Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3. Which of the followings are the goals of IP protection? Check all that apply. Enable the IP owner to detect the use of the

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

3. Which of the followings are the goals of IP protection? Check all that apply. Enable the IP owner to detect the use of the IP Protect testing data associated with the IP Protect IP from hardware Trojan insertion Improve the quality of the IP Protect IP against unauthorized use 4. When we use ICID as the tag for a device, which property does this tag have? reproducible functional passive internal control point 5. Convert the decimal number 2015 into binary: (write the binary number only, for example 10101010101. No space, comma, etc.) Enter answer here point 6. Which of the following PUFs are delay based? Check all that apply. SRAM PUF Ring Oscillator PUF Butterfly PUF Arbiter PUF 7. Which of the following statements about digital watermarking and fingerprinting is correct? It is impossible to design watermarking schemes with guaranteed zero overhead Fingerprint and watermark cannot be used together It is possible to design watermarking schemes with 100% credibility A fingerprinting method has to guarantee that different copies of the same IP get different fingerprints point 8 Which of the following statements about don't care conditions is correct? When system outputs are specified for all the input combinations, there will not be any don't care conditions in the design When a combinational system is fabricated, the outputs will be deterministic for all the don't care conditions, but outputs may have different values on different don't care conditions If specific values are assigned to outputs on don't care conditions, the design will have more constraints and its quality (e.g. size, power, speed) will become worse point Which of the following statements about physical attacks is correct? All physical attacks will need the help from some tools and/or equipment. All physical attacks need to collect some measurement during system's execution All physical attacks need to have physical access to the target system After being physical attacked, the system will not be able to function normally Which of the followings can be potential sources for side channel attacks? Check all that apply. scan chain output signals power consumption system's output signals acoustic side channel optical side channel system's timing or delay information electromagnetic radiation point 14. Consider wx'yz +xy' +y'z, which of the following conditions is a satisfiability don't cares? O z=1,y=1, w = 0 O none of the above 15. When an FSM is implemented, which of the followings will be considered as a hardware Trojan? Connecting the FSM to an antenna to send out the FSM state information Adding a signal that can disable the FSM for design testing and debugging. Specifying the next state information for certain don't care transitions to embed watermark. Tuning the design so the power consumption on each transition will be similar. point 16. For an FPGA-based system developer, which of the following security vulnerabilities and attacks he will not care? Replay attacks from the FPGA users. Leak of his design information from the FPGA Reverse engineering attacks to the FPGA configuration bitstream file of his design Watermarks in the FPGA embedded by the FPGA vendor. point The following 4 questions are on how to use Montgomery Reduction method to compute 67 58(mod 109). Here we have a 67, b-58, N-109. We pick R-128 and we know that N-1 101(mod 128) What is a'aR(mod 109)? Write the number only, no need to append (mod 109). Enter answer here 18. Continue from the previous question, what is b bR(mod 109)? Enter answer here point 19. Continue from the previous question, what is ' (a'b)R(mod 109)? Enter answer here point 20. Continue from the previous question, what is cab(mod 109)? Enter answer here point 21. What is the modular multiplicative inverse of 5(mod 38)? (hint: use Euler's Theorem, square and multiply). Enter answer here

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Deductive And Object Oriented Databases Second International Conference Dood 91 Munich Germany December 18 1991 Proceedings Lncs 566

Authors: Claude Delobel ,Michael Kifer ,Yoshifumi Masunaga

1st Edition

3540550151, 978-3540550150

More Books

Students also viewed these Databases questions