Pages

Wednesday, January 25, 2017

Hardware Quiz 2

1. Which of the followings are the goals of IP protection? Check all that apply.

Ensure that the IP is compatible with other IPs

Improve the quality of the IP

Protect IP against unauthorized use

Trace IPs

Protect testing data associated with the IP


2. You want to minimize a 4-variable function F(a,b,c,d) with two don't care conditions, {a=b=c=d=1} and {a=d=1,b=c=0} (or abcd and ab′c′d). To embed your signature with the watermarking approach described on slide "Watermarking a Boolean Formula" (page 1 in "Watermarking Examples"), you decide to minimize F(a,b,c,d)+abcd instead, what is your signature?

01

11

00

10


3. A good watermark will be difficult or impossible to be removed by any adversary without detailed knowledge about the watermark, this property is known as

easy detectability

high credibility

resilience

transparency


4. A good watermark should not require major modification to the industrial design tools and design software, this property is known as

resilience

low overhead

fairness

transparency


5. In the slide of "Public Watermarking GP Problem" (page 6 in "Good Watermarks"), which of the followings should be made to the public? Check all that apply.

The public watermark you want to embed in the solution

The rules on how each public watermarking bit will be embedded

The scheme that public watermark head and body will be constructed

The pairs of nodes selected to embed the public watermark bits


6. In the node duplication example for fingerprinting graph coloring solutions, (see slide "Fingerprinting: Node Duplication", page 4 in "Fingerprinting"), if we add a new node B' as the duplicate of node B, which nodes should B' be connected to? Check all that apply.

A

D

F

B

C

E


7. Bob decides to use the clique manipulation method to generate fingerprinting solutions to the graph coloring problem, (see slide "Fingerprinting: Clique Manipulation", page 5 in "Fingerprinting"). He finds a clique of 4 nodes and apply the method. How many distinct solutions can Bob generate?

24 = 16

4

1

4! = 24

44 = 256


8. In the slide "Fingerprinting: Don’t Cares (I)" (page 6 in "Fingerprinting"), Alice decides to create fingerprinting copies of the original circuit by adding a new connection to the OR gate, which of the followings are correct? Check all that apply.

connect signal X' to the OR gate

connect signal A to the OR gate

connect signal X to the OR gate

connect signal B to the OR gate


9. When we use serial number as the tag for a device, which property does this tag have? Check all that apply.

unclonable

functional

passive

reproducible

intrinsic

10.
IC metering methods that can also be used to lock, unlock, enable, disable, or controll the IC are known as ________ metering method.

active

passive


11. IC tags that are based on fabrication variations have the property of ____________ and therefore will be a good candidate to countermeasure foundry overbuilding.

extrinsic

intrinsic

reproducible

unclonable

No comments:

Post a Comment