2019
DOI: 10.1007/s41635-019-00089-3
|View full text |Cite
|
Sign up to set email alerts
|

A practical application of game theory to optimize selection of hardware Trojan detection strategies

Abstract: A wide variety of Hardware Trojan countermeasures have been developed, but less work has been done to determine which are optimal for any given design. To address this, we consider not only metrics related to the performance of the countermeasure, but also the likely action of an adversary given their goals. Trojans are inserted by an adversary to accomplish an end, so these goals must be considered and quantified in order to predict these actions. The model presented here builds upon a security economic appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…A novel game model is framed in [22] to analyze the relation between the manufacturer (attacker) and the IC testing unit (defender). In this paper [23], a strategic game is modelled with two players to determine the suitable strategy for both defender and intruder. A software framework is also presented, which provides the mathematical exploration and also provides the solution of the game.…”
Section: Related Workmentioning
confidence: 99%
“…A novel game model is framed in [22] to analyze the relation between the manufacturer (attacker) and the IC testing unit (defender). In this paper [23], a strategic game is modelled with two players to determine the suitable strategy for both defender and intruder. A software framework is also presented, which provides the mathematical exploration and also provides the solution of the game.…”
Section: Related Workmentioning
confidence: 99%
“…Combined with simple logic inference, the total can be realized through analysis. Recently, lots of studies have applied the research of Game Theory to the application of deep learning [13,14] , economics [15][16][17][18][19] , and information security [20] .…”
Section: Introductionmentioning
confidence: 99%
“…Hardware security, however, suffers from a number of market failures, including information asymmetry, prisoner's dilemmas, misaligned incentives, and free riding 29 . Research has been conducted using game theory to detect and protect against hardware Trojans 30 . However, in general, the research on the economics of security investment for hardware security and trust is an undeveloped area.…”
Section: Introductionmentioning
confidence: 99%