DocumentCode :
2770272
Title :
Intellectual property protection and security of SoCs — An embedded tutorial
Author :
Sur-Kolay, Susmita
Author_Institution :
Indian Stat. Inst., Kolkata, India
fYear :
2012
fDate :
12-14 Sept. 2012
Firstpage :
289
Lastpage :
289
Abstract :
VLSI designs and hardware cores are reused in order to meet the design specifications on time, considering the numerous constraints imposed by nanometer technology. Electronic description of a VLSI design or a hardware core is an intellectual property (IP), and may be infringed upon either in the design house, or the fabrication facility, or at the time of its reuse in a system. This mandates incorporating techniques for intellectual property protection in the VLSI design flow. The IP of a VLSI design, which culminates in fabrication of the integrated circuit, differs from other sources of IPs such as image, text, because in addition to its physical and structural description, it also has a behavioral specification which should remain unaltered by any IP protection technique. IPs at the design level are editable and hence more flexible for reuse yet more vulnerable to misappropriation. Security in activation of chips, especially in embedded systems, is an equally grave issue and has led to the paradigm of design-for-security. This embedded tutorial aims at presenting the major concerns in IP security and the challenges to implement the countermeasures and retain their effectiveness in the entire life cycle. The nature of threats are broadly categorized as (i) misappropriation by hacking during electronic commerce and intentional reselling, and (ii) unauthorized design retrieval. Various mechanisms such as encryption and obfuscation, watermarking and fingerprinting for countering misappropriation of category (i) will be addressed. Analytic methods derived from the behavioral aspect specific to chip designs and effective for category (ii), will be discussed. Finally, it focuses on the practical issues in semiconductor technology and IP commerce which pose difficulty in ensuring a safe cycle for an IP.
Keywords :
VLSI; integrated circuit design; logic circuits; microprocessor chips; system-on-chip; IP protection technique; SoC security; VLSI designs; category countering misappropriation; design specifications; design-for-security; electronic commerce; electronic description; embedded tutorial; encryption; fabrication facility; fingerprinting; hardware cores; integrated circuit; intellectual property protection; intentional reselling; nanometer technology; obfuscation; physical description; semiconductor technology; structural description; unauthorized design retrieval; watermarking; Algorithm design and analysis; Awards activities; Hardware; Intellectual property; Security; Tutorials; Very large scale integration;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
SOC Conference (SOCC), 2012 IEEE International
Conference_Location :
Niagara Falls, NY
ISSN :
2164-1676
Print_ISBN :
978-1-4673-1294-3
Type :
conf
DOI :
10.1109/SOCC.2012.6398363
Filename :
6398363
Link To Document :
بازگشت