Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts and copied programs. The key idea is to make each design slightly different d
8 Conclusion
We have developed the first hardware and software (intellectual property) usage metering scheme. The scheme enables design companies to securely control licensing rights for their IP. The utilizes a small percentage of a design implemented using configurable tech-nology to embed a unique ID to each manufactured design instance. This scheme is gener-alized in a number of ways and applied to both hardware and software metering.
We also presented mathematical analysis for detection accuracy of the proposed scheme. We demonstrated the ability of the scheme to implement very high number of chips with different ID. The main result of the paper is that we established generic connec-tion between the scheme and synthesis and compilation tasks.
References [1] R. Anderson, M. Kuhn, “Tamper resistance-a cautionary note.”USENIX Workshop on Elec-tronic Commerce, pp. 1-11, 1996.[2] T. Aura, D. Gollmann, D. “Software license management with smart cards. Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’99), pp.75-85, May1999.[3] B.S. Baker and U. Manber. “Deducing similarities in Java sources from bytecodes,” USENIX Technical Conference, pp.179-90, 1998.[4] S. Brin, J. Davis, and H. Garcia-Molina. “Copy detection mechanisms for digital documents,”SIGMOD Record, vol. 24, No. 2, pp. 398-409, 1995.[5] A.E. Caldwell, H. Choi, A.B. Kahng, S. Mantik, M. Potkonjak, G. Qu, and J.L. Wong. “Effective iterative techniques for fingerprinting design IP,” Design Automation Conference, pp. 843-848,1999.[6] G.J. Chaitin. “Register allocation and spilling via graph coloring.” SIGPLAN ‘82 Symposium on Compiler Construction, pp. 98-105, 1982. Design Automation Conference Proceedings, pp.843-848, June 1999.[7] E. Charbon and I. Torunoglu. “Copyright protection of designs based on multi source IPs,”IEEE/ACM International Conference on Computer Aided Design, pp. 591-595, June 1998.[8] C.S. Collberg, “Reverse interpretation + mutation analysis = automatic retargeting.” Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementa-tion, pp. 15-18, June 1997[9] R.E.Crochiere, A.V. Oppenheim. “Analysis of linear digital networks.” Proceedings of the IEEE,vol.63, (no.4):581-95., April 1975[10] S. Dey, V. Gangaram, M. Potkonjak, “A controller redesign technique to enhance testability of controller-data path circuits.” IEEE Transactions on Computer-Aided Design of Integrated Cir-cuits and Systems, vol.17, (no.2):157-68. Feb 1998.[11] W. Diffie,M. Hellman, “New directions in cryptography.” IEEE Transactions on Information Theory, vol.IT-22, (no.6) p.644-54, Nov 1976. [12] http://www.dimacs.rutgers.edu [13] R. Findley Jr., Raymond, R. Dixon, “Dual smart card access control electronic data storage and retrieval system and methods” US patent#5629508, May 13, 1997. [14] P. Flajolet, D. Gardy, and L. Thimonier. “Birthday paradox, coupon collectors, caching algo-rithms and self-organizing search.” Discrete Applied Mathematics, Vol. 39, No. 3, 11 pp. 207-229, November 1992.Table 3: Generated number of distinct solutions for the SAT-based metering scheme File
Variables #of solutions ii8a1
66 1.3E08ii8a2
180 5.8E17ii8a3
264 3.2E32ii8a4
396 4.3E37ii8b1
336 5.0E27ii8b2
576 2.3E46ii8b3
816 5.7E73ii8b41068 5.1E89
搜索“diyifanwen.net”或“第一范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,第一范文网,提供最新初中教育Intellectual property metering(22)全文阅读和word下载服务。
相关推荐: