SoC: a real platform for IP reuse, IP infringement, and IP protection
Citations
14 citations
Cites background from "SoC: a real platform for IP reuse, ..."
...Revealing the design details and physical implementations not only creates opportunities for illegal reproduction but also makes it easier for IP infringement, tampering, malicious alteration, and counterfeiting [1, 11, 28, 34]....
[...]
9 citations
Cites background or methods from "SoC: a real platform for IP reuse, ..."
...and become one of the major concern in the industry [1]....
[...]
...Reuse of already designed, optimized, and verified intellectual property (IP) cores has become the pervasive practice in SoC design industry, to meet the requirements of short design time and low design cost [1]....
[...]
...For a comprehensive review and classification of classical hardware watermarking, we refer the interested readers to [1] and [4]....
[...]
9 citations
Cites background from "SoC: a real platform for IP reuse, ..."
...encoding rules) contributing to the security of the signature are known to an attacker, it becomes ineffective, as it can easily be replicated by an attacker [24]–[26]....
[...]
...vulnerable as it can be compromised by an attacker [24]–[26]....
[...]
9 citations
5 citations
References
263 citations
"SoC: a real platform for IP reuse, ..." refers methods in this paper
...…Koushanfar 2009 [27] Y Agrawal et al. 2007 [28] Y Y Cui et al. 2008 [29] Y Lach et al. 2001 [30] Y Y Gu et al. 2009 [31] Y Li and Lach 2008 [32] Y Y Potkonjak et al. 2009 [33] Y Wei et al. 2010 [34] Y Dutt and Li 2009 [35] Y Y Potkonjak 2010 [36] Y needs wider space for mark insertion compared to…...
[...]
...Among the trojan detection techniques based on gatelevel characterization (GLC), [33] characterizes gates using physical properties specifically leakage current....
[...]
234 citations
"SoC: a real platform for IP reuse, ..." refers background in this paper
...…[20] Y Suzuki et al. 2004 [21] Y Deng et al. 2009 [23] Y Y Castillo et al. 2007 [24] Y Abdel-Hamid et al. 2005 [25] Y Saha and Sur-Kolay 2010 [26] Y Majzoobi and Koushanfar 2009 [27] Y Agrawal et al. 2007 [28] Y Y Cui et al. 2008 [29] Y Lach et al. 2001 [30] Y Y Gu et al. 2009 [31] Y Li and Lach…...
[...]
...(iv) Physically unclonable functions (PUFs) [27] authenticate each IC instance by leveraging manufacturing variability of each fabricated IC, based on a nonfunctional characteristics such as delay or power....
[...]
220 citations
"SoC: a real platform for IP reuse, ..." refers background or methods in this paper
...Illegal copies of an IP are generated due to intentional reselling of a firm/hard IP or fabrication of additional ICs in foundry [7, 8]....
[...]
...Signature embedded by applying constraints in place/ route phase of physical design [8] or through incremental router [37] cannot be verified from an IC fabricated from that marked design....
[...]
...(c) The technique should be robust against typical attacks like tampering, finding ghost signatures, additive attack [8], as well as resilient in the design flow....
[...]
194 citations
123 citations
"SoC: a real platform for IP reuse, ..." refers background in this paper
...…and Bhunia 2009 [18] Y Y Granado-Criado et al. 2010 [19] Y Dyka and Langendoerfer 2005 [20] Y Suzuki et al. 2004 [21] Y Deng et al. 2009 [23] Y Y Castillo et al. 2007 [24] Y Abdel-Hamid et al. 2005 [25] Y Saha and Sur-Kolay 2010 [26] Y Majzoobi and Koushanfar 2009 [27] Y Agrawal et al. 2007…...
[...]
...(i) Signature of IP vendor, that is, watermark, may be hosted into nonused cells of memory structure described in HDL [24]....
[...]
...If an IP remains in electronic form, it is either a circuit description in hardware description language, that is, HDL (soft IP), may be any form of netlist, placed and routed design (firm IP), or design layout (hard IP); otherwise, it remains as hardware chip constituting a hardware IP core....
[...]