Academia.eduAcademia.edu

Copyright Protection for Intellectual Property

2016, International Journal of Computer and Communication Technology

Intellectual property takes several forms, the most important of which are patents, copyrights, and trade rights. Patents protect inventions. One can patent methods and processes, new varieties of plants, and (more weakly) designs. The VSI alliance proposed the usage of the three approaches for proper protection of IP designs. The detection approach directly interacts with the VLSI design, and is considered an overhead on the design cycle. IP watermarking and IP fingerprinting are the main approaches used, where the design is watermarked (tagged) then different tracking techniques are used to keep track of the usages of such design. Reuse-Based design methodology has taken hold, the very large scale integration (VLSI) design industry is confronted with the increasing threat of intellectual property (IP) infringement.

International Journal of Computer and Communication Technology Volume 7 Issue 2 Article 9 April 2016 Copyright Protection for Intellectual Property P. Nalini Department of Electronics and Communication Engineering, Nalanda Institute Of Engineering And Technology, Sattenapalli, [email protected] K. Sam Prasad Department of Electronics and Communication Engineering, Nalanda Institute Of Engineering And Technology, Sattenapalli, [email protected] L. Srinivas Department of Electronics and Communication Engineering, Nalanda Institute of Engineering and Technology, Sattenapalli, [email protected] Follow this and additional works at: https://www.interscience.in/ijcct Recommended Citation Nalini, P.; Sam Prasad, K.; and Srinivas, L. (2016) "Copyright Protection for Intellectual Property," International Journal of Computer and Communication Technology: Vol. 7 : Iss. 2 , Article 9. DOI: 10.47893/IJCCT.2016.1350 Available at: https://www.interscience.in/ijcct/vol7/iss2/9 This Article is brought to you for free and open access by the Interscience Journals at Interscience Research Network. It has been accepted for inclusion in International Journal of Computer and Communication Technology by an authorized editor of Interscience Research Network. For more information, please contact [email protected]. Copyright Protection for Intellectual Property P. Nalini, K. Sam Prasad & L. Srinivas Department of Electronics and Communication Engineering, Nalanda Institute Of Engineering And Technology, Sattenapalli E-mail : [email protected] Abstract – Intellectual property takes several forms, the most important of which are patents, copyrights, and trade rights. Patents protect inventions. One can patent methods and processes, new varieties of plants, and (more weakly) designs. The VSI alliance proposed the usage of the three approaches for proper protection of IP designs. The detection approach directly interacts with the VLSI design, and is considered an overhead on the design cycle. IP watermarking and IP fingerprinting are the main approaches used, where the design is watermarked (tagged) then different tracking techniques are used to keep track of the usages of such design. Reuse-Based design methodology has taken hold, the very large scale integration (VLSI) design industry is confronted with the increasing threat of intellectual property (IP) infringement. Keywords - Finite state machine (FSM), intellectual property (IP) protection, IP watermarking, sequential design, state transition graph (STG). I. Copyright Violation: A pirate receives a product and resells it without getting the permission to do so from the copyright owner. INTRODUCTION Intellectual property takes several forms, the most important of which are patents, copyrights, and trade rights. Patents protect inventions. One can patent methods and processes, new varieties of plants, and (more weakly) designs. But one cannot patent things that are obvious, functionality without mechanism (that is, a system to do X without describing how it gets done), or laws of nature. Patents are about ideas. Even without knowledge of a patented invention, one can go to court to prohibit the independently developed device that uses it. Copyright governs artistic expression, not ideas. It prohibits, for a finite time, the copying of artistic works. In the US, a copyright currently lasts for the life of the author plus 70 years, but national laws vary. Copyright protects against direct copying of a product, not ideas' protection. If one has never having seen a design, creates a similar design, then she/he has not violated the copyright. Trade secrets: provide legal protection for companies that want to keep information from the public. A trade secret law is, in some sense, the opposite of patent law. II. COMMUNICATING FINITE STATE MACHINES If we allow overlap of the sets of input and output signals of a finite state machine, in all fairness, we cannot say what will happen without first considering in more detail what a ‘‘signal’’ is. We assume that signals have a finite range of possible values and can change value only at precisely defined moments. The machine executes a two-step algorithm. In the first step, the input signal values are inspected and an arbitrary executable transition rule is selected. In the second step, the machine changes its control state in accordance with that rule and updates its output signals. These two steps are repeated forever. If no transition rule is