Intellectual Property Protection in Vlsi Designs

by ;
Format: Hardcover
Pub. Date: 2003-04-01
Publisher(s): Kluwer Academic Pub
List Price: $172.85

Rent Textbook

Select for Price
There was a problem. Please try again later.

Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$46.44
Online:60 Days access
Downloadable:60 Days
$61.92
Online:90 Days access
Downloadable:90 Days
$77.40
Online:120 Days access
Downloadable:120 Days
$92.88
Online:180 Days access
Downloadable:180 Days
$100.62
Online:1825 Days access
Downloadable:Lifetime Access
$154.80
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$100.62*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years. Intellectual Property Protection in VLSI Designs: Theory and Practice provides an overview of the security problems in modern VLSI design with a detailed treatment of our newly developed constraint-based protection paradigm for the protection of VLSI design IPs from FPGA design to standard-cell placement, from high-level synthesis solutions to gate-level netlist place-and-rout, and from advanced CAD tools to physical design algorithms. The problem of VLSI design IP protection is much more challenging than the protection of multimedia contents or software, and our protection paradigm is also conceptually different from the state-of-the-art approaches in those domains. The key idea in this newly developed IP protection paradigm is to superimpose additional constraints that correspond to an encrypted signature of the designer to design/software in such a way that quality of design is only nominally impacted, while strong proof of authorship is guaranteed. It consists of three integrated parts: constraint-based watermarking, fingerprinting, and copy detection. Its correctness relies on the presence of all these components. In short, watermarking aims to embed signatures for the identification of the IP owner without altering the IP's functionality; fingerprinting seeks to provide effective ways to distinguish each individual IP users to protect legal IP buyers; copy detection is the method to trace improper use of the IP and demonstrate IP's ownership. Intellectual Property Protection in VLSI Designs: Theory and Practice contains the mathematical foundations for the developed IP protection paradigm, detailed pseudo-code and descriptions of its many techniques, numerous examples and experimental validation on well-known benchmarks, and clear explanations and comparisons of the many protection methods.

Table of Contents

List of Figures
ix
List of Tables
xv
Acknowledgments xix
Design Security: From the Point of View of an Embedded System Designer
1(22)
Introduction
1(1)
Intellectual Property in Reuse-Based Design
2(7)
The Emergence of Embedded Systems
2(2)
Intellectual Property Reuse-Based Design
4(4)
Intellectual Property Misuse and Infringement
8(1)
Constraint-Based IP Protection: Examples
9(7)
Solutions to SAT
10(2)
FPGA Design of DES Benchmark
12(1)
Graph Coloring and the CF IIR Filter Design
13(3)
Constraint-Based IP Protection: Overview
16(3)
Constraint-Based Watermarking
16(1)
Fingerprinting
17(1)
Copy Detection
18(1)
Summary
19(4)
Protection of Data and Privacy
23(12)
Network Security and Privacy Protection
23(3)
Watermarking and Fingerprinting for Digital Data
26(3)
Software Protection
29(2)
Summary
31(4)
Constraint-Based Watermarking for VLSI IP Protection
35(46)
Challenges and the Generic Approach
36(5)
Overview
36(1)
Watermark Embedding Procedure
37(1)
Signature Verification Procedure
37(1)
Credibility of the Approach
38(1)
Essence of Constraint Addition
39(1)
Context for Watermarking
40(1)
Requirements for Effective Watermarks
41(1)
Mathematical Foundations for the Constraint-Based Watermarking Techniques
41(17)
Graph Coloring Problem and Random Graphs
42(1)
Watermarking Technique #1: Adding Edges
43(4)
Watermarking Technique #2: Selecting MIS
47(5)
Watermarking Technique #3: Adding New Vertices and Edges
52(1)
Simulation and Experimental Results
53(1)
Numerical Simulation for Techniques # 1 and # 2
53(1)
Experimental Results
54(4)
Optimization-Intensive Watermarking Techniques
58(20)
Motivation
58(3)
SAT in EDA and SAT Solvers
61(2)
Watermarking in the Optimization Fashion
63(1)
Optimization-Intensive Watermarking Techniques for SAT Problem
64(1)
Adding Clauses
65(1)
Deleting Literals
66(1)
Push-out and Pull-back
67(2)
Analysis of the Optimization-Intensive Watermarking Techniques
69(1)
The Correctness of the Watermarking Techniques
69(1)
The Objective Function
70(2)
Limitations of the Optimization-Intensive Watermarking Techniques on Random SAT
72(3)
Copy Detection
75(1)
Experimental Results
76(2)
Summary
78(3)
Fingerprinting for IP User's Right Protection
81(36)
Motivation and Challenges
81(2)
Fingerprinting Objectives
83(4)
A Symmetric Interactive IP Fingerprinting Technique
83(1)
General Fingerprinting Assumptions
84(1)
Context for Fingerprinting in IP Protection
85(1)
Fingerprinting Objectives
85(2)
Iterative Fingerprinting Techniques
87(14)
Iterative Optimization Techniques
87(1)
Generic Approach
88(2)
VLSI Design Applications
90(1)
Partitioning
91(1)
Standard-Cell Placement
91(1)
Graph Coloring
92(2)
Satisfiability
94(1)
Experimental Results
95(6)
Constraint-Based Fingerprinting Techniques
101(13)
Motivation, New Approch, and Contributions
102(1)
Generic Constraint-Addition IP Fingerprinting
103(2)
Solution Creation Techniques
105(3)
Solution post-processing
108(2)
Solution Distribution Schemes
110(1)
Experimental Results
111(3)
Summary
114(3)
Copy Detection Mechanisms for IP Authentication
117(42)
Introduction
117(2)
Pattern Matching Based Techniques
119(6)
Copy Detection in High-Level Synthesis
120(2)
Copy Detection in Gate-Level Netlist Place-and-Rout
122(1)
Experimental Results
123(2)
Forensic Engineering Techniques
125(12)
Introduction
125(1)
Forensic Engineering for the Detection of VLSI CAD Tools
126(1)
Generic Approach
126(2)
Statistics Collection for Graph Coloring Problem
128(3)
Statistics Collection for Boolean Satisfiability Problem
131(1)
Algorithm Clustering and Decision Making
132(2)
Experimental Results
134(3)
Public Detectable Watermarking Techniques
137(20)
Introduction
137(3)
Public-Private Watermarking Technique
140(1)
Watermark Selection and Embedding
141(1)
Watermark Detection and Security
142(1)
Example: Graph Partitioning
143(1)
Theory of Public Watermarking
144(1)
General Approach
144(1)
Public Watermark Holder
145(4)
Public Watermark Embedding
149(1)
Public Watermark Authentication
150(1)
Summary
151(1)
Validation and Experimental Results
152(1)
FPGA Layout
152(1)
Boolean Satisfiability
153(2)
Graph Coloring
155(2)
Summary
157(2)
Conclusions
159(4)
Appendices
163(10)
VSI Alliance White Paper (IPPWPI 1.1)
163(10)
References 173

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.