Examining Tradeoffs for Hardware-Based Intellectual Property Protection
نویسندگان
چکیده
The ability to protect critical cyber infrastructure remains a multi-faceted problem facing both the commercial sector and the federal government. Hardware intellectual property (IP) embedded within application-specific integrated circuits and programmable logic devices are subject to adversarial analysis in the form of subversion, piracy, and reverse engineering. We consider the effect of transforming the programmatic logic or netlist definitions for such environments so that malicious adversaries are hindered or prevented from recovering original, higher level abstractions of combinational logic design. In this paper, we provide observations on obfuscating algorithms that use random and deterministic techniques to transform logic-level definitions into alternative, functionally equivalent forms. We define the tradeoff space for both types of techniques and show how limitations have driven research methods. Keywords/Key Phrases: Circuit protection, malicious reverse engineering, obfuscation, security research methodologies
منابع مشابه
Necessity of Criminal Protection of Intellectual Property Rights with a View to its Moral Basis
Background: For several centuries, there has been a debate about the dimensions of intellectual property to support the thinkers of society and prevent their exploitation. Unfortunately, this invisible and powerful asset is increasingly vulnerable. Therefore, establishing favorable regulations, guaranteeing proper criminal enforcement and effective enforcement of laws in order to protect these ...
متن کاملSplit Manufacturing in Radio-Frequency Designs
With the globalization of integrated circuit (IC) design flow and the outsourcing of chip fabrication service, intellectual property (IP) piracy and malicious logic insertion become main security threats to tamper hardware infrastructures. While most of the protection methods are dedicated for digital circuits, we try to protect radio-frequency (RF) designs which are more likely to be IP piracy...
متن کاملRuntime Intellectual Property Protection on Programmable Platforms
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bit-stream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture ...
متن کاملChemical Engineering Software and Legal Protection Thereof
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy. This paper explores the ...
متن کاملTRIPs-Plus Treaties and Strengthening Protection of Pharmaceutical Inventions
After concluding TRIPs agreement, the sphere of negotiation in respect of protecting new kinds of intellectual property rights especially pharmaceutical inventions transferred to bilateral and regional arrangements. TRIPs agreement has some flexibility to attract all countries. Industrialized countries believed that multilateral agreements protections based especially in regard of pharmaceutica...
متن کامل