executable, the machine will continue cycling through its two-step algorithm without changing state, until a change in the input signal values, effected by another finite state machine, makes a transition possible. A signal, then, has a state, much like a finite state machine. It can be interpreted as a variable that can only be evaluated or assigned to at precisely defined moments. The machines must share a common ‘‘clock’’ for their two-step algorithm, but they are not otherwise synchronized. If further synchronization is required, it must be realized with a subtle system of handshaking on the signals connecting the machines. Digital piracy generally includes the following cases: 1) Illegal Access: A pirate tries to receive a digital product from a network site without permission; 2) Intentional Tampering: A pirate modifies a digital product in order to extract/insert features for malicious reasons and then proceeds to its retransmission. The authenticity of the original product is lost; and 3) International Journal of Computer and Communication Technology (IJCCT), ISSN: 2231-0371, Vol-7, Iss-2 115 Copyright Protection for Intellectual Property III. PROPOSED ALGORITHM To verify the authorship, one needs to run the watermarked FSM with the input sequence, ˆX = {ˆX1, ˆX2, ・ ・ ・ , ˆXN}, applied on state ˆs1. If the operation halts before N transitions, the watermark cannot be detected. Otherwise, an output sequence ˜Y of N × k bits is obtained. The bits indexed by the set B of m random numbers are selected from ˜Y to form an ordered sequence ˜W . The authorship is proved if ˜W perfectly matches or is highly correlated with the watermark W of the IP owner. Although the ownership can be authenticated directly by running the watermarked FSM with ˆX, it does not permit the IP authorship to be field authenticated by the IP buyers after the watermarked FSM has been implemented into an integrated circuit and packaged. Since only the test signals can be traced after the chip is packaged, the authorship of the watermarked FSM can be verified off chip by making it a part of the test kernel. Fig. 2 Algorithm part-2 A sequence of test vectors can be applied serially through the scan-in, Sin pin to bring ˆM to the designated state ˆs1 in the test mode, followed by N designated test vectors that incorporate ˆX. The output responses ˜Y can then be collected serially from a scanout Sout pin externally to verify the authenticity of ˆM . This convenient way of watermark verification can be performed by the end users provided that scan design is also incorporated in the watermarked IP chip. Since the scan chain is used as a medium to aid authorship verification of the IP encapsulated in the test kernel. The aggressor needs additional effort to also successfully tamper or redesign the test structure to provide the fault coverage of the pirated IP. Failure to detect the scan chain signature alerts malicious tampering or removal of the test structure in attempt to misappropriate the protected IP. The watermark W is inserted into STG(M) by modifying some of its edges without changing the operational behavior of M to find a sequence of N consecutive transitions, t i = _ˆsi, ˆsi+1, ˆXi, ˆYi_, i = 1, 2, . . . , N, such that each watermark bit, wl ‫ א‬W, Fig. 1 Algorithm part-1 International Journal of Computer and Communication Technology (IJCCT), ISSN: 2231-0371, Vol-7, Iss-2 116 Copyright Protection for Intellectual Property of coincidence. As m increases, more new transitions may have to be added. The beauty of our method is the input sequence length, N can increase to mitigate the overhead increment without compromising the authorship credibility. The false positive rate, which is the probability that the watermark is detected in the output sequence under a different random input sequence, can be estimated statistically. Credibility Analysis: The following conceivable attacks on watermarking of sequential circuit designs are analyzed with Alice as the IP owner and Bob as the attacker, who attempts to tamper an illegally acquired copy of Alice’s watermarked IP. Fig. 3 Algorithm part-3 Fig. 4 Example for the Implementation IV. IP PROTECTION CREDIBILITY The credibility of the authorship proof can be evaluated by the probability that an unintended watermark is detected in a design [3]. Suppose that an arbitrary input sequence exits to excite N’ (N’= N) consecutive transitions through the reachable states of a FSM with k output variables. The output sequence of length N (each output alphabet has k binary bits) will be one of 2k×N possible solutions. The odds that the output sequence contains the identical watermark. A longer watermark has a lower probability 1) Combinational Logic Re-Synthesis: Bob may use various logic optimization tools [2], [3] to re-synthesize the combinational logic of watermarked FSM. Such combinational logic re-synthesis operation maintains the inputs/outputs behaviors of flip-flops in the design and has no effect on the STG structure. Therefore, the watermark embedded on the STG is robust against attack by combinational logic re-synthesis. 