Presentation Open Access

Complete activation scheme for IP design protection

Brice Colombier; Ugo Mureddu; Marek Laban; Oto Petura; Lilian Bossuet; Viktor Fischer


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/09aadf94-d8e6-400c-9d40-7a99151d3d44/HOST-complete-activation-scheme-IP-short.pdf"
      }, 
      "checksum": "md5:83becc6678e5e2c3b1c16e4528da3a72", 
      "bucket": "09aadf94-d8e6-400c-9d40-7a99151d3d44", 
      "key": "HOST-complete-activation-scheme-IP-short.pdf", 
      "type": "pdf", 
      "size": 164072
    }
  ], 
  "owners": [
    22112
  ], 
  "doi": "10.5281/zenodo.574260", 
  "stats": {
    "version_unique_downloads": 2.0, 
    "unique_views": 6.0, 
    "views": 6.0, 
    "downloads": 2.0, 
    "unique_downloads": 2.0, 
    "version_unique_views": 6.0, 
    "volume": 328144.0, 
    "version_downloads": 2.0, 
    "version_views": 6.0, 
    "version_volume": 328144.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.574260", 
    "latest_html": "https://zenodo.org/record/574260", 
    "bucket": "https://zenodo.org/api/files/09aadf94-d8e6-400c-9d40-7a99151d3d44", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.574260.svg", 
    "html": "https://zenodo.org/record/574260", 
    "latest": "https://zenodo.org/api/records/574260"
  }, 
  "created": "2017-05-11T08:12:19.890858+00:00", 
  "updated": "2017-09-08T07:48:51.974997+00:00", 
  "conceptrecid": "777824", 
  "revision": 3, 
  "id": 574260, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.574260", 
    "description": "<p>Intellectual Property (IP) illegal copying is a major threat in today\u2019s integrated circuits industry which is massively based on a design-and-reuse paradigm. In order to fight this threat, a designer must track how many times an IP has been instantiated. Moreover, illegal copies of an IP must be unusable. We propose a hardware/software scheme which allows a designer to remotely activate an IP with minimal area overhead. The software modifies the IP efficiently and can handle very large netlists. Unique identification of hardware instances is achieved by integrating a TERO-PUF along with a lightweight key reconciliation module. A cryptographic core guarantees security and triggers a logic locking/masking module which makes the IP unusable unless the correct encrypted activation word is applied. The hardware side is implemented on several FPGAs.</p>", 
    "license": {
      "id": "CC-BY-NC-4.0"
    }, 
    "title": "Complete activation scheme for IP design protection", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "777824"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "574260"
          }
        }
      ]
    }, 
    "grants": [
      {
        "code": "644052", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::644052"
        }, 
        "title": "HARDWARE ENABLED CRYPTO AND RANDOMNESS", 
        "acronym": "HECTOR", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [
            "EC"
          ], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "communities": [
      {
        "id": "hector"
      }
    ], 
    "publication_date": "2017-05-01", 
    "creators": [
      {
        "affiliation": "Hubert Curien Laboratory, University of Lyon", 
        "name": "Brice Colombier"
      }, 
      {
        "affiliation": "Hubert Curien Laboratory, University of Lyon", 
        "name": "Ugo Mureddu"
      }, 
      {
        "affiliation": "Department of Electronics and Multimedia Communications, Technical University of Kosice", 
        "name": "Marek Laban"
      }, 
      {
        "affiliation": "Hubert Curien Laboratory, University of Lyon", 
        "name": "Oto Petura"
      }, 
      {
        "affiliation": "Hubert Curien Laboratory, University of Lyon", 
        "name": "Lilian Bossuet"
      }, 
      {
        "affiliation": "Hubert Curien Laboratory, University of Lyon", 
        "name": "Viktor Fischer"
      }
    ], 
    "meeting": {
      "acronym": "HOST", 
      "url": "http://www.hostsymposium.org/", 
      "dates": "01-05 May 2017", 
      "place": "McLean, VA, USA", 
      "title": "IEEE International Symposium on Hardware Oriented Security and Trust"
    }, 
    "access_right": "open", 
    "resource_type": {
      "type": "presentation", 
      "title": "Presentation"
    }
  }
}
6
2
views
downloads
All versions This version
Views 66
Downloads 22
Data volume 328.1 kB328.1 kB
Unique views 66
Unique downloads 22

Share

Cite as