Difference between revisions of "Koushanfar2010provably"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 3: Line 3:
|url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115
|url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115
|abstract=<p>This paper presents a provably secure method for embedding multiple watermarks in sequential designs. A number of different watermarks signed with the IP owner\&$\#$39;s secret key from a public key cryptography system are generated. The owner\&$\#$39;s watermarks are then dissembled into the states and transitions of the original sequential design. Hiding the multiple watermarks in the states and transitions is shown to be an instance of obfuscating a multi-point function with a generalized output. We draw on the theoretical cryptographic results of provable obfuscation of this function family to build a secure sequential multi-watermark system by construction. An iterative synthesis method for integrating the collection of watermarks to the original design is introduced. Analysis of watermark properties and the attack resiliency of the new multiple watermarking construction is presented. Experimental evaluations on benchmark circuits demonstrate practicality and low overhead of the new provably secure multiple watermarks construction method.</p>
|abstract=<p>This paper presents a provably secure method for embedding multiple watermarks in sequential designs. A number of different watermarks signed with the IP owner\&$\#$39;s secret key from a public key cryptography system are generated. The owner\&$\#$39;s watermarks are then dissembled into the states and transitions of the original sequential design. Hiding the multiple watermarks in the states and transitions is shown to be an instance of obfuscating a multi-point function with a generalized output. We draw on the theoretical cryptographic results of provable obfuscation of this function family to build a secure sequential multi-watermark system by construction. An iterative synthesis method for integrating the collection of watermarks to the original design is introduced. Analysis of watermark properties and the attack resiliency of the new multiple watermarking construction is presented. Experimental evaluations on benchmark circuits demonstrate practicality and low overhead of the new provably secure multiple watermarks construction method.</p>
|month=6
|year=2010
|booktitle=International Symposium on Hardware-Oriented Security and Trust (HOST)
|booktitle=International Symposium on Hardware-Oriented Security and Trust (HOST)
|title=Provably secure obfuscation of diverse watermarks for sequential circuits
|title=Provably secure obfuscation of diverse watermarks for sequential circuits
|entry=inproceedings
|entry=inproceedings
|date=2010-Ju-01
|pdf=Koushanfar2010provably.pdf
}}
}}

Latest revision as of 17:36, 9 November 2021

Koushanfar2010provably
entryinproceedings
address
annote
authorF. Koushanfar and Y. Alkabani
booktitleInternational Symposium on Hardware-Oriented Security and Trust (HOST)
chapter
edition
editor
howpublished
institution
journal
month6
note
number
organization
pages
publisher
school
series
titleProvably secure obfuscation of diverse watermarks for sequential circuits
type
volume
year2010
doi
issn
isbn
urlhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115
pdfKoushanfar2010provably.pdf

File:Koushanfar2010provably.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093