{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:01:15Z","timestamp":1761580875745},"reference-count":18,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T00:00:00Z","timestamp":1301961600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["VLSI Design"],"published-print":{"date-parts":[[2011,4,5]]},"abstract":"<jats:p>Increased design complexity, shrinking design cycle, and\nlow cost\u2014this three-dimensional demand mandates advent\nof system-on-chip (SoC) methodology in semiconductor industry.\nThe key concept of SoC is reuse of the intellectual\nproperty (IP) cores. Reuse of IPs on SoC increases the risk\nof misappropriation of IPs due to introduction of several\nnew attacks and involvement of various parties as adversaries.\nExisting literature has huge number of proposals\nfor IP protection (IPP) techniques to be incorporated in the\nIP design flow as well as in the SoC design methodology.\nHowever, these are quite scattered, limited in possibilities in\nmultithreat environment, and sometimes mutually conflicting.\nExisting works need critical survey, proper categorization,\nand summarization to focus on the inherent tradeoff,\nexisting security holes, and new research directions. This\npaper discusses the IP-based SoC design flow to highlight\nthe exact locations and the nature of infringements in the\nflow, identifies the adversaries, categorizes these infringements,\nand applies strategic analysis on the effectiveness of\nthe existing IPP techniques for these categories of infringements.\nIt also clearly highlights recent challenges and new\nopportunities in this emerging field of research.<\/jats:p>","DOI":"10.1155\/2011\/731957","type":"journal-article","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T19:33:53Z","timestamp":1302032033000},"page":"1-10","source":"Crossref","is-referenced-by-count":13,"title":["SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection"],"prefix":"10.1155","volume":"2011","author":[{"given":"Debasri","family":"Saha","sequence":"first","affiliation":[{"name":"Advanced Computing and Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India"}]},{"given":"Susmita","family":"Sur-Kolay","sequence":"additional","affiliation":[{"name":"Advanced Computing and Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India"}]}],"member":"98","reference":[{"key":"1","year":"2009"},{"key":"2","year":"2008"},{"key":"3","year":"1999"},{"key":"4","year":"2000"},{"key":"5","year":"2009"},{"key":"6","year":"2003"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/43.952740"},{"key":"8","year":"2010"},{"key":"10","year":"1996"},{"key":"14","first-page":"112","year":"2008","journal-title":"Proceedings of the Information Hiding"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2009.05.003"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.896914"},{"issue":"1, article 5","key":"28","volume":"2","year":"2009","journal-title":"ACM Transactions on Reconfigurable Technology and Systems"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.927732"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/43.952741"},{"issue":"1","key":"36","volume":"2","year":"2009","journal-title":"ACM Transactions on Reconfigurable Technology and Systems"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.9.1932"}],"container-title":["VLSI Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/archive\/2011\/731957.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/archive\/2011\/731957.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/archive\/2011\/731957.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T06:22:36Z","timestamp":1607494956000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/vlsi\/2011\/731957\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,5]]},"references-count":18,"alternative-id":["731957","731957"],"URL":"https:\/\/doi.org\/10.1155\/2011\/731957","relation":{},"ISSN":["1065-514X","1563-5171"],"issn-type":[{"value":"1065-514X","type":"print"},{"value":"1563-5171","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,5]]}}}