IP Core Protection and Hardware-Assisted Security for Consumer Electronics最新文献

筛选
英文 中文
Structural obfuscation of DSP cores used in CE devices 用于CE器件的DSP核的结构混淆
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch7
A. Sengupta, S. Mohanty
{"title":"Structural obfuscation of DSP cores used in CE devices","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch7","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch7","url":null,"abstract":"Previous chapters, watermarking, fingerprinting, and forensic engineering have been discussed for resolving various ownership-related problems. This chapter discusses structural obfuscation approaches to thwart IP piracy and reverse engineering (RE). This approach, when effective, can save billions of dollars of revenue losses in CE and semiconductor industry. Especially, a multi-high-level transformation-based structural obfuscation process has been presented for DSP IP cores as hardware-hardening technique. The chapter is structured as follows: Section 7.2 highlights the fundamentals of obfuscation with stress on structural obfuscation; Section 7.3 discusses different compiler transformation-driven structural obfuscation methodology. Section 7.4 discusses low-cost structurally obfuscated design exploring technique. Section 7.5 demonstrates a multistage structural obfuscation technique through a motivational example. Section 7.6 presents the results of a case study.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72690690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware approaches for media and information protection and authentication 媒体和信息保护和认证的硬件方法
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_CH11
A. Sengupta, S. Mohanty
{"title":"Hardware approaches for media and information protection and authentication","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_CH11","DOIUrl":"https://doi.org/10.1049/PBCS060E_CH11","url":null,"abstract":"Technology scaling has allowed us to design high-performance devices with a lowpower consumption. The advent of IoT has increased the versatility of data collection and there are many different ways of collecting and transferring data over the Internet. The data that is being collected is also in different forms, that is, text, images, videos, and audios. When they are shared, for a legit use, attackers can break the security and use them for illegible purposes or claim ownership to sell them commercially. This has been the trend lately where many counterfeit products are appearing in the market. This section discusses the digital watermarking, different schemes of digital watermarking, and how a media object can be secured using a watermark. They are also not completely resistant to attacks and measures need to be taken to secure the content that is being watermarked. The chapter also presents different issues with the watermark implementations, attacks and countermeasures to those attacks on watermarking. Section 11.1 presents a broad overview of the IP protection. Section 11.2 discusses the generic overview and components of any watermark system. Section 11.3 summarizes various types of watermarks. Section 11.4 discusses various applications of watermarking. Section 11.5 presents desired characteristics of watermarks. Sections 11.6 discusses the technical challenges of the watermarking. Section 11.7 discusses hardware-based watermarking systems available in the current literature. Section 11.8 discusses about watermarking in smart vehicles. Section 11.9 discusses about medical signal authentication. Section 11.10 highlights side-channel information leakage and its countermeasures. Section 11.11 outlines various forms of attacks on watermarks and watermarking systems. Section 11.12 presents the difficulties involved in making use of them in practice.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83870376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced encryption standard (AES) and its hardware watermarking for ownership protection 高级加密标准(AES)及其所有权保护的硬件水印
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch10
A. Sengupta, S. Mohanty
{"title":"Advanced encryption standard (AES) and its hardware watermarking for ownership protection","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch10","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch10","url":null,"abstract":"In this era of consumer electronics, cyber security is one of the key challenges. Any security, privacy, or protection methods that are deployed rely on cryptography. Advance encryption standard (AES) is one of the heavily used cryptography algorithms for its advantages. This chapter is dedicated to the process of AES and its hardware design in the form of IP core. Several hardware security techniques rely on AES IP core as an important block. Additionally, since this is such an important core, its self-protection against forgery/piracy is also crucial. Thus, this chapter will also discuss about AES IP core protection using watermarking.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88862704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symmetrical protection of DSP IP core and integrated circuits using fingerprinting and watermarking 基于指纹和水印的DSP IP核和集成电路的对称保护
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch5
A. Sengupta, S. Mohanty
{"title":"Symmetrical protection of DSP IP core and integrated circuits using fingerprinting and watermarking","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch5","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch5","url":null,"abstract":"This chapter discusses the use of watermarking and fingerprinting for symmetrical protection of DSP IP cores and integrated circuits. Symmetrical IP core protection is a mechanism in which both seller and buyers of an IP can have signature for doubleproof of ownership and whereas significantly reducing false ownership claims.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80698865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security in consumer electronics and internet of things (IoT) 消费电子产品和物联网(IoT)的安全
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_CH2
A. Sengupta, S. Mohanty
