skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: GPLADD: Quantifying Trust in Government and Commercial Systems A Game-Theoretic Approach

Journal Article · · ACM Transactions on Privacy and Security
DOI:https://doi.org/10.1145/3326283· OSTI ID:1575267
 [1];  [1];  [1];  [2];  [1];  [3];  [1];  [1]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
  2. Georgia Inst. of Technology, Atlanta, GA (United States)
  3. The Ohio State Univ., Columbus, OH (United States)

Trust in a microelectronics-based system can be characterized as the level of confidence that a system is free of subversive alterations made during system development, or that the development process of a system has not been manipulated by a malicious adversary. Trust in systems has become an increasing concern over the past decade. This report introduces a novel game-theoretic framework, called GPLADD (Graph-based Probabilistic Learning Attacker and Dynamic Defender), for analyzing and quantifying system trustworthiness at the end of the development process, through the analysis of risk of development-time system manipulation. GPLADD represents attacks and attacker-defender contests over time. Here, time is an explicit constraint and allows incorporating the informational asymmetries between the attacker and defender into analysis. GPLADD includes an explicit representation of attack steps via multi-step attack graphs, attacker and defender strategies, and player actions at different times. GPLADD allows quantifying the attack success probability over time and the attacker and defender costs based on their capabilities and strategies. This ability to quantify different attacks provides an input for evaluation of trust in the development process. We demonstrate GPLADD on an example attack and its variants. We develop a method for representing success probability for arbitrary attacks and derive an explicit analytic characterization of success probability for a specific attack. We present a numeric Monte Carlo study of a small set of attacks, quantify attack success probabilities, attacker and defender costs, and illustrate the options the defender has for limiting the attack success and improving trust in the development process.

Research Organization:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE National Nuclear Security Administration (NNSA)
Grant/Contract Number:
AC04-94AL85000
OSTI ID:
1575267
Report Number(s):
SAND-2019-4521J; 674919
Journal Information:
ACM Transactions on Privacy and Security, Vol. 22, Issue 3; ISSN 2471-2566
Publisher:
American Chemical Society (ACS)Copyright Statement
Country of Publication:
United States
Language:
English
Citation Metrics:
Cited by: 3 works
Citation information provided by
Web of Science

References (17)

Modeling Modern Network Attacks and Countermeasures Using Attack Graphs conference December 2009
Dynamic Security Risk Management Using Bayesian Attack Graphs journal January 2012
Game theory for security: Key algorithmic principles, deployed systems, lessons learned conference October 2012
Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream journal April 2013
A Hardware Threat Modeling Concept for Trustable Integrated Circuits conference April 2007
Trust games: How game theory can guide the development of hardware Trojan detection methods conference May 2016
Attack net penetration testing conference January 2000
Trojan Detection using IC Fingerprinting conference May 2007
The Hunt For The Kill Switch journal May 2008
A Large-Scale Study of the Time Required to Compromise a Computer System journal January 2014
A Survey of Game Theory as Applied to Network Security conference January 2010
A Survey on Systems Security Metrics journal December 2016
The Trojan-proof chip journal February 2015
Risk-based cost-benefit analysis for security assessment problems
  • Wyss, Gregory D.; Clem, John F.; Darby, John L.
  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST), 44th Annual 2010 IEEE International Carnahan Conference on Security Technology https://doi.org/10.1109/CCST.2010.5678687
conference October 2010
A Game-Theoretic Approach for Testing for Hardware Trojans journal July 2016
Attack Modeling for Information Security and Survivability text January 2018
Attack Modeling for Information Security and Survivability text January 2001

Figures / Tables (16)