|
|
|
ix | |
|
|
|
xv | |
| Acknowledgments |
|
xix | |
|
Design Security: From the Point of View of an Embedded System Designer |
|
|
1 | (22) |
|
|
|
1 | (1) |
|
Intellectual Property in Reuse-Based Design |
|
|
2 | (7) |
|
The Emergence of Embedded Systems |
|
|
2 | (2) |
|
Intellectual Property Reuse-Based Design |
|
|
4 | (4) |
|
Intellectual Property Misuse and Infringement |
|
|
8 | (1) |
|
Constraint-Based IP Protection: Examples |
|
|
9 | (7) |
|
|
|
10 | (2) |
|
FPGA Design of DES Benchmark |
|
|
12 | (1) |
|
Graph Coloring and the CF IIR Filter Design |
|
|
13 | (3) |
|
Constraint-Based IP Protection: Overview |
|
|
16 | (3) |
|
Constraint-Based Watermarking |
|
|
16 | (1) |
|
|
|
17 | (1) |
|
|
|
18 | (1) |
|
|
|
19 | (4) |
|
Protection of Data and Privacy |
|
|
23 | (12) |
|
Network Security and Privacy Protection |
|
|
23 | (3) |
|
Watermarking and Fingerprinting for Digital Data |
|
|
26 | (3) |
|
|
|
29 | (2) |
|
|
|
31 | (4) |
|
Constraint-Based Watermarking for VLSI IP Protection |
|
|
35 | (46) |
|
Challenges and the Generic Approach |
|
|
36 | (5) |
|
|
|
36 | (1) |
|
Watermark Embedding Procedure |
|
|
37 | (1) |
|
Signature Verification Procedure |
|
|
37 | (1) |
|
Credibility of the Approach |
|
|
38 | (1) |
|
Essence of Constraint Addition |
|
|
39 | (1) |
|
|
|
40 | (1) |
|
Requirements for Effective Watermarks |
|
|
41 | (1) |
|
Mathematical Foundations for the Constraint-Based Watermarking Techniques |
|
|
41 | (17) |
|
Graph Coloring Problem and Random Graphs |
|
|
42 | (1) |
|
Watermarking Technique #1: Adding Edges |
|
|
43 | (4) |
|
Watermarking Technique #2: Selecting MIS |
|
|
47 | (5) |
|
Watermarking Technique #3: Adding New Vertices and Edges |
|
|
52 | (1) |
|
Simulation and Experimental Results |
|
|
53 | (1) |
|
Numerical Simulation for Techniques # 1 and # 2 |
|
|
53 | (1) |
|
|
|
54 | (4) |
|
Optimization-Intensive Watermarking Techniques |
|
|
58 | (20) |
|
|
|
58 | (3) |
|
SAT in EDA and SAT Solvers |
|
|
61 | (2) |
|
Watermarking in the Optimization Fashion |
|
|
63 | (1) |
|
Optimization-Intensive Watermarking Techniques for SAT Problem |
|
|
64 | (1) |
|
|
|
65 | (1) |
|
|
|
66 | (1) |
|
|
|
67 | (2) |
|
Analysis of the Optimization-Intensive Watermarking Techniques |
|
|
69 | (1) |
|
The Correctness of the Watermarking Techniques |
|
|
69 | (1) |
|
|
|
70 | (2) |
|
Limitations of the Optimization-Intensive Watermarking Techniques on Random SAT |
|
|
72 | (3) |
|
|
|
75 | (1) |
|
|
|
76 | (2) |
|
|
|
78 | (3) |
|
Fingerprinting for IP User's Right Protection |
|
|
81 | (36) |
|
Motivation and Challenges |
|
|
81 | (2) |
|
Fingerprinting Objectives |
|
|
83 | (4) |
|
A Symmetric Interactive IP Fingerprinting Technique |
|
|
83 | (1) |
|
General Fingerprinting Assumptions |
|
|
84 | (1) |
|
Context for Fingerprinting in IP Protection |
|
|
85 | (1) |
|
Fingerprinting Objectives |
|
|
85 | (2) |
|
Iterative Fingerprinting Techniques |
|
|
87 | (14) |
|
Iterative Optimization Techniques |
|
|
87 | (1) |
|
|
|
88 | (2) |
|
|
|
90 | (1) |
|
|
|
91 | (1) |
|
|
|
91 | (1) |
|
|
|
92 | (2) |
|
|
|
94 | (1) |
|
|
|
95 | (6) |
|
Constraint-Based Fingerprinting Techniques |
|
|
101 | (13) |
|
Motivation, New Approch, and Contributions |
|
|
102 | (1) |
|
Generic Constraint-Addition IP Fingerprinting |
|
|
103 | (2) |
|
Solution Creation Techniques |
|
|
105 | (3) |
|
|
|
108 | (2) |
|
Solution Distribution Schemes |
|
|
110 | (1) |
|
|
|
111 | (3) |
|
|
|
114 | (3) |
|
Copy Detection Mechanisms for IP Authentication |
|
|
117 | (42) |
|
|
|
117 | (2) |
|
Pattern Matching Based Techniques |
|
|
119 | (6) |
|
Copy Detection in High-Level Synthesis |
|
|
120 | (2) |
|
Copy Detection in Gate-Level Netlist Place-and-Rout |
|
|
122 | (1) |
|
|
|
123 | (2) |
|
Forensic Engineering Techniques |
|
|
125 | (12) |
|
|
|
125 | (1) |
|
Forensic Engineering for the Detection of VLSI CAD Tools |
|
|
126 | (1) |
|
|
|
126 | (2) |
|
Statistics Collection for Graph Coloring Problem |
|
|
128 | (3) |
|
Statistics Collection for Boolean Satisfiability Problem |
|
|
131 | (1) |
|
Algorithm Clustering and Decision Making |
|
|
132 | (2) |
|
|
|
134 | (3) |
|
Public Detectable Watermarking Techniques |
|
|
137 | (20) |
|
|
|
137 | (3) |
|
Public-Private Watermarking Technique |
|
|
140 | (1) |
|
Watermark Selection and Embedding |
|
|
141 | (1) |
|
Watermark Detection and Security |
|
|
142 | (1) |
|
Example: Graph Partitioning |
|
|
143 | (1) |
|
Theory of Public Watermarking |
|
|
144 | (1) |
|
|
|
144 | (1) |
|
|
|
145 | (4) |
|
Public Watermark Embedding |
|
|
149 | (1) |
|
Public Watermark Authentication |
|
|
150 | (1) |
|
|
|
151 | (1) |
|
Validation and Experimental Results |
|
|
152 | (1) |
|
|
|
152 | (1) |
|
|
|
153 | (2) |
|
|
|
155 | (2) |
|
|
|
157 | (2) |
|
|
|
159 | (4) |
|
|
|
163 | (10) |
|
VSI Alliance White Paper (IPPWPI 1.1) |
|
|
163 | (10) |
| References |
|
173 | |