我们提出了一种用于测试数字电路的博弈论方法,该方法考虑了负责用硬件木马感染IC的智能攻击者的决策过程。对硬件木马的测试被建模为要插入木马的恶意制造商或设计人员(即攻击者)与目标是检测木马的测试人员(即防御者)之间的零和游戏。游戏会导致多种可能的混合策略纳什均衡,从而确定最佳测试集,从而增加检测和击败数字逻辑中的硬件木马的可能性。结果还表明,防御者测试的最低特洛伊木马数量和对攻击者的罚款可以阻止理性和非理性攻击者感染特洛伊木马。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号