Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

نویسندگان

  • François Durvaux
  • Benoît Gérard
  • Stéphanie Kerckhof
  • François Koeune
  • François-Xavier Standaert
چکیده

Intellectual property right violations are an important problem for integrated system designers. We propose a new solution for mitigating such violations, denoted as soft physical hash functions. It combines previously introduced ideas of soft hash functions (in the field of image processing) and side-channel leakage (in the field of cryptographic hardware). For this purpose, we first introduce and formalize the components of an intellectual property detection infrastructure using soft physical hash functions. Next, we discuss its advantages over previous proposals aiming at similar goals. The most important point here is that the proposed technique can be applied to already deployed products. Finally, we validate our approach with a first experimental study.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions

Side-channel analysis is a powerful tool to extract secret information from microelectronic devices. Its most frequently considered application is destructive, i.e. key recovery attacks against cryptographic implementations. More recently, it has also been considered constructively, in the context of intellectual property protection/detection, e.g. through the use of side-channel based watermar...

متن کامل

Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware

The use of digital marks to provide ownership (watermarking) and recipient (fingerprinting) identification for intellectual property (IP) has become widespread. However, many of these techniques require a high complexity of copy detection, are vulnerable to mark removal after revelation for ownership verification, and are susceptible to reduced mark integrity due to partial mark removal. This p...

متن کامل

Cryptographic Sha - 1 Hash Implementation for Intellectual Property ( Ip ) Protection Flavia

CRYPTOGRAPHIC SHA-1 HASH IMPLEMENTATION FOR INTELLECTUAL PROPERTY (IP) PROTECTION FLAVIA LEITAO, DR. AMEETA G. SINAI AMONKAR 1. ME (Microelectronics), Electronics and Telecommunication Engineering, Goa College of Engineering, Farmagudi, Goa 2. Head of the department, Electronics and Telecommunication Engineering, Goa College of Engineering, Farmagudi, Goa Accepted Date: 27/02/2014 ; Published D...

متن کامل

Configurable Ring Oscillator for FPGA Chip Identification

Hardware security and intellectual property protection have become very important for vendors. Instead of storing identification information in the device, the physical unclonable functions (PUF) are widely used for identification. There are various techniques for PUF implementations. PUFs extract secretes from physical characteristics of integrated circuits. They have the unique property of ge...

متن کامل

Chemical Engineering Software and Legal Protection Thereof

In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the                market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy.  This paper explores the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012