Active Hardware Metering for Intellectual Property Protection and Security

نویسندگان

  • Yousra Alkabani
  • Farinaz Koushanfar
چکیده

We introduce the first active hardware metering scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy and runtime tampering. The novel metering method simultaneously employs inherent unclonable variability in modern manufacturing technology, and functionality preserving alternations of the structural IC specifications. Active metering works by enabling the designers to lock each IC and to remotely disable it. The objectives are realized by adding new states and transitions to the original finite state machine (FSM) to create boosted finite state machines(BFSM) of the pertinent design. A unique and unpredictable ID generated by an IC is utilized to place an BFSM into the power-up state upon activation. The designer, knowing the transition table, is the only one who can generate input sequences required to bring the BFSM into the functional initial (reset) state. To facilitate remote disabling of ICs, black hole states are integrated within the BFSM. We introduce nine types of potential attacks against the proposed active metering method. We further describe a number of countermeasures that must be taken to preserve the security of active metering against the potential attacks. The implementation details of the method with the objectives of being low-overhead, unclonable, obfuscated, stable, while having a diverse set of keys is presented. The active metering method was implemented, synthesized and mapped on the standard benchmark circuits. Experimental evaluations illustrate that the method has a low-overhead in terms of power, delay, and area, while it is extremely resilient against the considered attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Metering: A Survey

This chapter provides the first comprehensive overview of hardware integrated circuits (IC) protection by metering. Hardware metering, or IC metering refers to mechanisms, methods, and protocols that enable tracking of the ICs post-fabrication. Metering is particularly needed in the horizontal semiconductor business model where the design houses outsource their fabrication to (mostly offshore) ...

متن کامل

A Method for Hardware Metering

In this paper we present a hardware metering method to meter or monitor legitimate use of integrated circuits embedded in a computer system. The motivation for this work comes from fabless semiconductor design business/operation model which has become very effective and popular in last few years. A fabless design house produces a design and gives it to a foundry to manufacture the final chip. O...

متن کامل

Intellectual Property Metering

We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts and copied programs. The key idea is to make each design slightly different during postprocessing phase. Therefore, if two identical hardware/software designs or a design that is not reported by the foundry are detected, the des...

متن کامل

بررسی فرآیند حمایت حقوقی از اطلاعات بالینی و آزمایشگاهی داروها در حقوق ایران، اتحادیه اروپا و ایالات متحده آمریکا

One of the most important new evidence of intellectual property that had always plenty of differences behind it regarding the protection or non-protection is the new medicine laboratory information that is presented to the competent state authority for consideration and registry. The original purpose of intellectual property is to protect all property that derives from human intellectual leakin...

متن کامل

Necessity of Criminal Protection of Intellectual Property Rights with a View to its Moral Basis

Background: For several centuries, there has been a debate about the dimensions of intellectual property to support the thinkers of society and prevent their exploitation. Unfortunately, this invisible and powerful asset is increasingly vulnerable. Therefore, establishing favorable regulations, guaranteeing proper criminal enforcement and effective enforcement of laws in order to protect these ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007