Abstract
According to the Business Software Alliance about 35% of the global software market, worth $141 Billion, is counterfeit. Most of the counterfeit software is distributed in the form of a compact disc (CD) or a digital video disc (DVD) which is easily copied and sold in street corners all around the world but mostly in developing countries. Given the severity of the problem at hand, a comprehensive solution taking into account the manufacturing process, economical implications, ease of enforcement, and the owner’s rights needs to be developed. While this is an enormous undertaking requiring new schemes at all levels of implementation, in this work, we focus only on a small part of the problem, i.e., secure fingerprinting techniques for optical media.
A preliminary version of this chapter appeared in [10]. This material is based upon work supported by the National Science Foundation under Grant No. CNS-0831416.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
\(N(\mu,\sigma)\) is a normal distribution with mean μ and standard deviation σ.
- 2.
We have verified a similar behavior for burned CDs. Not surprisingly, data coming from burned CDs had a much larger variation and were easier to analyze.
- 3.
Note that all logarithms in this chapter are with respect to base 2.
- 4.
For details on universal hashing the reader is referred to [3].
- 5.
The definition of min-entropy is \(H_{\infty}(A)=-\log(\max_a\mathrm{Pr}[A=a])\).
- 6.
Typically we use the \(|\) operator to mean concatenation. This will be the only part of the chapter where it will have a different meaning.
- 7.
Recall from the proof of Proposition 1 that \(R\geq A/nf+(1-\delta/f)\) for a security level of at least \(A=\ell+2\varepsilon-2\).
- 8.
Here, \(P_{\textrm{fail}}=1-\left(\sum_{i=0}^{t=43}{{255 \choose i}P_{\textrm{e}}^i(1-P_{\textrm{e}})^{255-i}}\right)^7\).
References
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, in Trojan Detection Using IC Fingerprinting. Proceedings of S&P 2007, Oakland, CA, USA, 20–23 May 2007 (IEEE Computer Society, Los Alamitos, CA, 2007), pp. 296–310
D.W. Bauder, An Anti-Counterfeiting Concept for Currency Systems. Research Report PTK-11990, Sandia National Labs, Albuquerque, NM, USA, 1983
L. Carter, M. Wegman, Universal hash functions. J. Comput. Syst. Sci. 18(2), 143–154 (1979)
W. Clarkson, T. Weyrich, A. Finkelstein, N. Heninger, J.A. Halderman, E.W. Felten, in Fingerprinting Blank Paper Using Commodity Scanners. Proceedings of S&P 2009, Oakland, CA, May 2009 (IEEE Computer Society, Los Alamitos, CA, 2009)
R.P. Cowburn, J.D.R. Buchanan, Verification of authenticity. U.S. Patent Application 2007/0028093, 27 July 2006
G. DeJean, D. Kirovski, in RF-DNA: Radio-Frequency Certificates of Authenticity. Proceedings of CHES 2007. Lecture Notes in Computer Science, vol. 4727 (Springer, Heidelberg, 2007), pp. 346–363
Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)
European Computer Manufacturers’ Association, Standard ECMA-130: Data Interchange on Read-Only 120 mm Optical Data Disks (CD-ROM), 2nd edn. (ECMA, Geneva, 1996)
J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in FPGA Intrinsic PUFs and Their Use for IP Protection. Proceedings of CHES 2007. Lecture Notes in Computer Science, vol. 4727 (Springer, Heidelberg, 2007), pp. 63–80
G. Hammouri, A. Dana, B. Sunar, in CDs Have Fingerprints Too. ed. by C. Clavier, K. Gaj. Proceedings of the 11th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009) Lecture Notes in Computer Science, vol. 5747 (Springer-Verlag, Heidelberg, Germany, 2009), pp. 348–362
T. Ignatenko, G.J. Schrijen, B. Skoric, P. Tuyls, F. Willems, in Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. Proceedings of ISIT 2006, Seattle, WA, USA, 9–14 July 2006 (IEEE, Washington, DC, 2006), pp. 499–503
A. Juels, M. Sudan, A fuzzy vault scheme. Designs Codes Cryptogr. 38(2), 237–257 (2006)
A. Juels, M. Wattenberg, in A Fuzzy Commitment Scheme. Proceedings of CCS 1999 (ACM, New York, NY, 1999), pp. 28–36
C. Lee, Some properties of nonbinary error-correcting codes. IRE Trans. Inf. Theory 4(2), 77–82 (1958)
D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200–1205 (2005)
P.S. Ravikanth, Physical One-Way Functions. Ph.D. thesis, Department of Media Arts and Science, Massachusetts Institute of Technology, Cambridge, MA, USA, 2001
H. Schift, C. David, M. Gabriel, J. Gobrecht, L.J. Heyderman, W. Kaiser, S. Köppel, L. Scandella, Nanoreplication in polymers using hot embossing and injection molding. Microelectronic Eng. 53(1–4), 171–174 (2000)
D. Stinson, F. Ameli, N. Zaino, Lifetime of Kodak Writable CD and Photo CD Media (Eastman Kodak Company, Digital & Applied Imaging, Rochester, NY, 1995)
P. Tuyls, G.J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, R. Wolters, in Read-Proof Hardware from Protective Coatings. Proceedings of CHES 2006. Lecture Notes in Computer Science, vol. 4249 (Springer-Verlag, Heidelberg, 2006), pp. 369–383
F.M.J. Willems, The context-tree weighting method: extensions. IEEE Trans. Inf. Theory 44(2), 792–798 (1998)
F.M.J. Willems, Y.M. Shtarkov, T.J. Tjalkens, The context-tree weighting method: basic properties. IEEE Trans. Inf. Theory 41(3), 653–664 (1995)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Hammouri, G., Dana, A., Sunar, B. (2010). License Distribution Protocols from Optical Media Fingerprints. In: Sadeghi, AR., Naccache, D. (eds) Towards Hardware-Intrinsic Security. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14452-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-14452-3_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14451-6
Online ISBN: 978-3-642-14452-3
eBook Packages: Computer ScienceComputer Science (R0)