Difference between revisions of "Koushanfar2010provably"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 3: | Line 3: | ||
|url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115 | |url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115 | ||
|abstract=<p>This paper presents a provably secure method for embedding multiple watermarks in sequential designs. A number of different watermarks signed with the IP owner\&$\#$39;s secret key from a public key cryptography system are generated. The owner\&$\#$39;s watermarks are then dissembled into the states and transitions of the original sequential design. Hiding the multiple watermarks in the states and transitions is shown to be an instance of obfuscating a multi-point function with a generalized output. We draw on the theoretical cryptographic results of provable obfuscation of this function family to build a secure sequential multi-watermark system by construction. An iterative synthesis method for integrating the collection of watermarks to the original design is introduced. Analysis of watermark properties and the attack resiliency of the new multiple watermarking construction is presented. Experimental evaluations on benchmark circuits demonstrate practicality and low overhead of the new provably secure multiple watermarks construction method.</p> | |abstract=<p>This paper presents a provably secure method for embedding multiple watermarks in sequential designs. A number of different watermarks signed with the IP owner\&$\#$39;s secret key from a public key cryptography system are generated. The owner\&$\#$39;s watermarks are then dissembled into the states and transitions of the original sequential design. Hiding the multiple watermarks in the states and transitions is shown to be an instance of obfuscating a multi-point function with a generalized output. We draw on the theoretical cryptographic results of provable obfuscation of this function family to build a secure sequential multi-watermark system by construction. An iterative synthesis method for integrating the collection of watermarks to the original design is introduced. Analysis of watermark properties and the attack resiliency of the new multiple watermarking construction is presented. Experimental evaluations on benchmark circuits demonstrate practicality and low overhead of the new provably secure multiple watermarks construction method.</p> | ||
|month=6 | |||
|year=2010 | |||
|booktitle=International Symposium on Hardware-Oriented Security and Trust (HOST) | |booktitle=International Symposium on Hardware-Oriented Security and Trust (HOST) | ||
|title=Provably secure obfuscation of diverse watermarks for sequential circuits | |title=Provably secure obfuscation of diverse watermarks for sequential circuits | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:37, 4 September 2021
Koushanfar2010provably | |
---|---|
entry | inproceedings |
address | |
annote | |
author | F. Koushanfar and Y. Alkabani |
booktitle | International Symposium on Hardware-Oriented Security and Trust (HOST) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 6 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | Provably secure obfuscation of diverse watermarks for sequential circuits |
type | |
volume | |
year | 2010 |
doi | |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115 |