Skip to main content

Intellectual Property Metering

  • Conference paper
  • First Online:
Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts and copied programs. The key idea is to make each design/ progrsm slightly different during postprocessing phase. Therefore, if two identical hardware/software designs or a design that is not reported by the foundry are detected, the design house has proof of misconduct.

We start by establishing implementation requirements for intellectual property metering. We also establish the connection between the requirements for hardware and software metering and synthesis/compilation process. Furthermore, we present mathematical analysis of statistical accuracy of the proposed hardware and software metering schemes. The effectiveness of the metering scheme is demonstrated on a number of designs and programs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. R. Anderson, M. Kuhn, “Tamper resistance-a cautionary note.” USENIX Workshop on Electronic Commerce, pp. 1–11, 1996.

    Google Scholar 

  2. T Aura, D. Gollmann, “Software license management with smart cards.” Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’99), pp. 75–85, May1999.

    Google Scholar 

  3. B.S. Baker, U. Manber, “Deducing similarities in Java sources from bytecodes.” USENIX Technical Conference, pp. 179–90, 1998.

    Google Scholar 

  4. S. Brin, J. Davis, H. Garcia-Molina, “Copy detection mechanisms for digital documents.” SIG-MOD Record, vol. 24, no. 2, pp. 398–409, 1995.

    Article  Google Scholar 

  5. A.E. Caldwell, H. Choi, A.B. Kahng, S. Mantik, M. Potkonjak, G. Qu, J.L. Wong, “Effective iterative techniques for fingerprinting design IP.” Design Automation Conference, pp. 843–848, 1999.

    Google Scholar 

  6. G.J. Chaitin, “Register allocation and spilling via graph coloring.” SIGPLAN’ 82 Symposium on Compiler Construction, pp. 98–105, 1982.

    Google Scholar 

  7. E. Charbon, I. Torunoglu, “Copyright protection of designs based on multi source IPs.” IEEE/ ACM International Conference on Computer Aided Design, pp. 591–595, June 1998.

    Google Scholar 

  8. C.S. Collberg, “Reverse interpretation + mutation analysis = automatic retargeting.” Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementation, pp. 15–18, June 1997

    Google Scholar 

  9. R.E. Crochiere, A.V. Oppenheim, “Analysis of linear digital networks.” Proceedings of the IEEE, vol. 63, no. 4, pp. 581–95., April 1975

    Article  Google Scholar 

  10. S. Dey, V. Gangaram, M. Potkonjak, “A controller redesign technique to enhance testability of controller-data path circuits.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 17, no. 2, pp. 157–68, February 1998.

    Article  Google Scholar 

  11. W. Diffie, M. Hellman, “New directions in cryptography.” IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644–54, November 1976.

    Article  MathSciNet  Google Scholar 

  12. http://www.dimacs.rutgers.edu

  13. R. Findley Jr., Raymond, R. Dixon, “Dual smart card access control electronic data storage and retrieval system and methods.” US patent#5629508, May 13, 1997.

    Google Scholar 

  14. P. Flajolet, D. Gardy, L. Thimonier, “Birthday paradox, coupon collectors, caching algorithms and self-organizing search.” Discrete Applied Mathematics, vol. 39, no. 3, pp. 207–229, November 1992.

    Article  MATH  MathSciNet  Google Scholar 

  15. M.K. Franklin, D. Malkhi, “Auditable metering with lightweight security”. Journal of Computer Security, vol. 6, no. 4, IOS Press, pp. 237–55, 1998.

    Google Scholar 

  16. M.R. Garey, D.S. Johnson, “Computers and intractability. A guide to the theory of NP-com-pleteness.” Oxford, UK: Freeman, 1979.

    Google Scholar 

  17. L.M. Guerra, M. Potkonjak, J.M. Rabaey, “Behavioral-level synthesis of heterogeneous BISR reconfigurable ASIC’s.” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 6, no. 1, pp. 158–67, March 1998.

    Article  Google Scholar 

  18. F. Hartung, M. Kutter, “Multimedia watermarking techniques.” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079–107, July 1999.

