1. Which of the followings are the goals of IP protection? Check all that apply.
Ensure that the IP is compatible with other IPs
Improve the quality of the IP
Protect IP against unauthorized use
Trace IPs
Protect testing data associated with the IP
2. You want to minimize a 4-variable function F(a,b,c,d) with two don't care conditions, {a=b=c=d=1} and {a=d=1,b=c=0} (or abcd and ab′c′d). To embed your signature with the watermarking approach described on slide "Watermarking a Boolean Formula" (page 1 in "Watermarking Examples"), you decide to minimize F(a,b,c,d)+abcd instead, what is your signature?
01
11
00
10
3. A good watermark will be difficult or impossible to be removed by any adversary without detailed knowledge about the watermark, this property is known as
easy detectability
high credibility
resilience
transparency
4. A good watermark should not require major modification to the industrial design tools and design software, this property is known as
resilience
low overhead
fairness
transparency
5. In the slide of "Public Watermarking GP Problem" (page 6 in "Good Watermarks"), which of the followings should be made to the public? Check all that apply.
The public watermark you want to embed in the solution
The rules on how each public watermarking bit will be embedded
The scheme that public watermark head and body will be constructed
The pairs of nodes selected to embed the public watermark bits
6. In the node duplication example for fingerprinting graph coloring solutions, (see slide "Fingerprinting: Node Duplication", page 4 in "Fingerprinting"), if we add a new node B' as the duplicate of node B, which nodes should B' be connected to? Check all that apply.
A
D
F
B
C
E
7. Bob decides to use the clique manipulation method to generate fingerprinting solutions to the graph coloring problem, (see slide "Fingerprinting: Clique Manipulation", page 5 in "Fingerprinting"). He finds a clique of 4 nodes and apply the method. How many distinct solutions can Bob generate?
24 = 16
4
1
4! = 24
44 = 256
8. In the slide "Fingerprinting: Don’t Cares (I)" (page 6 in "Fingerprinting"), Alice decides to create fingerprinting copies of the original circuit by adding a new connection to the OR gate, which of the followings are correct? Check all that apply.
connect signal X' to the OR gate
connect signal A to the OR gate
connect signal X to the OR gate
connect signal B to the OR gate
9. When we use serial number as the tag for a device, which property does this tag have? Check all that apply.
unclonable
functional
passive
reproducible
intrinsic
10.
IC metering methods that can also be used to lock, unlock, enable, disable, or controll the IC are known as ________ metering method.
active
passive
11. IC tags that are based on fabrication variations have the property of ____________ and therefore will be a good candidate to countermeasure foundry overbuilding.
extrinsic
intrinsic
reproducible
unclonable
No comments:
Post a Comment