Intellectual Property Cores Protection designs for CE products

被引:17
|
作者
Sengupta, Anirban [1 ]
机构
[1] Indian Inst Technol, Comp Sci & Engn, Indore, Madhya Pradesh, India
关键词
WATERMARKING;
D O I
10.1109/MCE.2015.2484745
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The current design era of consumer electronics (CE) is reliant on global integrated circuit (IC) supply chains. To maximize design productivity and minimize design time, the use of intellectual property (IP) cores, often supplied by a third-party vendor, has become a standard practice in the industry. However, there are increasing threats to security and growing piracy issues that threaten global supply chains as system-on-chip (SoC) design becomes increasingly commoditized. As a consequence, the requirements for protecting IP-core designs and the know-how they represent have become of importance to industry. This article provides an insight into this task faced by many CE manufacturers and an overview of current and past methodologies. The pros and cons of each approach and some practical case studies will help the reader understand this challenge. Some consideration is also given to the potential future evolution of IP protection. © 2012 IEEE.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 49 条
  • [31] Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
    Lederer, Isabell
    Mayer, Rudolf
    Rauber, Andreas
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (10) : 13082 - 13100
  • [32] A Hierarchical IP Protection Approach for Hard IP Cores
    Liu, Qiang
    Li, Haie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 1566 - 1569
  • [33] Protecting Intellectual Property of Deep Neural Networks with Watermarking
    Zhang, Jialong
    Gu, Zhongshu
    Jang, Jiyong
    Wu, Hui
    Stoecklin, Marc Ph
    Huang, Heqing
    Molloy, Ian
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 159 - 171
  • [34] Publicly detectable watermarking for intellectual property authentication in VLSI design
    Qu, G
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2002, 21 (11) : 1363 - 1368
  • [35] Say No to Freeloader: Protecting Intellectual Property of Your Deep Model
    Wang, Lianyu
    Wang, Meng
    Fu, Huazhu
    Zhang, Daoqiang
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (12) : 11073 - 11086
  • [36] The use of watermarks in the protection of digital multimedia products
    Voyatzis, G
    Pitas, I
    PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1197 - 1207
  • [37] Intellectual property core protection of control data flow graphs using robust watermarking during behavioural synthesis based on user resource constraint and loop unrolling factor
    Sengupta, A.
    Bhadauria, S.
    ELECTRONICS LETTERS, 2016, 52 (06) : 439 - 440
  • [38] Survey of hardware protection of design data for integrated circuits and intellectual properties
    Colombier, Brice
    Bossuet, Lilian
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06) : 274 - 287
  • [39] LicenseNet: Proactively safeguarding intellectual property of AI models through model license
    Li, Peihao
    Huang, Jie
    Zhang, Shuaishuai
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 159
  • [40] Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach
    Li, Meng
    Zhong, Qi
    Zhang, Leo Yu
    Du, Yajuan
    Zhang, Jun
    Xiang, Yong
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 402 - 409