Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Preprints are manuscripts made publicly available before they have been submitted for formal peer review and publication. They might contain new research findings or data. Preprints can be a draft or final version of an author's research but must not have been accepted for publication at the time of submission.
significant for various industries and their security has
been given greater priority, specifically in the supply chain.
Budgetary constraints have compelled IC designers to offshore manufacturing to third-party companies. When the designer gets the manufactured ICs back, it is imperative to test for potential threats like hardware trojans (HT). In this paper, a novel multilevel game-theoretic framework is introduced to analyze the interactions between a malicious IC manufacturer and the tester. In particular, the game is formulated as a non-cooperative, zerosum, repeated game using prospect theory (PT) that captures different players’ rationalities under uncertainty. The repeated game is separated into a learning stage, in which the defender
Longitudinal Injection of Interdisciplinary Cybersecurity Awareness into Engineering Curricula
Directorate for Education & Human ResourcesFind out more...