Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the followings are the goals of IP protection? Check all that apply Protect testing data associated with the IP Trace IPs Improve the

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

Which of the followings are the goals of IP protection? Check all that apply Protect testing data associated with the IP Trace IPs Improve the quality of the IP Protect IP against unauthorized use Ensure that the IP is compatible with other IPs point 2. You want to minimize a 4-variable function F(a, b, c, d) with two don't care conditions, ( a b c d 1) and (a d- 1,bc0) (or abcd and ab'c'dy. To embed your signature with the watermarking approach described on slide "Watermarking a Boolean Formula" (page 1 in "Watermarking Examples"), you decide to minimize F(a, b, c, d) abed instead, what is your signature? 10 01 Watermarking a Boolean Formula # Problem: Rewrite the following Boolean expression with the minimal number of literals F(a,b,c,d) - a'bc'd a'bc'd a'bcdabc'd don't care conditions: a'b'ed abcd # Goal: protect the solution (IP) # Approach: tHide one bit with each don't care condition make F(a,bic,d) 1 to hide a bit 1': make F(a,b,d,d)-O to hide a bit 'O'. 3. A good watermark will be difficult or impossible to be removed by any adversary without detailed knowledge about the watermark, this property is known as easy detectability resilience high credibility transparency point 4 A good watermark should not require major modification to the industrial design tools and design software, this property is known as transparency resilience low overhead fairness point 5 n the slide of "Public Watermarking GP Problem" (page 6 in "Good Watermarks"), which of the followings should be made to the public? Check all that apply. The rules on how each public watermarking bit will be embedded The scheme that public watermark head and body will be constructed The public watermark you want to embed in the solution The pairs of nodes selected to embed the public watermark bits Public Watermarking Problem: how to discover the embedded watermark and prove authorship? Q1. How to embed the signature? Q2. How to detect the signature? Q3. How much do we lose for this Q4. How much can attackers gain? Original Problem (Public) Watermark Holder Identifying Original Poblem+ (Stego)-key (Stego)-key Watermark Holder Cover-cohstraint) Embedding Stego-Problem Problem Stego-Solution Solvin Ext Author's Signature Embedded-constraint) Author's Signature (Embedded-constrain The keyless public watermarking system. 6. In the node duplication example for fingerprinting graph coloring solutions, (see slide Fingerprinting: Node Duplication", page 4 in "Fingerprinting"), if we add a new node B' as the duplicate of node B, which nodes should B' be connected to? Check all that apply. point 7. Bob decides to use the clique manipulation method to generate fingerprinting solutions to the graph coloring problem, (see slide "Fingerprinting: Clue Manipulation", page 5 in "Fingerprinting"). He finds a clique of 4 nodes and apply the method. How many distinct solutions can Bob generate? 24 - 16 44 256 O 4 41-24 Fingerprinting: Node Duplication A" Fingerprinting: Clique Manipulat 3! 6 distinct solutions 8. In the slide "Fingerprinting: Don't Cares (I)" (page 6 in "Fingerprinting"), Alice decides to create fingerprinting copies of the original circuit by adding a new connection to the OR gate, which of the followings are correct? Check all that apply. connect signal B to the OR gate connect signal A to the OR gate connect signal X to the OR gate connect signal X to the OR gate point 9. When we use serial number as the tag for a device, which property does this tag have? Check all that apply passive unclonable reproducible intrinsic functional point 10. IC metering methods that can also be used to lock, unlock, enable, disable, or controll the IC are known as metering method active passive Fingerprinting: Don't Cares (I) # Observability don't care A- t When Y-O, siqnal X cannot be oberved XABY When Y-1, X- AB When Y-o, ODCs Functionally identical IC tags that are based on fabrication variations have the property of_a will be a good candidate to countermeasure foundry overbuilding. and therefore unclonable intrinsic reproducible extrinsig Which of the followings are the goals of IP protection? Check all that apply Protect testing data associated with the IP Trace IPs Improve the quality of the IP Protect IP against unauthorized use Ensure that the IP is compatible with other IPs point 2. You want to minimize a 4-variable function F(a, b, c, d) with two don't care conditions, ( a b c d 1) and (a d- 1,bc0) (or abcd and ab'c'dy. To embed your signature with the watermarking approach described on slide "Watermarking a Boolean Formula" (page 1 in "Watermarking Examples"), you decide to minimize F(a, b, c, d) abed instead, what is your signature? 