Difference between revisions of "Koushanfar2012"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 7: Line 7:
|abstract=<p>\&mdash;In the horizontal semiconductor business model where the designer\&rsquo;s intellectual property (IP) is transparent to foundry and to other entities on the production chain, integrated circuits (ICs) overbuilding and IP piracy are prevalent problems. Active metering is a suite of methods enabling the designers to control their chips postfabrication. We provide a comprehensive description of the first known active hardware metering method and introduce new formal security proofs. The active metering method uniquely and automatically locks each IC upon manufacturing, such that the IP rights owner is the only entity that can provide the specific key to unlock or otherwise control each chip. The IC control mechanism exploits: 1) the functional description of the design, and 2) unique and unclonable IC identifiers. The locks are embedded by modifying the structure of the hardware computation model, in the form of a finite state machine (FSM). We show that for each IC hiding the locking states within the modified FSM structure can be constructed as an instance of a general output multipoint function that can be provably efficiently obfuscated. The hidden locks within the FSM may also be used for remote enabling and disabling of chips by the IP rights owner during the IC\&rsquo;s normal operation. An automatic synthesis method for low overhead hardware implementation is devised. Attacks and countermeasures are addressed. Experimental evaluations demonstrate the low overhead of the method. Proof-of-concept implementation on the H.264 MPEG decoder automatically synthesized on a Xilinix Virtex-5 field-programmable gate array (FPGA) further shows the practicality, security, and the low overhead of the new method.</p>
|abstract=<p>\&mdash;In the horizontal semiconductor business model where the designer\&rsquo;s intellectual property (IP) is transparent to foundry and to other entities on the production chain, integrated circuits (ICs) overbuilding and IP piracy are prevalent problems. Active metering is a suite of methods enabling the designers to control their chips postfabrication. We provide a comprehensive description of the first known active hardware metering method and introduce new formal security proofs. The active metering method uniquely and automatically locks each IC upon manufacturing, such that the IP rights owner is the only entity that can provide the specific key to unlock or otherwise control each chip. The IC control mechanism exploits: 1) the functional description of the design, and 2) unique and unclonable IC identifiers. The locks are embedded by modifying the structure of the hardware computation model, in the form of a finite state machine (FSM). We show that for each IC hiding the locking states within the modified FSM structure can be constructed as an instance of a general output multipoint function that can be provably efficiently obfuscated. The hidden locks within the FSM may also be used for remote enabling and disabling of chips by the IP rights owner during the IC\&rsquo;s normal operation. An automatic synthesis method for low overhead hardware implementation is devised. Attacks and countermeasures are addressed. Experimental evaluations demonstrate the low overhead of the method. Proof-of-concept implementation on the H.264 MPEG decoder automatically synthesized on a Xilinix Virtex-5 field-programmable gate array (FPGA) further shows the practicality, security, and the low overhead of the new method.</p>
|pages=51-63
|pages=51-63
|month=2
|year=2012
|volume=7
|volume=7
|journal=IEEE Transactions on Information Forensics and Security
|journal=IEEE Transactions on Information Forensics and Security
|title=Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management
|title=Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management
|entry=article
|entry=article
|date=2012-2/-01
|pdf=Koushanfar2012.pdf
}}
}}

Latest revision as of 18:36, 9 November 2021

Koushanfar2012
entryarticle
address
annote
authorFarinaz Koushanfar
booktitle
chapter
edition
editor
howpublished
institution
journalIEEE Transactions on Information Forensics and Security
month2
note
number
organization
pages51-63
publisher
school
series
titleProvably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management
type
volume7
year2012
doi10.1109/TIFS.2011.2163307
issn1556-6021
isbn
urlhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5966342
pdfKoushanfar2012.pdf

File:Koushanfar2012.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093