Optimizing Programmable Logic Design Security Strategies

A wide variety of design security strategies have been developed for programmable logic devices, but less work has been done to determine which are optimal for any given design and any given security goal. To address this, we consider not only metrics related to the performance of the design securi...

Full description

Bibliographic Details
Main Author: Graf, Jonathan Peter
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2019
Subjects:
Online Access:http://hdl.handle.net/10919/89920
id ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-89920
record_format oai_dc
spelling ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-899202020-09-29T05:37:43Z Optimizing Programmable Logic Design Security Strategies Graf, Jonathan Peter Electrical and Computer Engineering Athanas, Peter M. Jones, Mark T. Patterson, Cameron D. Brown, Ezra A. Tront, Joseph G. FPGA trust design security design integrity design confidentiality trustworthy computing game theory A wide variety of design security strategies have been developed for programmable logic devices, but less work has been done to determine which are optimal for any given design and any given security goal. To address this, we consider not only metrics related to the performance of the design security practice, but also the likely action of an adversary given their goals. We concern ourselves principally with adversaries attempting to make use of hardware Trojans, although we also show that our work can be generalized to adversaries and defenders using any of a variety of microelectronics exploitation and defense strategies. Trojans are inserted by an adversary in order to accomplish an end. This goal must be considered and quantified in order to predict the adversary's likely action. Our work here builds upon a security economic approach that models the adversary and defender motives and goals in the context of empirically derived countermeasure efficacy metrics. The approach supports formation of a two-player strategic game to determine optimal strategy selection for both adversary and defender. A game may be played in a variety of contexts, including consideration of the entire design lifecycle or only a step in product development. As a demonstration of the practicality of this approach, we present an experiment that derives efficacy metrics from a set of countermeasures (defender strategies) when tested against a taxonomy of Trojans (adversary strategies). We further present a software framework, GameRunner, that automates not only the solution to the game but also enables mathematical and graphical exploration of "what if" scenarios in the context of the game. GameRunner can also issue "prescriptions," sets of commands that allow the defender to automate the application of the optimal defender strategy to their circuit of concern. We also present how this work can be extended to adjacent security domains. Finally, we include a discussion of future work to include additional software, a more advanced experimental framework, and the application of irrationality models to account for players who make subrational decisions. Doctor of Philosophy 2019-06-11T08:01:56Z 2019-06-11T08:01:56Z 2019-06-10 Dissertation vt_gsexam:20157 http://hdl.handle.net/10919/89920 In Copyright http://rightsstatements.org/vocab/InC/1.0/ ETD application/pdf Virginia Tech
collection NDLTD
format Others
sources NDLTD
topic FPGA
trust
design security
design integrity
design confidentiality
trustworthy computing
game theory
spellingShingle FPGA
trust
design security
design integrity
design confidentiality
trustworthy computing
game theory
Graf, Jonathan Peter
Optimizing Programmable Logic Design Security Strategies
description A wide variety of design security strategies have been developed for programmable logic devices, but less work has been done to determine which are optimal for any given design and any given security goal. To address this, we consider not only metrics related to the performance of the design security practice, but also the likely action of an adversary given their goals. We concern ourselves principally with adversaries attempting to make use of hardware Trojans, although we also show that our work can be generalized to adversaries and defenders using any of a variety of microelectronics exploitation and defense strategies. Trojans are inserted by an adversary in order to accomplish an end. This goal must be considered and quantified in order to predict the adversary's likely action. Our work here builds upon a security economic approach that models the adversary and defender motives and goals in the context of empirically derived countermeasure efficacy metrics. The approach supports formation of a two-player strategic game to determine optimal strategy selection for both adversary and defender. A game may be played in a variety of contexts, including consideration of the entire design lifecycle or only a step in product development. As a demonstration of the practicality of this approach, we present an experiment that derives efficacy metrics from a set of countermeasures (defender strategies) when tested against a taxonomy of Trojans (adversary strategies). We further present a software framework, GameRunner, that automates not only the solution to the game but also enables mathematical and graphical exploration of "what if" scenarios in the context of the game. GameRunner can also issue "prescriptions," sets of commands that allow the defender to automate the application of the optimal defender strategy to their circuit of concern. We also present how this work can be extended to adjacent security domains. Finally, we include a discussion of future work to include additional software, a more advanced experimental framework, and the application of irrationality models to account for players who make subrational decisions. === Doctor of Philosophy
author2 Electrical and Computer Engineering
author_facet Electrical and Computer Engineering
Graf, Jonathan Peter
author Graf, Jonathan Peter
author_sort Graf, Jonathan Peter
title Optimizing Programmable Logic Design Security Strategies
title_short Optimizing Programmable Logic Design Security Strategies
title_full Optimizing Programmable Logic Design Security Strategies
title_fullStr Optimizing Programmable Logic Design Security Strategies
title_full_unstemmed Optimizing Programmable Logic Design Security Strategies
title_sort optimizing programmable logic design security strategies
publisher Virginia Tech
publishDate 2019
url http://hdl.handle.net/10919/89920
work_keys_str_mv AT grafjonathanpeter optimizingprogrammablelogicdesignsecuritystrategies
_version_ 1719344742566723584