{"title":"Security in consumer electronics and internet of things (IoT)","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_CH2","DOIUrl":"https://doi.org/10.1049/PBCS060E_CH2","url":null,"abstract":"In a typical consumer electronics generation, diverse forms of attacks exist, e.g., system security, information security, information privacy, system trustworthiness, hardware IP protection, information copyright protection. Each of the attacks have their own threats and serve different purposes. The objective of this chapter is to differentiate each of these attacks in the context of internet of things (IoT). IoT is a very hot, trending topic of research, where different devices, sensors, and computers are connected to a network, collect data, and process for different purposes. A network of devices and sensors connected to the cloud can complete many unimaginable tasks, and without the existence of cloud, almost all task would have been very difficult to achieve and complete. Since, most connectivity occurs in cloud, there is always a probability of security and privacy threats. Because all types of the different devices are connected to the internet, attackers pose a huge threat to the system. For example, if any electronic system that is responsible for home care, healthcare, running an entire city, etc., are attacked, then the consequence of this threat will be a major catastrophe.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73205898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introduction to IP core protection and hardware-assisted security of consumer electronics 介绍消费类电子产品的IP核保护和硬件辅助安全
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch1
A. Sengupta, S. Mohanty
{"title":"Introduction to IP core protection and hardware-assisted security of consumer electronics","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch1","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch1","url":null,"abstract":"This chapter presents an overview of the book and discussions on topics that could serve as an introductory part toward the overall content of the book. It is assumed that the readers will have some subject knowledge on topics such as very large scale integration (VLSI), embedded systems, hardware design flow, etc., before adopting the section of this book.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86752009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional obfuscation of DSP cores used in CE devices 用于CE设备的DSP核的功能混淆
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_CH8
A. Sengupta, S. Mohanty
{"title":"Functional obfuscation of DSP cores used in CE devices","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_CH8","DOIUrl":"https://doi.org/10.1049/PBCS060E_CH8","url":null,"abstract":"The previous chapter detailed many approaches for structural obfuscation but we now move forward to another class of obfuscation called “functional obfuscation.”The use of either of the techniques is the choice of design engineers. This chapter presents several methods to thwart IP piracy and RE attacks through functional obfuscation. More specifically, we will discuss IP functional locking blocks (ILBs)-based logic obfuscation for DSP cores used in CE devices as hardware hardening technique (Sengupta et al., 2018). Moreover, a PSO-based DSE is performed to generate a low-overhead, functionally obfuscated (FO) design solution for DSP cores (Sengupta and Sedaghat, 2011, 2013). The rest of the chapter is organized as follows: Section 8.2 discusses different attack scenarios and threat model. Section 8.3 explains selected functional obfuscation techniques that are available in the literature. Section 8.4 discusses the design process of functional obfuscation for DSP IP cores used in CE devices. Section 8.5 presents the security analysis of functional obfuscation methodology for DSP IP core design. Section 8.6 discusses PSO-based optimization for FO design. Section 8.7 presents analysis on case studies/test cases.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88756407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IP core and integrated circuit protection using robust watermarking 利用鲁棒水印保护IP核和集成电路
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch4
A. Sengupta, S. Mohanty
{"title":"IP core and integrated circuit protection using robust watermarking","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch4","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch4","url":null,"abstract":"This chapter discusses robust watermarking approaches for the ownership protection of hardware cores [a.k.a. intellectual property (IP) cores]. Watermarking ensures some additional attributes inserted in the hardware core such a way that it can be used to verify ownership of the hardware core when required. Robust watermarking approaches have been discussed as these are resilient to various attacks that happen in global supply chain for various reasons.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89964886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trojan security aware DSP IP core and integrated circuits 木马安全感知DSP IP核心和集成电路
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_ch3
A. Sengupta, S. Mohanty
{"title":"Trojan security aware DSP IP core and integrated circuits","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_ch3","DOIUrl":"https://doi.org/10.1049/PBCS060E_ch3","url":null,"abstract":"This chapter discusses different security approaches to designing digital signal processing (DSP) cores that have detection capability against functional-type hardware Trojans in a global supply chain. In the current design and fabrication supply chain, design houses, circuits and system core vendors, and manufacturing houses are globally scattered. It is quite possible that Trojans can be inserted in this design and manufacturing supply chain by anyone involved at any phase. Such Trojans can give backdoors to hackers and affect the operation of the system that uses the infected hardware. In a worst case, in critical applications, such as aircrafts and medical devices, functioning can be completely stopped, causing catastrophic consequences.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90346875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Obfuscation of JPEG CODEC IP core for CE devices 用于CE设备的JPEG CODEC IP核的混淆
IP Core Protection and Hardware-Assisted Security for Consumer Electronics Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch9
A. Sengupta, S. Mohanty
{"title":"Obfuscation of JPEG CODEC IP core for CE devices","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch9","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch9","url":null,"abstract":"Joint Picture Export Group (JPEG) is the most commonly used image compression standard in the world. One cannot comprehend a CE system that does not process a JPEG. Without JPEG there is no smartphone photography, no social media. So, authors feel strongly that this important multimedia core “JPEG”needs to give well-deserving credit in terms of securing it when security/protection of “DSP core”has been a major focus of all the discussions in this book so far. The chapter is organized as follows: Section 9.2 provides an overview of DCT-based JPEG compression and decompression process. Section 9.3 explains the design process of generating structurally obfuscated JPEG CODEC IP core; Section 9.4 provides a detailed insight on the implementation process of obfuscated JPEG codec IP core in a CAD synthesis tool. Section 9.5 provides implementation and analysis of JPEG CODEC IP core as well as compressed images through the devised JPEG CODEC IP core.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78328321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信