Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense
نویسندگان
چکیده
منابع مشابه
Network Attack Defense Awareness based on Dynamic Game
By defining attack-defense action sequence and utility function of both sides, combine with dynamic Bayes game theory to analyze the confrontation and interdependence between the two agents’ strategies. Dynamic Bayes attack-defense game model can describe each possible strategy in every stage. This paper proposes the construction method of game extensive form by utilizing attack-defense confron...
متن کاملA survey of hardware Trojan threat and defense
Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic losses and great harm to society. Therefore, it is very important to analyze the specific HT threats existing in the whole life cycle of integrated circuits (ICs), and perform protection against hardwar...
متن کاملTrojan horse strategy in Agrobacterium transformation: abusing MAPK defense signaling.
Nuclear import of transfer DNA (T-DNA) is a central event in Agrobacterium transformation of plant cells and is thought to occur by the hijacking of certain host cell proteins. The T-DNA-associated virulence protein VirE2 mediates this process by binding to the nuclear import machinery via the host cell factor VIP1, whose role in plants has been so far unknown. Here we show that VIP1 is a trans...
متن کاملdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولHardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3040395