Examining Tradeoffs for Hardware-Based Intellectual Property Protection

نویسندگان

  • J. Todd McDonald
  • Yong C. Kim
چکیده

The ability to protect critical cyber infrastructure remains a multi-faceted problem facing both the commercial sector and the federal government. Hardware intellectual property (IP) embedded within application-specific integrated circuits and programmable logic devices are subject to adversarial analysis in the form of subversion, piracy, and reverse engineering. We consider the effect of transforming the programmatic logic or netlist definitions for such environments so that malicious adversaries are hindered or prevented from recovering original, higher level abstractions of combinational logic design. In this paper, we provide observations on obfuscating algorithms that use random and deterministic techniques to transform logic-level definitions into alternative, functionally equivalent forms. We define the tradeoff space for both types of techniques and show how limitations have driven research methods. Keywords/Key Phrases: Circuit protection, malicious reverse engineering, obfuscation, security research methodologies

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Necessity of Criminal Protection of Intellectual Property Rights with a View to its Moral Basis

Background: For several centuries, there has been a debate about the dimensions of intellectual property to support the thinkers of society and prevent their exploitation. Unfortunately, this invisible and powerful asset is increasingly vulnerable. Therefore, establishing favorable regulations, guaranteeing proper criminal enforcement and effective enforcement of laws in order to protect these ...

متن کامل

Split Manufacturing in Radio-Frequency Designs

With the globalization of integrated circuit (IC) design flow and the outsourcing of chip fabrication service, intellectual property (IP) piracy and malicious logic insertion become main security threats to tamper hardware infrastructures. While most of the protection methods are dedicated for digital circuits, we try to protect radio-frequency (RF) designs which are more likely to be IP piracy...

متن کامل

Runtime Intellectual Property Protection on Programmable Platforms

Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bit-stream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture ...

متن کامل

Chemical Engineering Software and Legal Protection Thereof

In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the                market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy.  This paper explores the ...

متن کامل

TRIPs-Plus Treaties and Strengthening Protection of Pharmaceutical Inventions

After concluding TRIPs agreement, the sphere of negotiation in respect of protecting new kinds of intellectual property rights especially pharmaceutical inventions transferred to bilateral and regional arrangements. TRIPs agreement has some flexibility to attract all countries. Industrialized countries believed that multilateral agreements protections based especially in regard of pharmaceutica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011