Intellectual property metering(15)

时间:2026-01-22

Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts and copied programs. The key idea is to make each design slightly different d

[15] M.K. Franklin, D. Malkhi, “Auditable metering with lightweight security”. Journal of Com-

puter Security, vol.6, (no.4), IOS Press, 1998. p.237-55.

[16] M.R. Garey, D.S. Johnson. “Computers and intractability. A guide to the theory of NP-com-

pleteness.” Oxford, UK: Freeman, 1979.

[17] L.M. Guerra, M. Potkonjak, J.M. Rabaey, “Behavioral-level synthesis of heterogeneous BISR

reconfigurable ASIC’s.”IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol.6, (no.1), March 1998. p.158-67.

[18] F. Hartung, M. Kutter. “Multimedia watermarking techniques.” Proceedings of the IEEE, July

1999, vol.87, (no.7):1079-107.

[19] A.B. Kahng, J. Lach, W.H. Mangione-Smith, S. Mantik, I.L. Markov, M. Potkonjak, P. Tucker,

H. Wang, and G. Wolfe. “Watermarking techniques for intellectual property protection,” 35th

ACM/IEEE Design Automation Conference Proceedings, pp. 776-781, June 1998.

[20] A.B. Kahng, D. Kirovski, S. Mantik, M. Potkonjak, and J.L. Wong. “Copy detection for intel-

lectual property protection of VLSI design,” IEEE/ACM International Conference on Com-puter Aided Design, pp. 600-604, November 1999.

[21] D. Kirovski, M. Potkonjak. “Efficient coloring of a large spectrum of graphs.” Proceedings

1998 Design and Automation Conference. 35th DAC. pp.427-32., 1998.

[22] D. Kirovski, D. Liu, J.L. Wong, and M. Potkonjak. “Forensic engineering techniques for VLSI

CAD tools,” 37th ACM/IEEE Design Automation Conference Proceedings, June 2000. pp.581-6.

[23] K. Lofstrom, W.R. Daasch, D. Taylor, “IC identification circuits using device mismatch” Pro-

ceedings of the International Solid-State Circuits Conference, pp. 372-3, 2000.

[24] D. P. Maher “Fault induction attacks, tamper resistance, and hostile reverse engineering in per-

spective.”, Financial Cryptography First International Conference, pp. 109-21, 1997.

[25] A. J. Menezes, P.C. van Oorschot, S.A. Vanstone, “Handbook of applied cryptography”, Boca

Raton, FL:CRC Press, 1997.

[26] M. Naor, B. Pinkas, “Secure accounting and auditing on the Web”. Computer Networks and

ISDN Systems, vol.30, (no.1-7), Elsevier, April 1998. pp.541-50.

[27] R.L. Rivest (Edited by: Hirschfeld, R.), “Electronic lottery tickets as micropayments.” Finan-

cial Cryptography First International Conference, pp.307-14, 1997.

[28] C.D. Ross, N.W. Taylor, K.W. Kingdon, H.R. Davis, D. Major “Method and apparatus for elec-

tronic licensing”, US patent# 5553143, Sept. 3, 1996

[29] D.C. Thomas “Method and apparatus for providing security for computer software”, US

patent#4446519, May 1984

[30] J. Pitkow, “In search of reliable usage data on the WWW”. Computer Networks and ISDN Sys-

tems, vol.29, (no.8-13), Sept. 1997. p.1343-55.

[31] M. Potkonjak, S. Dey, K. Wakabayashi, “Design-for-Debugging of application specific

designs.” International Conference on Computer-Aided Design, pp. 295-301, 1995.

[32] G. Qu and M. Potkonjak. “Analysis of watermarking techniques for graph coloring problem,”

IEEE/ACM International Conference on Computer Aided Design, pp. 190-193, November 1998.

[33] J.M. Rabaey, C. Chu, P. Hoang, M. Potkonjak, “Fast prototyping of datapath-intensive archi-

tectures.” IEEE Design & Test of Computers, June 1991, vol.8, (no.2):40-51.

[34] B. Schneier, “Applied cryptography: protocols, algorithms, and source code in C /”. 2nd ed.

New York: Wiley, 1996.

[35] D.R. Stinson, “Cryptography: theory and practice”. Boca Raton, FL: CRC Press, 1995.

[36] L. Stok, J.A.G. Jess, “Foreground memory management in data path synthesis.”International

Journal of Circuit Theory and Applications, vol.20, (no.3):235-55. May-June 1992

[37] K. Veenstra, Altera Corporation, Personal Communication., January 1999.

[38]

…… 此处隐藏:1943字,全部文档内容请下载后查看。喜欢就下载吧 ……
Intellectual property metering(15).doc 将本文的Word文档下载到电脑

精彩图片

热门精选

大家正在看

× 游客快捷下载通道(下载后可以自由复制和排版)

限时特价:4.9 元/份 原价:20元

支付方式:

开通VIP包月会员 特价:19元/月

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219