Active IC Metering through Self-Protection
碩士 === 國立臺灣大學 === 電子工程學研究所 === 97 === In designing an integrated circuit (IC), many design decisions are known only to its designers. These decisions can be exploited for inexpensive and secure design protection. Under this principle, we propose an active IC metering scheme to protect intellectual p...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/28467278332481542589 |
id |
ndltd-TW-097NTU05428047 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NTU054280472016-05-04T04:31:31Z http://ndltd.ncl.edu.tw/handle/28467278332481542589 Active IC Metering through Self-Protection 以自我防護機制為基礎的主動式積體電路量測技術 Chia-Chao Kan 甘家兆 碩士 國立臺灣大學 電子工程學研究所 97 In designing an integrated circuit (IC), many design decisions are known only to its designers. These decisions can be exploited for inexpensive and secure design protection. Under this principle, we propose an active IC metering scheme to protect intellectual properties (IPs) against unauthorized use and reverse engineering. It may benefit both IP vendors and IC design houses. Rather than inserting an encryption/decryption or obfuscation circuit into a design as suggested by prior work, we exploit existing components for secure protection. Our methodology admits minimal perturbation to the design flow, such as verification and testing. The feasibility of our protection relies on the existence of a universally reachable state (URS) of an induced circuit of the protected design. Our method is complete and suitable for all synchronous sequential designs. By embedding a hardware component called an image restrictor, a design which does not have a URS can be made protectable. Experiments show that, without introducing image restrictors, still all of the ISCAS and ITC benchmark circuits are protectable under our method with negligible overheads. Jie-Hong Jiang 江介宏 2009 學位論文 ; thesis 72 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電子工程學研究所 === 97 === In designing an integrated circuit (IC), many design decisions are known only to its designers. These decisions can be exploited for inexpensive and secure design protection. Under this principle, we propose an active IC metering scheme to protect intellectual properties (IPs) against unauthorized use and reverse engineering. It may benefit both IP vendors and IC design houses.
Rather than inserting an encryption/decryption or obfuscation circuit into a design as suggested by prior work, we exploit existing components for secure protection. Our methodology admits minimal perturbation to the design flow, such as verification and testing. The feasibility of our protection relies on the existence of a universally reachable state (URS) of an induced circuit of the protected design. Our method is complete and suitable for all synchronous sequential designs. By embedding a hardware component called an image restrictor, a design which does not have a URS can be made protectable. Experiments show that, without introducing image restrictors, still all of the ISCAS and ITC benchmark circuits are protectable under our method with negligible overheads.
|
author2 |
Jie-Hong Jiang |
author_facet |
Jie-Hong Jiang Chia-Chao Kan 甘家兆 |
author |
Chia-Chao Kan 甘家兆 |
spellingShingle |
Chia-Chao Kan 甘家兆 Active IC Metering through Self-Protection |
author_sort |
Chia-Chao Kan |
title |
Active IC Metering through Self-Protection |
title_short |
Active IC Metering through Self-Protection |
title_full |
Active IC Metering through Self-Protection |
title_fullStr |
Active IC Metering through Self-Protection |
title_full_unstemmed |
Active IC Metering through Self-Protection |
title_sort |
active ic metering through self-protection |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/28467278332481542589 |
work_keys_str_mv |
AT chiachaokan activeicmeteringthroughselfprotection AT gānjiāzhào activeicmeteringthroughselfprotection AT chiachaokan yǐzìwǒfánghùjīzhìwèijīchǔdezhǔdòngshìjītǐdiànlùliàngcèjìshù AT gānjiāzhào yǐzìwǒfánghùjīzhìwèijīchǔdezhǔdòngshìjītǐdiànlùliàngcèjìshù |
_version_ |
1718259466564009984 |