Skip to main content

License Distribution Protocols from Optical Media Fingerprints

  • Chapter
  • First Online:
Towards Hardware-Intrinsic Security

Part of the book series: Information Security and Cryptography ((ISC))

  • 2856 Accesses

Abstract

According to the Business Software Alliance about 35% of the global software market, worth $141 Billion, is counterfeit. Most of the counterfeit software is distributed in the form of a compact disc (CD) or a digital video disc (DVD) which is easily copied and sold in street corners all around the world but mostly in developing countries. Given the severity of the problem at hand, a comprehensive solution taking into account the manufacturing process, economical implications, ease of enforcement, and the owner’s rights needs to be developed. While this is an enormous undertaking requiring new schemes at all levels of implementation, in this work, we focus only on a small part of the problem, i.e., secure fingerprinting techniques for optical media.

A preliminary version of this chapter appeared in [10]. This material is based upon work supported by the National Science Foundation under Grant No. CNS-0831416.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    \(N(\mu,\sigma)\) is a normal distribution with mean μ and standard deviation σ.

  2. 2.

    We have verified a similar behavior for burned CDs. Not surprisingly, data coming from burned CDs had a much larger variation and were easier to analyze.

  3. 3.

    Note that all logarithms in this chapter are with respect to base 2.

  4. 4.

    For details on universal hashing the reader is referred to [3].

  5. 5.

    The definition of min-entropy is \(H_{\infty}(A)=-\log(\max_a\mathrm{Pr}[A=a])\).

  6. 6.

    Typically we use the \(|\) operator to mean concatenation. This will be the only part of the chapter where it will have a different meaning.

  7. 7.

    Recall from the proof of Proposition 1 that \(R\geq A/nf+(1-\delta/f)\) for a security level of at least \(A=\ell+2\varepsilon-2\).

  8. 8.

    Here, \(P_{\textrm{fail}}=1-\left(\sum_{i=0}^{t=43}{{255 \choose i}P_{\textrm{e}}^i(1-P_{\textrm{e}})^{255-i}}\right)^7\).

References

  1. D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, in Trojan Detection Using IC Fingerprinting. Proceedings of S&P 2007, Oakland, CA, USA, 20–23 May 2007 (IEEE Computer Society, Los Alamitos, CA, 2007), pp. 296–310

    Google Scholar 

  2. D.W. Bauder, An Anti-Counterfeiting Concept for Currency Systems. Research Report PTK-11990, Sandia National Labs, Albuquerque, NM, USA, 1983

    Google Scholar 

  3. L. Carter, M. Wegman, Universal hash functions. J. Comput. Syst. Sci. 18(2), 143–154 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  4. W. Clarkson, T. Weyrich, A. Finkelstein, N. Heninger, J.A. Halderman, E.W. Felten, in Fingerprinting Blank Paper Using Commodity Scanners. Proceedings of S&P 2009, Oakland, CA, May 2009 (IEEE Computer Society, Los Alamitos, CA, 2009)

    Google Scholar 

  5. R.P. Cowburn, J.D.R. Buchanan, Verification of authenticity. U.S. Patent Application 2007/0028093, 27 July 2006

    Google Scholar 

  6. G. DeJean, D. Kirovski, in RF-DNA: Radio-Frequency Certificates of Authenticity. Proceedings of CHES 2007. Lecture Notes in Computer Science, vol. 4727 (Springer, Heidelberg, 2007), pp. 346–363

    Google Scholar 

  7. Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  8. European Computer Manufacturers’ Association, Standard ECMA-130: Data Interchange on Read-Only 120 mm Optical Data Disks (CD-ROM), 2nd edn. (ECMA, Geneva, 1996)

    Google Scholar 

  9. J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in FPGA Intrinsic PUFs and Their Use for IP Protection. Proceedings of CHES 2007. Lecture Notes in Computer Science, vol. 4727 (Springer, Heidelberg, 2007), pp. 63–80

    Google Scholar 

  10. G. Hammouri, A. Dana, B. Sunar, in CDs Have Fingerprints Too. ed. by C. Clavier, K. Gaj. Proceedings of the 11th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009) Lecture Notes in Computer Science, vol. 5747 (Springer-Verlag, Heidelberg, Germany, 2009), pp. 348–362

    Google Scholar 

  11. T. Ignatenko, G.J. Schrijen, B. Skoric, P. Tuyls, F. Willems, in Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. Proceedings of ISIT 2006, Seattle, WA, USA, 9–14 July 2006 (IEEE, Washington, DC, 2006), pp. 499–503

    Google Scholar 

  12. A. Juels, M. Sudan, A fuzzy vault scheme. Designs Codes Cryptogr. 38(2), 237–257 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  13. A. Juels, M. Wattenberg, in A Fuzzy Commitment Scheme. Proceedings of CCS 1999 (ACM, New York, NY, 1999), pp. 28–36

    Google Scholar 

  14. C. Lee, Some properties of nonbinary error-correcting codes. IRE Trans. Inf. Theory 4(2), 77–82 (1958)

    Article  Google Scholar 

  15. D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200–1205 (2005)

    Article  Google Scholar 

  16. P.S. Ravikanth, Physical One-Way Functions. Ph.D. thesis, Department of Media Arts and Science, Massachusetts Institute of Technology, Cambridge, MA, USA, 2001

    Google Scholar 

  17. H. Schift, C. David, M. Gabriel, J. Gobrecht, L.J. Heyderman, W. Kaiser, S. Köppel, L. Scandella, Nanoreplication in polymers using hot embossing and injection molding. Microelectronic Eng. 53(1–4), 171–174 (2000)

    Article  Google Scholar 

  18. D. Stinson, F. Ameli, N. Zaino, Lifetime of Kodak Writable CD and Photo CD Media (Eastman Kodak Company, Digital & Applied Imaging, Rochester, NY, 1995)

    Google Scholar 

  19. P. Tuyls, G.J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, R. Wolters, in Read-Proof Hardware from Protective Coatings. Proceedings of CHES 2006. Lecture Notes in Computer Science, vol. 4249 (Springer-Verlag, Heidelberg, 2006), pp. 369–383

    Google Scholar 

  20. F.M.J. Willems, The context-tree weighting method: extensions. IEEE Trans. Inf. Theory 44(2), 792–798 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  21. F.M.J. Willems, Y.M. Shtarkov, T.J. Tjalkens, The context-tree weighting method: basic properties. IEEE Trans. Inf. Theory 41(3), 653–664 (1995)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghaith Hammouri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hammouri, G., Dana, A., Sunar, B. (2010). License Distribution Protocols from Optical Media Fingerprints. In: Sadeghi, AR., Naccache, D. (eds) Towards Hardware-Intrinsic Security. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14452-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14452-3_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14451-6

  • Online ISBN: 978-3-642-14452-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics