Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions
نویسندگان
چکیده
Intellectual property right violations are an important problem for integrated system designers. We propose a new solution for mitigating such violations, denoted as soft physical hash functions. It combines previously introduced ideas of soft hash functions (in the field of image processing) and side-channel leakage (in the field of cryptographic hardware). For this purpose, we first introduce and formalize the components of an intellectual property detection infrastructure using soft physical hash functions. Next, we discuss its advantages over previous proposals aiming at similar goals. The most important point here is that the proposed technique can be applied to already deployed products. Finally, we validate our approach with a first experimental study.
منابع مشابه
Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions
Side-channel analysis is a powerful tool to extract secret information from microelectronic devices. Its most frequently considered application is destructive, i.e. key recovery attacks against cryptographic implementations. More recently, it has also been considered constructively, in the context of intellectual property protection/detection, e.g. through the use of side-channel based watermar...
متن کاملEnhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
The use of digital marks to provide ownership (watermarking) and recipient (fingerprinting) identification for intellectual property (IP) has become widespread. However, many of these techniques require a high complexity of copy detection, are vulnerable to mark removal after revelation for ownership verification, and are susceptible to reduced mark integrity due to partial mark removal. This p...
متن کاملCryptographic Sha - 1 Hash Implementation for Intellectual Property ( Ip ) Protection Flavia
CRYPTOGRAPHIC SHA-1 HASH IMPLEMENTATION FOR INTELLECTUAL PROPERTY (IP) PROTECTION FLAVIA LEITAO, DR. AMEETA G. SINAI AMONKAR 1. ME (Microelectronics), Electronics and Telecommunication Engineering, Goa College of Engineering, Farmagudi, Goa 2. Head of the department, Electronics and Telecommunication Engineering, Goa College of Engineering, Farmagudi, Goa Accepted Date: 27/02/2014 ; Published D...
متن کاملConfigurable Ring Oscillator for FPGA Chip Identification
Hardware security and intellectual property protection have become very important for vendors. Instead of storing identification information in the device, the physical unclonable functions (PUF) are widely used for identification. There are various techniques for PUF implementations. PUFs extract secretes from physical characteristics of integrated circuits. They have the unique property of ge...
متن کاملChemical Engineering Software and Legal Protection Thereof
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy. This paper explores the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012