Abstract
Rescuing Hardware from malware attacks is a great challenge today. Moreover detecting the presence of malicious intrusion using low-cost techniques is very challenging especially when it is believed that hardware Trojans are integrated into the rarely excited nodes. Though logical testing is admitted to be the accurate way to check the functional correctness of the circuit, the method becomes inefficient for circuits requiring humongous number of test patterns to activate the hardware trojan. This paper proposes a probabilistic approach to generate a set of test patterns that activate the Trojan explicitly by observing the incorrect responses to the applied test patterns. Our experimental result in ISCAS’85 benchmark circuits show that the test patterns generated by our approach enclose all nets where there is a high chance for trojan insertion. We stress that though our results are circuit specific, the proposed approach is generic and hence it can be applied to any digital circuit. In fact, we demonstrate that for the C880 circuit, our approach requires only 217 inputs to be tested whereas the naive approach needs 260 test patterns. In addition to the experimental results, we use a game-theoretic framework to show the effectiveness of our approach in generating trojan activating test patterns compared to naive and ATPG testing process.
Similar content being viewed by others
References
Banga M, Hsiao MS (2009) A novel sustained vector technique for the detection of hardware trojans. In: 2009 22nd International Conference on VLSI Design. pp. 327–332
Becker GT, Regazzoni F, Paar C, Burleson WP (2013) Stealthy dopant-level hardware trojans. In: Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th In- ternational Workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. pp 197–214, https://doi.org/10.1007/978-3-642-40349-1\_12
Chakraborty RS, Bhunia S (2009) Security against hardware trojan through a novel appli- cation of design obfuscation. In: Proceedings of the 2009 International Conference on Computer-Aided Design. p. 113–116. ICCAD ‘09. Association for Computing Machinery, New York. https://doi.org/10.1145/1687399.1687424
Chakraborty RS, Bhunia S (2009) Security against hardware trojan through a novel application of design obfuscation. In: 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers. pp 113–116
Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) Mero: a statistical approach for hardware trojan detection. In: cryptographic hardware and embedded systems - CHES 2009. Springer, Berlin Heidelberg, pp 396–410
Dhar T, Roy S, Giri C (2019) Hardware trojan detection by stimulating transitions in rare nets. pp 537–538
Graf J (2016) Trust games: How game theory can guide the development of hardware trojan detection methods. In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 91–96
Graf J, Batchelor W, Harper S, Marlow R, Carlisle E, Athanas P (2019) A practical application of game theory to optimize selection of hardware trojan detection strategies. Journal of Hardware and Systems Security
Kamhoua C, Zhao H, Rodriguez M, Kwiat K (2016) A game-theoretic approach for test- ing for hardware trojans. IEEE Transactions on Multi-Scale Computing Systems 2, 1–1
Kasper M, Moradi A, Becker GT, Mischke O, Güneysu T, Paar C, Burleson W (2012) Side channels as building blocks. J Cryptogr Eng 2(3):143–159. https://doi.org/10.1007/s13389-012-0040-4
Kwiat K (2018) Strategically managing the risk of hardware trojans through augmented testing
Myerson R (1997) Game theory: analysis of con ict. Harvard University Press, https://books.google.co.in/books?id=E8WQFRCsNr0C
Narahari Y (2014) Game theory and Mechanism Design World Scientific / Indian Inst of Science, India, doi:10.1142/8902, https://www.worldscientific. com/worldscibooks/10.1142/8902
Saad W, Sanjab A, Wang Y, Kamhoua CA, Kwiat KA (2017) Hardware trojan detec- tion game: a prospect-theoretic approach. IEEE Trans Veh Technol 66(9):7697–7710
Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hard-ware trojan detection and reducing trojan activation time. Very Large Scale Integration (VLSI) Systems. IEEE Transactions on 20, 112–125
Savani R, von Stengel B (2014) Game theory explorer - software for the applied game theorist. Computation Manag Sci 12
Savani R, von Stengel B (2014) Game theory explorer - software for the applied game theorist. CoRR abs/1403.3969, http://arxiv.org/abs/1403.3969
Smith A, Mayo J, Kammler V, Armstrong R, Vorobeychik Y (2017) Using computa- tional game theory to guide verification and security in hardware designs. pp 110–115
Waksman A, Suozzo M, Sethumadhavan S (2013) Fanci: Identification of stealthy malicious logic using boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. p. 697–708. CCS ‘13. Association for Computing Machinery, New York. https://doi.org/10.1145/2508859.2516654
Wang X, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in se- cure hardware: Challenges and solutions. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust. pp 15–19
Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards trojan-free trustedics: Problem analysis and detection scheme. In: 2008 Design, Automation and Test in Europe pp 1362–1365
Author information
Authors and Affiliations
Corresponding author
Additional information
Responsible Editor: C. A. Papachristou
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
APPENDIX A
APPENDIX A
1.1 Important Deftnitions in Game Theory
In this section we give a preliminary background on game theory. We briefly describe zero- sum game, types of strategies, payoffs, solution concepts. We always assume that the players are rational who would like to maximize their payoffs.
