2020
DOI: 10.36227/techrxiv.12556253.v2
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory

Abstract: In recent years, integrated circuits (ICs) have become<br>significant for various industries and their security has<br>been given greater priority, specifically in the supply chain.<br>Budgetary constraints have compelled IC designers to offshore manufacturing to third-party companies. When the designer gets the manufactured ICs back, it is imperative to test for potential threats like hardware trojans (HT). In this paper, a novel multilevel game-theoretic framework is introduced to analyze t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Other works in literature have studied the privacy, under possible attacks, by analyzing the interactions between the sharing organizations and the attacker using game theory [24]. Game theory is a powerful mathematical framework that enables to study the interactions between different decision makers and that is widely used in many security domains [25], [26], [27]. Similarly, game theory has been recently used to preserve the privacy of shared data [28], [29], [30].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Other works in literature have studied the privacy, under possible attacks, by analyzing the interactions between the sharing organizations and the attacker using game theory [24]. Game theory is a powerful mathematical framework that enables to study the interactions between different decision makers and that is widely used in many security domains [25], [26], [27]. Similarly, game theory has been recently used to preserve the privacy of shared data [28], [29], [30].…”
Section: Related Workmentioning
confidence: 99%
“…where 1 is the indicator function which equals 1 in case of unsuccessful attack and equals 0 if the attack was successful. Following (25), the coefficient of trust will equal half of the value in the previous step if an attack was successful. On the other hand, if an attack was blocked by the common platform, the coefficient of trust will be the average of the previous value and 1.…”
Section: Dynamic Game Solutionmentioning
confidence: 99%
See 1 more Smart Citation