    Article  Google Scholar 

  19. A.B. Kahng, J. Lach, W.H. Mangione-Smith, S. Mantik, I.L. Markov, M. Potkonjak, P. Tucker, H. Wang, G. Wolfe, “Watermarking techniques for intellectual property protection.” 35th ACM/IEEE Design Automation Conference Proceedings, pp. 776–781, June 1998.

    Google Scholar 

  20. A.B. Kahng, D. Kirovski, S. Mantik, M. Potkonjak, J.L. Wong, “Copy detection for intellectual property protection of VLSI design.” IEEE/ACM International Conference on Computer Aided Design, pp. 600–604, November 1999.

    Google Scholar 

  21. D. Kirovski, M. Potkonjak, “Efficient coloring of a large spectrum of graphs.” Proceedings 1998 Design and Automation Conference, pp. 427–32, 1998.

    Google Scholar 

  22. D. Kirovski, D. Liu, J.L. Wong, M. Potkonjak, “Forensic engineering techniques for VLSICAD tools.” 37th ACM/IEEE Design Automation Conference Proceedings, pp. 581–6, June 2000.

    Google Scholar 

  23. K. Lofstrom, W.R. Daasch, D. Taylor, “IC identification circuits using device mismatch.” Proceedings of the International Solid-State Circuits Conference, pp. 372–3, 2000.

    Google Scholar 

  24. D. P. Maher, “Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective.” Financial Cryptography First International Conference, pp. 109–21, 1997.

    Google Scholar 

  25. A. J. Menezes, P.C. van Oorschot, S.A. Vanstone, “Handbook of applied cryptography.” Boca Raton, FL: CRC Press, 1997.

    MATH  Google Scholar 

  26. M. Naor, B. Pinkas, “Secure accounting and auditing on the Web.” Computer Networks and ISDN Systems, vol. 30, no. 1–7, Elsevier, pp. 541–50, April 1998.

    Article  Google Scholar 

  27. R.L. Rivest (Edited by: Hirschfeld, R.), “Electronic lottery tickets as micropayments.” Financial Cryptography First International Conference, pp. 307–14, 1997.

    Google Scholar 

  28. C.D. Ross, N.W. Taylor, K.W. Kingdon, H.R. Davis, D. Major “Method and apparatus for electronic licensing.” US patent# 5553143, Sept. 3, 1996

    Google Scholar 

  29. D.C. Thomas, “Method and apparatus for providing security for computer software.” US patent#4446519, May 1984.

    Google Scholar 

  30. J. Pitkow, “In search of reliable usage data on the WWW.” Computer Networks and ISDN Systems, vol. 29, no. 8–13, pp. 1343–55, September 1997.

    Article  Google Scholar 

  31. M. Potkonjak, S. Dey, K. Wakabayashi, “Design-for-Debugging of application specific designs.” International Conference on Computer-Aided Design, pp. 295–301, 1995.

    Google Scholar 

  32. G. Qu, M. Potkonjak, “Analysis of watermarking techniques for graph coloring problem,” IEEE/ACM International Conference on Computer Aided Design, pp. 190–193, November 1998.

    Google Scholar 

  33. J.M. Rabaey, C. Chu, P. Hoang, M. Potkonjak, “Fast prototyping of datapath-intensive architectures.” IEEE Design & Test of Computers, June 1991, vol. 8, no. 2, pp. 40–51, June 1991.

    Article  Google Scholar 

  34. B. Schneier, “Applied cryptography: protocols, algorithms, and source code in C,” 2nd edition New York: Wiley, 1996.

    MATH  Google Scholar 

  35. D.R. Stinson, “Cryptography: theory and practice.” Boca Raton, FL: CRC Press, 1995.

    MATH  Google Scholar 

  36. L. Stok, J.A.G. Jess, “Foreground memory management in data path synthesis.” International Journal of Circuit Theory and Applications, vol. 20, no. 3, pp. 235–55. May–June 1992

    Article  MATH  Google Scholar 

  37. K. Veenstra, Altera Corporation, Personal Communication. January 1999.

    Google Scholar 

  38. http://www.vsia.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koushanfar, F., Qu, G., Potkonjak, M. (2001). Intellectual Property Metering. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics