메뉴 건너뛰기




Volumn 7, Issue 1 PART 1, 2012, Pages 51-63

Provably secure active IC metering techniques for piracy avoidance and digital rights management

Author keywords

Active hardware metering; anti piracy; chip overbuilding attack; chip protection; hardware obfuscation; integrated circuit (IC) piracy protection; integrated circuit (IC) security and trust; provably secure hardware metering; third party intellectual property (IP) protection

Indexed keywords

ANTI-PIRACY; CHIP OVERBUILDING ATTACK; CHIP PROTECTION; HARDWARE METERING; PROVABLY SECURE; THIRD-PARTY INTELLECTUAL PROPERTY (IP) PROTECTION;

EID: 84855943309     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2163307     Document Type: Article
Times cited : (152)

References (48)
  • 1
    • 84855970539 scopus 로고    scopus 로고
    • Defense Science Board (DSB) Study on High Performance Microchip Supply [Online]. Available
    • Defense Science Board (DSB) Study on High Performance Microchip Supply [Online]. Available: http://www.acq.osd.mil/dsb/reports/2005-02-hpms-report- final.pdf
  • 2
    • 33646472901 scopus 로고    scopus 로고
    • Bogus! electronic manufacturing and consumers confront a rising tide of counterfeit electronics
    • May
    • M. Pecht and S. Tiku, "Bogus! electronic manufacturing and consumers confront a rising tide of counterfeit electronics," IEEE Spectrum, vol. 43, no. 5, pp. 37-46, May 2006.
    • (2006) IEEE Spectrum , vol.43 , Issue.5 , pp. 37-46
    • Pecht, M.1    Tiku, S.2
  • 3
    • 41349119868 scopus 로고    scopus 로고
    • Trusted integrated circuit strategy
    • Mar.
    • S. Pope, "Trusted integrated circuit strategy," IEEE Trans. Compon. Packag. Technol., vol. 31, no. 1, pp. 230-235, Mar. 2008.
    • (2008) IEEE Trans. Compon. Packag. Technol. , vol.31 , Issue.1 , pp. 230-235
    • Pope, S.1
  • 4
    • 84855978815 scopus 로고    scopus 로고
    • Managing the Risks of Counterfeiting in the Information Technology Industry. A White Paper by KPMG and the Alliance for Gray Market and Counterfeit Abatement (AGMA)
    • Managing the Risks of Counterfeiting in the Information Technology Industry. A White Paper by KPMG and the Alliance for Gray Market and Counterfeit Abatement (AGMA).
  • 5
    • 84855970540 scopus 로고    scopus 로고
    • Defense Industrial Base Assessment: Counterfeit Electronics, 2010, A Report by Bureau of Industry and Security's (BIS) Office of Technology Evaluation (OTE) [Online]. Available
    • Defense Industrial Base Assessment: Counterfeit Electronics, 2010. A Report by Bureau of Industry and Security's (BIS) Office of Technology Evaluation (OTE) [Online]. Available: http://www.agmaglobal. org
  • 8
    • 34547252533 scopus 로고    scopus 로고
    • CAD-based security, cryptography, and digital rights management
    • DOI 10.1109/DAC.2007.375167, 4261186, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • F. Koushanfar and M. Potkonjak, "CAD-based security, cryptography, and digital rights management," in Proc. Design Automation Conf. (DAC), 2007, pp. 268-269. (Pubitemid 47129968)
    • (2007) Proceedings - Design Automation Conference , pp. 268-269
    • Koushanfar, F.1    Potkonjak, M.2
  • 9
    • 85077688405 scopus 로고    scopus 로고
    • Active hardware metering for intellectual property protection and security
    • Y. Alkabani and F. Koushanfar, "Active hardware metering for intellectual property protection and security," in Proc. USENIX Security Symp., 2007, pp. 291-306.
    • (2007) Proc. USENIX Security Symp. , pp. 291-306
    • Alkabani, Y.1    Koushanfar, F.2
  • 17
    • 79957728907 scopus 로고    scopus 로고
    • Integrated circuits metering for piracy protection and digital rights management: An overview
    • F. Koushanfar, "Integrated circuits metering for piracy protection and digital rights management: An overview," in Proc. Great Lakes Symp. VLSI (GLSVLSI), 2011, pp. 449-454.
    • (2011) Proc. Great Lakes Symp. VLSI (GLSVLSI) , pp. 449-454
    • Koushanfar, F.1
  • 19
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. Design Automation Conf. (DAC), 2007, pp. 9-14. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 24
    • 34047233176 scopus 로고    scopus 로고
    • Future fab: How software is helping intel go nano-and beyond
    • Mar.
    • C. Mouli and W. Carriker, "Future fab: How software is helping intel go nano-and beyond," IEEE Spectrum, vol. 44, no. 3, pp. 38-43, Mar. 2007.
    • (2007) IEEE Spectrum , vol.44 , Issue.3 , pp. 38-43
    • Mouli, C.1    Carriker, W.2
  • 25
    • 49749102498 scopus 로고    scopus 로고
    • Plans for next-gen chips imperiled
    • Aug.
    • B. Santo, "Plans for next-gen chips imperiled," IEEE Spectrum, vol. 44, no. 8, pp. 12-14, Aug. 2007.
    • (2007) IEEE Spectrum , vol.44 , Issue.8 , pp. 12-14
    • Santo, B.1
  • 26
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • Jan./Feb.
    • M. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Des. Test Comput., vol. 27, no. 1, pp. 48-65, Jan./Feb. 2010.
    • (2010) IEEE Des. Test Comput. , vol.27 , Issue.1 , pp. 48-65
    • Yu, M.1    Devadas, S.2
  • 28
    • 0035440030 scopus 로고    scopus 로고
    • Techniques for the creation of digital watermarks in sequential circuit designs
    • DOI 10.1109/43.945306, PII S0278007001068907
    • A. Oliveira, "Techniques for the creation of digital watermarks in sequential circuit designs," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 20, no. 9, pp. 1101-1117, Sep. 2001. (Pubitemid 32945721)
    • (2001) IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems , vol.20 , Issue.9 , pp. 1101-1117
    • Oliveira, A.L.1
  • 29
    • 41349121509 scopus 로고    scopus 로고
    • Semiconductor manufacturers' efforts to improve trust in the electronic part supply chain
    • Sep.
    • K. Chatterjee and D. Das, "Semiconductor manufacturers' efforts to improve trust in the electronic part supply chain," IEEE Trans. Compon. Packag. Technol., vol. 3, no. 3, pp. 547-549, Sep. 2007.
    • (2007) IEEE Trans. Compon. Packag. Technol. , vol.3 , Issue.3 , pp. 547-549
    • Chatterjee, K.1    Das, D.2
  • 42
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in Proc. Information Hiding Conf. (IH), 2009, pp. 206-220.
    • (2009) Proc. Information Hiding Conf. (IH) , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2
  • 44
    • 80051746634 scopus 로고    scopus 로고
    • Time-bounded authentication of FPGAS
    • Sep.
    • M. Majzoobi and F. Koushanfar, "Time-bounded authentication of FPGAS," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pt. 2, pp. 1123-1135, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 PART 2 , pp. 1123-1135
    • Majzoobi, M.1    Koushanfar, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.