Constraint Manipulation for Fingerprinting Intellectual Property - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Constraint Manipulation for Fingerprinting Intellectual Property

Description:

... Coloring Problem ... with the minimal number of colors such that no pairs of ... mat.gsia.cmu.edu/COLOR/instances.html) Experimental Results. Conclusions ... – PowerPoint PPT presentation

Number of Views:52
Avg rating:3.0/5.0
Slides: 19
Provided by: gan47
Category:

less

Transcript and Presenter's Notes

Title: Constraint Manipulation for Fingerprinting Intellectual Property


1
Constraint Manipulation forFingerprinting
Intellectual Property
  • G. Qu and M. Potkonjak
  • Computer Science Department
  • University of California, Los Angeles
  • gangqu,miodrag_at_cs.ucla.edu

2
Motivation
  • IP-Based Design
  • Design complexity time-to-market
  • Challenges (http//www.vsia.com)
  • analog mixed-signal
  • implementation/verification
  • IP protection
  • manufacturing related test
  • on-chip buses
  • system-level design
  • virtual component transfer
  • verification

3
Motivation
  • IP-Based Design
  • Design complexity time-to-market
  • Challenges (http//www.vsia.com)
  • analog mixed-signal
  • implementation/verification
  • IP protection
  • manufacturing related test
  • on-chip buses
  • system-level design
  • virtual component transfer
  • verification

4
Motivation
  • IP-Based Design
  • Intellectual Property Protection (IPP)
  • Watermarking-Based IP Protection
  • Traditional watermarking techniques
  • digital dataaudio, video, image, multimedia,
  • owners signature ? minute errors (Boney et
    al., Cox et al., Swanson et al. Hartung et al.
    IHW98, Signal Processing May,1998)

5
Motivation
  • IP-Based Design
  • Intellectual Property Protection (IPP)
  • Watermarking-Based IP Protection
  • Traditional watermarking techniques
  • Constraint-based techniques
  • software, hardware, algorithm, design IP, ...
  • challenge keep the correct functionality
  • owners signature ? extra constraints

6
Motivation
  • IP-Based Design
  • Intellectual Property Protection (IPP)
  • Watermarking-Based IP Protection
  • Traditional watermarking techniques
  • Constraint-based techniques
  • software, hardware, algorithm, design IP, ...
  • challenge keep the correct functionality
  • owners signature ? extra constraints
  • theoretical background (Qu et al. ICCAD98)
  • applications (Kahng et al. DAC98, Kirovski et
    al. ICCAD98, Charbon CICC98, Hong et al. DAC99
    , Oliveria DAC99, Khanna and Zane, SODA00)

7
Motivation
  • IP-Based Design
  • Intellectual Property Protection (IPP)
  • Watermarking-Based IPP
  • Traditional watermarking techniques
  • Constraint-based techniques
  • Fingerprinting
  • Provides each user with a unique copy of the IP
  • Facilitates the trace of illegally resold IP
  • Protects innocent legal users

8
Approach and Challenges
Users
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
9
Prior Art on Fingerprinting
  • Fingerprinting for Digital Data(Chor et al.
    CRYPTO94, Boneh and Shaw CYPRTO95, Pfitzmann
    and Schunter EUROCRYPT96, Biehl and Meyer
    STACS97)
  • Fingerprinting for FPGA Design(Lach et al.
    CICC98)
  • Iterative Fingerprinting for IP
    Protection(Caldwell et al. DAC99)
  • Group Theory

10
Example Graph Coloring Problem
  • InstanceMark the vertices of a graph with the
    minimal number of colors such that no pairs of
    nodes that are connected by an edge receive the
    same color.
  • QuestionHow to get many distinct solutions?
  • Criteria
  • Efficiency
  • Distinctness

11
Technique 1 -- Vertex Duplication
A
B
E
C
F
F
D
12
Technique 1 -- Vertex Duplication
A
A
A
B
E
B
E
C
C
F
F
D
D
13
Technique 2 -- Clique Manipulation
A
H
B
G
C
F
D
E
14
Technique 2 -- Clique Manipulation
A
H
B
G
C
F
D
E
15
Technique 3 -- Bridge Construction
A
B
E
C
F
D
16
Experimental Benchmark
(http//mat.gsia.cmu.edu/COLOR/instances.html)
17
Experimental Results
18
Conclusions
  • Fingerprinting
  • New Fingerprinting Methodology
  • Concept constraint manipulation
  • Efficiency almost zero run-time overhead
  • Distinctness guaranteed different copies
  • Quantity controllable number of solutions
Write a Comment
User Comments (0)
About PowerShow.com