2) Circuit Retiming: Bob may apply retiming transformation [2], [4] to move the latches across the combinational logic blocks of Alice’s watermarked FSM without changing the design functionality. Retiming can change the STG structure. Such transformation can be divided into three cases for analysis: 1) splitting one state into two onestep equivalent states; 2) merging two one-step equivalent states into one state; and 3) switching between two states that are one-step equivalent. Two states si and sj are said to be one-step equivalent if and only if the two states have the same outputs and the same next state under the same input excitation. The consequence of splitting, merging or switching transformation on the outputs retrieved in the watermark detection process can be analyzed by the STG before and after retiming. As an example, let states s31 and s32 be two generic onestep equivalent states and the transitions (s1, s31, xt , yt) and (s31, s5, xt+1, yt+1) are traversed in the watermarking process as shown in Fig. 8. Upon retiming, states s31 and s32 are merged into state s3. When the sequence ˆX is applied onto the retimed FSM, transitions (s1, s3, xt , yt) and (s3, s5, xt+1, yt+1) are traversed, the same outputs as Alice’s watermarked FSM are generated from these two steps. Similarly, splitting or switching operations on the watermarked FSM will not prevent the detection of Alice’s watermark. Alice’s watermark will not be International Journal of Computer and Communication Technology (IJCCT), ISSN: 2231-0371, Vol-7, Iss-2 117 Copyright Protection for Intellectual Property removed as a state can only be substituted by the state with the same behaviors in retiming transformation. 3) State Recoding (or Assignment): Bob may recode the states of Alice’s watermarked FSM to remove her watermark. State assignment changes the mnemonic representations of states in Q. It has no effect on the functional specification of FSM [25]. As the watermark is embedded in the state transitions rather than the states, Alice’s watermark will survive the state recoding attack. 4) Combinational and Sequential Redundancy Removal: When a redundant fault is identified in a sequential circuit, the part of logic can be deleted to simulate the effect of fault. Bob can remove the combinational logic that is not necessary for the correct circuit behavior. This attack has a similar effect as the combinational resynthesis attack as far as the sequential behavior is concerned. So it will not affect the embedded watermark. Fig. 5 Watermarking with third party keeping a timestamped signature. V. RESULTS AND CONCLUSION The Experimental Out put are shown in Fig. 6. Our experimental results show that the watermarking incurs acceptably low performance overhead sand possesses very low possibility of coincidence and false positive rate .Similar to other FSM watermarking schemes [2]– [4], this method is not applicable to some ultrahigh speed designs that do not have a FSM. Fortunately, regular sequential functions are omnipresent in industrial designs [3], making FSM water marking a key research focus for dynamic watermarking. One recommendation to overcome such limitation is to augment it with combinational watermarking scheme [5] applied simultaneously or on different levels of design abstraction to realize hierarchical watermarking [9], [10]. The watermarked FSM can be fortified by a scan chain watermarking [7] to enable the authorship to be easily verified even after the protected IP has been packaged. . International Journal of Computer and Communication Technology (IJCCT), ISSN: 2231-0371, Vol-7, Iss-2 118 Copyright Protection for Intellectual Property Fig.6 Simulation Results Trans. Comput.Aided Design Integr. . Circuits Syst., vol. 27, no. 9, pp. 1565–1570, Sep. ACKNOWLEDGEMENTS 2008. The authors would like to thank the anonymous [7] Intellectual Property Protection Development reviewers for their comments which were very helpful Working Group, Intellectual Property in improving the quality and presentation of this paper. Protection: Schemes, AlternativesVSI Alliance, Aug. 2001, white paper, version 1.1. REFERENCES: [8] I. Hong and M. Potkonjak, “Techniques for [1] D. Kirovski, Y. Y. Hwang, M. Potkonjak, and J. intellectual property protection of DSP designs,” Cong, “Protecting Combinational logic in Proc. IEEE Int. Conf. Acoust. Speech synthesis solutions,” IEEE Trans. Comput.Signal Process., vol. 5. May 1998, pp. 3133– Aided Design Integr. Circuits Syst., vol. 25, no. 3136. 12, pp. 2687–2696, Dec.2006. [9] A. Rashid, J. Asher, W. H. Mangione-Smith, and [2] A. T. Abdel-Hamid, S. Tahar, and E. M. M. Potkonjak, “Hierarchical watermarking Aboulhamid, “A survey on IP watermarking for protection of DSP filter cores,” in Proc. IEEE techniques,” in Design Automation for Custom Integr. Circuits Conf., May 1999, pp. 39– Embedded Systems, vol. 10. Berlin, Germany: 42. Springer- Verlag, Jul. 2005, pp. 1–17. AUTHORS PROFILE: [3] A. B. Kahng, J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, “Constraintbased watermarking techniques for design IP protection,” IEEE Trans. Comput.Aided Design Integr. Circuits Syst., vol. 20, no. 10, pp. 1236– 1252, Oct. 2001. [4] A. Cui and C. H. Chang, “Watermarking for IP protection through template substitution at logic synthesis level,” in Proc. IEEE Int. Symp. Circuits Syst., May 2007, pp. 3687–3690. [5] A. Cui and C. H. Chang, “Stegosignature at logic synthesis level for digital design IP protection,” in Proc. IEEE Int. Symp. Circuits Syst., May 2006, pp. 4611–4614. [6] A. Cui, C. H. Chang, and S. Tahar, “IP watermarking using incremental technology mapping at logic synthesis level,” IEEE ””” International Journal of Computer and Communication Technology (IJCCT), ISSN: 2231-0371, Vol-7, Iss-2 119