Game Theory is an approach that helps in decision making. The decision making can be made with respect to the situations viz., Deterministic situation, Probabilistic situation and uncertainty situation. The terminologies used in Game Theory for decision making are players, who are involved in the game and the strategy, which is a course of action taken by the players. The strategy chosen may be pure or mixed strategy. A pure strategy is if the player selects only one strategy and ignores rest of the strategies, where the sum of the probability is one. A mixed strategy is if a player follows more than one strategy and the probability of selection of individual strategy is less than 1. Because the player will select more than 1 strategy and the sum of the total probability is 1 where each probability value will be less than 1. An example for Pure strategy is given in the below Table 8, where the player has chosen the second strategy and sum of the probabilities is 1 (0+1+0 = 1).
An example for Mixed strategy is given in Table 9, where the sum of probabilities is 1 (0.65 + 0.35 + 0 = 1)
Payoff matrix is a matrix in which the players are involved and the matrix is formed as in Figs. 6, 7 and 9 based on number of players and the strategy they choose with the payoff. The elements filled in the matrix are with respect to the outcome of different combinations. For an instance, let us consider a matrix where two players are involved and the matrix elements are fill with the payoff value
Here the payoff values of the players are filed with respect to their utilized of resources based on which a probabilistic calculation can be taken place in order to determine the gain or loss of the players. If the outcome is positive then it is the player A’s loss and player B’s gain. In the above matrix the strategic outcome value -40 indicates that it’s the player A’s loss and player B gained.
Principles in Game Theory: There are two different principles in Game Theory, they are maxmin and minmax. The term maxmin means to maximize the minimum guaranteed gain of the player. The term minmax means to minimize the maximum losses. When the maxmin value is equal to minmax value then it is known as Saddle point.
Value of the game is the value of the cell at the saddle point. Zero sum game is when the gain of player A is equal to the loss of player B. An example for the game with pure strategy to find the ameliorated strategies of the players is clearly derived in the following game. Let us consider a game with two players. The below matrix shown in Fig. 10 is formed where each elements of the matrix are filled with the payoff values.
-
Step 1:
To find the row minimum and the column maximum followed by finding the maxmin and minmax values as shown in Fig. 8
Since maxmin value is equal to minmax value, the value 45 is the saddle point.
-
Step 2:
To find the maxmin and minmax values (45,45). Player A maxmin value of player A denotes to maximize his gain. Player B minmax value of player B denotes to minimize his loss. Therefore, the value of the game (v) is 45. The optimal probability of Player A and player B is,
A mixed strategic game theory with no saddle point or maxmin point considers the following payoff matrix with respect to player A and B. The way to solve it optimally with an instance is given below,
7ƒ = 9 (max min = min max). Hence no saddle point and the strategy analyzed is a mixed strategy in Game Theory. Step 1: Find the oddments for row and column.
Step 2: Find the probability. By using oddments,
By applying probability formula,
Step 3: Find the value of the game (v). Take 1st column value (9, 5) and oddments of 1st and 2nd row (6,2).
Alternatives
or
or
Hence, The strategies of player A = (3/4 , 1/4). The strategies of player B = (1/2 , 1/2). Value of game (v) = 8
To Summarize, Game Theory is a strategic mathematical model of play which can be a non co-operative or a co-operative game between intelligent rational players or decision- makers. Game Theory is a versatile approach that can be applied in any domain where decision making plays a vital role. Game theory originally addressed zero-sum gaming which means the gain of one player will be the loss of other player. Then arrived the co-operative and non-co-operative game of rational and irrational players. A game is considered to be cooperative if the players are enforced externally to a form binding commitments. A game is non-cooperative if the players cannot accord. Cooperative games are analysed through the cooperative game theoretic framework, which focuses on the prediction of affiliation resulting in the collective payoffs. The players’ actions and payoffs can be analysed through Nash equilibrium.
Nash equilibrium in game theory is a concept of evolving solutions for a non-cooperative game involving two or more players in which each player will tend to know the equilibrium strategies of the other players, and no player has anything to gain by changing only their own strategy. If each player has chosen a strategy and no player can benefit by changing strategies while the other players keep theirs unchanged, then the current set of strategy choices and the corresponding payoffs constitutes Nash equilibrium. The Nash equilibrium is one of the foundational concepts in game theory. The reality of the Nash equilibrium of a game can be tested experimentally.
Rights and permissions
About this article
Cite this article
Manivannan, S., Kuppusamy, L. & Babu, N.S.C. TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis. J Electron Test 36, 607–616 (2020). https://doi.org/10.1007/s10836-020-05907-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10836-020-05907-z