z-logo
open-access-imgOpen Access
GPLADD
Author(s) -
Alexander V. Outkin,
Brandon Eames,
Meghan Galiardi,
Sarah Walsh,
Eric D. Vugrin,
Byron Heersink,
Jacob Aaron Hobbs,
Gregory Dane Wyss
Publication year - 2019
Publication title -
acm transactions on privacy and security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.743
H-Index - 14
eISSN - 2471-2574
pISSN - 2471-2566
DOI - 10.1145/3326283
Subject(s) - computer science , adversary , probabilistic logic , computer security , process (computing) , constraint (computer aided design) , set (abstract data type) , artificial intelligence , engineering , mechanical engineering , programming language , operating system
Trust in a microelectronics-based system can be characterized as the level of confidence that a system is free of subversive alterations made during system development, or that the development process of a system has not been manipulated by a malicious adversary. Trust in systems has become an increasing concern over the past decade. This article presents a novel game-theoretic framework, called GPLADD (Graph-based Probabilistic Learning Attacker and Dynamic Defender), for analyzing and quantifying system trustworthiness at the end of the development process, through the analysis of risk of development-time system manipulation. GPLADD represents attacks and attacker-defender contests over time. It treats time as an explicit constraint and allows incorporating the informational asymmetries between the attacker and defender into analysis. GPLADD includes an explicit representation of attack steps via multi-step attack graphs, attacker and defender strategies, and player actions at different times. GPLADD allows quantifying the attack success probability over time and the attacker and defender costs based on their capabilities and strategies. This ability to quantify different attacks provides an input for evaluation of trust in the development process. We demonstrate GPLADD on an example attack and its variants. We develop a method for representing success probability for arbitrary attacks and derive an explicit analytic characterization of success probability for a specific attack. We present a numeric Monte Carlo study of a small set of attacks, quantify attack success probabilities, attacker and defender costs, and illustrate the options the defender has for limiting the attack success and improving trust in the development process.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom