1 / 204
文档名称:

intellectual property protection in vlsi design theory and practice 9781402073205 39796.pdf

格式:pdf   页数:204
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

intellectual property protection in vlsi design theory and practice 9781402073205 39796.pdf

上传人:leehsien95 2012/12/23 文件大小:0 KB

下载得到文件列表

intellectual property protection in vlsi design theory and practice 9781402073205 39796.pdf

文档介绍

文档介绍:INTELLECTUAL PROPERTY PROTECTION
IN VLSI DESIGNS
This page intentionally left blank
Intellectual Property
Protection in VLSI Designs
Theory and Practice
by
Gang Qu
University of Maryland‚ .
and
Miodrag Potkonjak
University of California‚ Los Angeles‚ .
KLUWER ACADEMIC PUBLISHERS
NEW YORK, BOSTON, DORDRECHT, LONDON, MOSCOW
eBook ISBN: 0-306-48717-9
Print ISBN: 1-4020-7320-8
©2004 Springer Science + Business Media, Inc.
Print ©2003 Kluwer Academic Publishers
Dordrecht
All rights reserved
No part of this eBook may be reproduced or transmitted in any form or by any means, electronic,
mechanical, recording, or otherwise, without written consent from the Publisher
Created in the United States of America
Visit Springer's eBookstore at:
and the Springer Global Website Online at:
Contents
List of Figures ix
List of Tables xiii
Acknowledgments xix
1. DESIGN SECURITY: FROM THE POINT OF VIEW OF AN
EMBEDDED SYSTEM DESIGNER 1
1 Introduction 1
2 Intellectual Property in Reuse-Based Design 2
The Emergence of Embedded Systems 2
Intellectual Property Reuse-Based Design 4
Intellectual Property Misuse and Infringement 8
3 Constraint-Based IP Protection: Examples 9
Solutions to SAT 10
FPGA Design of DES Benchmark 12
Graph Coloring and the CF IIR Filter Design 13
4 Constraint-Based IP Protection: Overview 16
Constraint-Based Watermarking 16
Fingerprinting 17
Copy Detection 18
5 Summary 19
2. PROTECTION OF DATA AND PRIVACY 23
work Security and Privacy Protection 23
2 Watermarking and Fingerprinting for Digital Data 26
3 Software Protection 29
4 Summary 31
v
vi INTELLECTUAL PROPERTY PROTECTION IN VLSI DESIGNS
3. CONSTRAINT-BASED WATERMARKING FOR VLSI IP
PROTECTION 35
1 Challenges and the Generic Approach 36
Overview 36
Watermark Embedding Procedure 37
Signature Verification Procedure 37
Credibility of the Approach 38
Essence of C