2001
DOI: 10.1007/3-540-45496-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Intellectual Property Metering

Abstract: Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts and copied programs. The key idea is to make each design slightly different during postprocessing phase. Therefore, if two identical hardware/software designs or a design that is not reported by the foundry are detected, the design house has proof of misconduct. We start by establishing implementation requirements for hardware meterin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 58 publications
(30 citation statements)
references
References 29 publications
0
30
0
Order By: Relevance
“…IC metering is a set of security protocols that enable the design house to gain post-fabrication control by passive or active control of the number of produced ICs, their properties and use, or by runtime disabling of ICs in case of tamper detection [4].…”
Section: Topicsmentioning
confidence: 99%
“…IC metering is a set of security protocols that enable the design house to gain post-fabrication control by passive or active control of the number of produced ICs, their properties and use, or by runtime disabling of ICs in case of tamper detection [4].…”
Section: Topicsmentioning
confidence: 99%
“…The first IC metering scheme was proposed in 2001 [4], [5], but the scheme was passive. Variability-induced delays were used for authentication and security [2], [6], [11], [3].…”
Section: Related Workmentioning
confidence: 99%
“…To overcome the hardware IP piracy problem, various watermarking [9] and metering protocols have been proposed [4], [5], [1]. IC metering involves a set of security protocols that enables the design house to gain post-fabrication control through passive or active counts of produced ICs, through the monitoring of IC properties and use, and through remote runtime disabling.…”
Section: Introductionmentioning
confidence: 99%
“…Until recently, only passive IC protection was available, based on unique chip IDs or programmable parts [9,11,17,18]. Alkabani and Koushanfar [1] proposed the first active scheme to fight hardware piracy.…”
Section: Introductionmentioning
confidence: 99%