10 01 Watermarking a Boolean Formula # Problem: Rewrite the following Boolean expression with the minimal number of literals F(a,b,c,d) - a'bc'd a'bc'd a'bcdabc'd don't care conditions: a'b'ed abcd # Goal: protect the solution (IP) # Approach: tHide one bit with each don't care condition make F(a,bic,d) 1 to hide a bit 1': make F(a,b,d,d)-O to hide a bit 'O'. 3. A good watermark will be difficult or impossible to be removed by any adversary without detailed knowledge about the watermark, this property is known as easy detectability resilience high credibility transparency point 4 A good watermark should not require major modification to the industrial design tools and design software, this property is known as transparency resilience low overhead fairness point 5 n the slide of "Public Watermarking GP Problem" (page 6 in "Good Watermarks"), which of the followings should be made to the public? Check all that apply. The rules on how each public watermarking bit will be embedded The scheme that public watermark head and body will be constructed The public watermark you want to embed in the solution The pairs of nodes selected to embed the public watermark bits Public Watermarking Problem: how to discover the embedded watermark and prove authorship? Q1. How to embed the signature? Q2. How to detect the signature? Q3. How much do we lose for this Q4. How much can attackers gain? Original Problem (Public) Watermark Holder Identifying Original Poblem+ (Stego)-key (Stego)-key Watermark Holder Cover-cohstraint) Embedding Stego-Problem Problem Stego-Solution Solvin Ext Author's Signature Embedded-constraint) Author's Signature (Embedded-constrain The keyless public watermarking system. 6. In the node duplication example for fingerprinting graph coloring solutions, (see slide Fingerprinting: Node Duplication", page 4 in "Fingerprinting"), if we add a new node B' as the duplicate of node B, which nodes should B' be connected to? Check all that apply. point 7. Bob decides to use the clique manipulation method to generate fingerprinting solutions to the graph coloring problem, (see slide "Fingerprinting: Clue Manipulation", page 5 in "Fingerprinting"). He finds a clique of 4 nodes and apply the method. How many distinct solutions can Bob generate? 24 - 16 44 256 O 4 41-24 Fingerprinting: Node Duplication A" Fingerprinting: Clique Manipulat 3! 6 distinct solutions 8. In the slide "Fingerprinting: Don't Cares (I)" (page 6 in "Fingerprinting"), Alice decides to create fingerprinting copies of the original circuit by adding a new connection to the OR gate, which of the followings are correct? Check all that apply. connect signal B to the OR gate connect signal A to the OR gate connect signal X to the OR gate connect signal X to the OR gate point 9. When we use serial number as the tag for a device, which property does this tag have? Check all that apply passive unclonable reproducible intrinsic functional point 10. IC metering methods that can also be used to lock, unlock, enable, disable, or controll the IC are known as metering method active passive Fingerprinting: Don't Cares (I) # Observability don't care A- t When Y-O, siqnal X cannot be oberved XABY When Y-1, X- AB When Y-o, ODCs Functionally identical IC tags that are based on fabrication variations have the property of_a will be a good candidate to countermeasure foundry overbuilding. and therefore unclonable intrinsic reproducible extrinsig

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Vrite 7*7*7*7 by using exponential ne ite 4^(3) in expanded form

Answered: 1 week ago

Question

=+Who are you right now, and where do you want to be?

Answered: 1 week ago