Active IC Metering through Self-Protection

碩士 === 國立臺灣大學 === 電子工程學研究所 === 97 === In designing an integrated circuit (IC), many design decisions are known only to its designers. These decisions can be exploited for inexpensive and secure design protection. Under this principle, we propose an active IC metering scheme to protect intellectual p...

Full description

Bibliographic Details
Main Authors: Chia-Chao Kan, 甘家兆
Other Authors: Jie-Hong Jiang
Format: Others
Language:en_US
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/28467278332481542589
id ndltd-TW-097NTU05428047
record_format oai_dc
spelling ndltd-TW-097NTU054280472016-05-04T04:31:31Z http://ndltd.ncl.edu.tw/handle/28467278332481542589 Active IC Metering through Self-Protection 以自我防護機制為基礎的主動式積體電路量測技術 Chia-Chao Kan 甘家兆 碩士 國立臺灣大學 電子工程學研究所 97 In designing an integrated circuit (IC), many design decisions are known only to its designers. These decisions can be exploited for inexpensive and secure design protection. Under this principle, we propose an active IC metering scheme to protect intellectual properties (IPs) against unauthorized use and reverse engineering. It may benefit both IP vendors and IC design houses. Rather than inserting an encryption/decryption or obfuscation circuit into a design as suggested by prior work, we exploit existing components for secure protection. Our methodology admits minimal perturbation to the design flow, such as verification and testing. The feasibility of our protection relies on the existence of a universally reachable state (URS) of an induced circuit of the protected design. Our method is complete and suitable for all synchronous sequential designs. By embedding a hardware component called an image restrictor, a design which does not have a URS can be made protectable. Experiments show that, without introducing image restrictors, still all of the ISCAS and ITC benchmark circuits are protectable under our method with negligible overheads. Jie-Hong Jiang 江介宏 2009 學位論文 ; thesis 72 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 電子工程學研究所 === 97 === In designing an integrated circuit (IC), many design decisions are known only to its designers. These decisions can be exploited for inexpensive and secure design protection. Under this principle, we propose an active IC metering scheme to protect intellectual properties (IPs) against unauthorized use and reverse engineering. It may benefit both IP vendors and IC design houses. Rather than inserting an encryption/decryption or obfuscation circuit into a design as suggested by prior work, we exploit existing components for secure protection. Our methodology admits minimal perturbation to the design flow, such as verification and testing. The feasibility of our protection relies on the existence of a universally reachable state (URS) of an induced circuit of the protected design. Our method is complete and suitable for all synchronous sequential designs. By embedding a hardware component called an image restrictor, a design which does not have a URS can be made protectable. Experiments show that, without introducing image restrictors, still all of the ISCAS and ITC benchmark circuits are protectable under our method with negligible overheads.
author2 Jie-Hong Jiang
author_facet Jie-Hong Jiang
Chia-Chao Kan
甘家兆
author Chia-Chao Kan
甘家兆
spellingShingle Chia-Chao Kan
甘家兆
Active IC Metering through Self-Protection
author_sort Chia-Chao Kan
title Active IC Metering through Self-Protection
title_short Active IC Metering through Self-Protection
title_full Active IC Metering through Self-Protection
title_fullStr Active IC Metering through Self-Protection
title_full_unstemmed Active IC Metering through Self-Protection
title_sort active ic metering through self-protection
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/28467278332481542589
work_keys_str_mv AT chiachaokan activeicmeteringthroughselfprotection
AT gānjiāzhào activeicmeteringthroughselfprotection
AT chiachaokan yǐzìwǒfánghùjīzhìwèijīchǔdezhǔdòngshìjītǐdiànlùliàngcèjìshù
AT gānjiāzhào yǐzìwǒfánghùjīzhìwèijīchǔdezhǔdòngshìjītǐdiànlùliàngcèjìshù
_version_ 1718259466564009984