网络与信息安全学报 (Aug 2024)

Modeling and security analysis of hardware trojan attack based on GSCPN

  • Bo MEI, Wei GUO, Zhipeng CAO, Peijie LI, Wenbo ZHANG

DOI
https://doi.org/10.11959/j.issn.2096-109x.2024054
Journal volume & issue
Vol. 10, no. 4
pp. 72 – 84

Abstract

Read online

Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack and security assessment model based on the generalized stochastic coloring Petri net (GSCPN) was proposed. The GSCPN model representing the HT attack of a single basic unit was constructed, founded on the temporal relationship between HT attack behaviors and the states of a single basic unit. A general method for constructing the GSCPN model of HT attack for the entire system was provided, based on the communication dependency relationships between the basic units during the system’s operational state. The analytical solution of the Markov chain isomorphous to the GSCPN model was derived, alongside the simulation solution achieved using the Monte Carlo simulation method. The discrepancy between the two methods was a mere 0.00183, which verified the precision of the modeling approach. The security of the system under various scenarios was analyzed through a straightforward case study. The experimental results indicate that the intensity of the HT attack, HT recovery time, and task execution time all exert varying degrees of influence on system security.

Keywords