Computational Forensic Techniques for Intellectual Property Protection

作者: Jennifer L. Wong , Darko Kirovski , Miodrag Potkonjak

DOI: 10.1007/3-540-45496-9_6

关键词:

摘要: Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, generic CFE methodology analyzes statistics of certain features given IP and quantizes likelihood well known source has it. In this paper, we describe present set techniques that, pool compilation tools, one used generate hardware/software design. The approach four phases: feature data collection, extraction, clustering, validation. addition protection, developed paradigm can have other potential applications: optimization algorithm selection tuning, benchmark selection, source-verification for mobile code.

参考文章(42)
Norah Rudin, Keith Inman, Gustavo Stolovitzky, Isidore Rigoutsos, DNA Based Identification Springer, Boston, MA. pp. 287- 309 ,(1996) , 10.1007/0-306-47044-6_14
Bart Selman, Stochastic search and phase transitions: AI meets physics international joint conference on artificial intelligence. pp. 998- 1002 ,(1995)
Kari Karhunen, Über lineare Methoden in der Wahrscheinlichkeitsrechnung Suomalainen Tiedeakatemia. ,(1947)
Michael A. Trick, David J. Johnson, Cliques, Coloring, and Satisfiability: Second DIMACS Implementation Challenge, Workshop, October 11-13, 1993 American Mathematical Society. ,(1996)
S. Devadas, Optimal layout via Boolean satisfiability international conference on computer aided design. pp. 294- 297 ,(1989) , 10.1109/ICCAD.1989.76956
Udi Manber, Brenda S. Baker, Deducing similarities in Java sources from bytecodes usenix annual technical conference. pp. 15- 15 ,(1998)
Bart Selman, David Mitchell, Hector Levesque, A new method for solving hard satisfiability problems national conference on artificial intelligence. pp. 440- 446 ,(1992)
Michel X. Goemans, David P. Williamson, Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming Journal of the ACM. ,vol. 42, pp. 1115- 1145 ,(1995) , 10.1145/227683.227684
A. B. Kahng, J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, G. Wolfe, Watermarking techniques for intellectual property protection design automation conference. pp. 776- 781 ,(1998) , 10.1145/277044.277240
Robert J Tibshirani, Bradley Efron, An introduction to the bootstrap ,(1993)