{"title":"使用掌纹生物识别技术保护可重用硬件IP核","authors":"Rahul Chaurasia, A. Sengupta","doi":"10.1109/iSES52644.2021.00099","DOIUrl":null,"url":null,"abstract":"This paper presents a novel contact-less palmprint biometric based approach for securing reusable hardware IP cores against piracy threat. As the modern integrated circuits (ICs) supply chain involves third party vendors to meet the market demand, an unauthorized intellectual property (IP) vendor may counterfeit the hardware IPs and infuse them into the design. Thus, fake IPs or ICs may unknowingly or deliberately be assimilated into consumer electronics (CE) systems, leading to reliability and safety concerns for end consumers. In the proposed approach, the authentic palmprint biometric is first converted into its equivalent palmprint signature digital template based on a selected feature set. Subsequently, embedding of the palmprint signature’s digital template in the form of secret biometric constraints into the design is performed to distinguish between counterfeited and authentic IP core(s). The proposed approach presents a non-replicable and non-vulnerable solution achieving stronger security in terms of temper tolerance (TT) and probability of coincidence (Pc) than the state of the art techniques.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing Reusable Hardware IP cores using Palmprint Biometric\",\"authors\":\"Rahul Chaurasia, A. Sengupta\",\"doi\":\"10.1109/iSES52644.2021.00099\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a novel contact-less palmprint biometric based approach for securing reusable hardware IP cores against piracy threat. As the modern integrated circuits (ICs) supply chain involves third party vendors to meet the market demand, an unauthorized intellectual property (IP) vendor may counterfeit the hardware IPs and infuse them into the design. Thus, fake IPs or ICs may unknowingly or deliberately be assimilated into consumer electronics (CE) systems, leading to reliability and safety concerns for end consumers. In the proposed approach, the authentic palmprint biometric is first converted into its equivalent palmprint signature digital template based on a selected feature set. Subsequently, embedding of the palmprint signature’s digital template in the form of secret biometric constraints into the design is performed to distinguish between counterfeited and authentic IP core(s). The proposed approach presents a non-replicable and non-vulnerable solution achieving stronger security in terms of temper tolerance (TT) and probability of coincidence (Pc) than the state of the art techniques.\",\"PeriodicalId\":293167,\"journal\":{\"name\":\"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iSES52644.2021.00099\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iSES52644.2021.00099","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing Reusable Hardware IP cores using Palmprint Biometric
This paper presents a novel contact-less palmprint biometric based approach for securing reusable hardware IP cores against piracy threat. As the modern integrated circuits (ICs) supply chain involves third party vendors to meet the market demand, an unauthorized intellectual property (IP) vendor may counterfeit the hardware IPs and infuse them into the design. Thus, fake IPs or ICs may unknowingly or deliberately be assimilated into consumer electronics (CE) systems, leading to reliability and safety concerns for end consumers. In the proposed approach, the authentic palmprint biometric is first converted into its equivalent palmprint signature digital template based on a selected feature set. Subsequently, embedding of the palmprint signature’s digital template in the form of secret biometric constraints into the design is performed to distinguish between counterfeited and authentic IP core(s). The proposed approach presents a non-replicable and non-vulnerable solution achieving stronger security in terms of temper tolerance (TT) and probability of coincidence (Pc) than the state of the art techniques.