Advertisement

License Distribution Protocols from Optical Media Fingerprints

  • Ghaith Hammouri
  • Aykutlu Dana
  • Berk Sunar
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

According to the Business Software Alliance about 35% of the global software market, worth $141 Billion, is counterfeit. Most of the counterfeit software is distributed in the form of a compact disc (CD) or a digital video disc (DVD) which is easily copied and sold in street corners all around the world but mostly in developing countries. Given the severity of the problem at hand, a comprehensive solution taking into account the manufacturing process, economical implications, ease of enforcement, and the owner’s rights needs to be developed. While this is an enormous undertaking requiring new schemes at all levels of implementation, in this work, we focus only on a small part of the problem, i.e., secure fingerprinting techniques for optical media.

Keywords

Code Word Compact Disc Location Length Threshold Scheme Digital Right Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, in Trojan Detection Using IC Fingerprinting. Proceedings of S&P 2007, Oakland, CA, USA, 20–23 May 2007 (IEEE Computer Society, Los Alamitos, CA, 2007), pp. 296–310Google Scholar
  2. 2.
    D.W. Bauder, An Anti-Counterfeiting Concept for Currency Systems. Research Report PTK-11990, Sandia National Labs, Albuquerque, NM, USA, 1983Google Scholar
  3. 3.
    L. Carter, M. Wegman, Universal hash functions. J. Comput. Syst. Sci. 18(2), 143–154 (1979)MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    W. Clarkson, T. Weyrich, A. Finkelstein, N. Heninger, J.A. Halderman, E.W. Felten, in Fingerprinting Blank Paper Using Commodity Scanners. Proceedings of S&P 2009, Oakland, CA, May 2009 (IEEE Computer Society, Los Alamitos, CA, 2009)Google Scholar
  5. 5.
    R.P. Cowburn, J.D.R. Buchanan, Verification of authenticity. U.S. Patent Application 2007/0028093, 27 July 2006Google Scholar
  6. 6.
    G. DeJean, D. Kirovski, in RF-DNA: Radio-Frequency Certificates of Authenticity. Proceedings of CHES 2007. Lecture Notes in Computer Science, vol. 4727 (Springer, Heidelberg, 2007), pp. 346–363Google Scholar
  7. 7.
    Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetMATHCrossRefGoogle Scholar
  8. 8.
    European Computer Manufacturers’ Association, Standard ECMA-130: Data Interchange on Read-Only 120 mm Optical Data Disks (CD-ROM), 2nd edn. (ECMA, Geneva, 1996)Google Scholar
  9. 9.
    J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in FPGA Intrinsic PUFs and Their Use for IP Protection. Proceedings of CHES 2007. Lecture Notes in Computer Science, vol. 4727 (Springer, Heidelberg, 2007), pp. 63–80Google Scholar
  10. 10.
    G. Hammouri, A. Dana, B. Sunar, in CDs Have Fingerprints Too. ed. by C. Clavier, K. Gaj. Proceedings of the 11th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009) Lecture Notes in Computer Science, vol. 5747 (Springer-Verlag, Heidelberg, Germany, 2009), pp. 348–362Google Scholar
  11. 11.
    T. Ignatenko, G.J. Schrijen, B. Skoric, P. Tuyls, F. Willems, in Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. Proceedings of ISIT 2006, Seattle, WA, USA, 9–14 July 2006 (IEEE, Washington, DC, 2006), pp. 499–503Google Scholar
  12. 12.
    A. Juels, M. Sudan, A fuzzy vault scheme. Designs Codes Cryptogr. 38(2), 237–257 (2006)MathSciNetMATHCrossRefGoogle Scholar
  13. 13.
    A. Juels, M. Wattenberg, in A Fuzzy Commitment Scheme. Proceedings of CCS 1999 (ACM, New York, NY, 1999), pp. 28–36Google Scholar
  14. 14.
    C. Lee, Some properties of nonbinary error-correcting codes. IRE Trans. Inf. Theory 4(2), 77–82 (1958)CrossRefGoogle Scholar
  15. 15.
    D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200–1205 (2005)CrossRefGoogle Scholar
  16. 16.
    P.S. Ravikanth, Physical One-Way Functions. Ph.D. thesis, Department of Media Arts and Science, Massachusetts Institute of Technology, Cambridge, MA, USA, 2001Google Scholar
  17. 17.
    H. Schift, C. David, M. Gabriel, J. Gobrecht, L.J. Heyderman, W. Kaiser, S. Köppel, L. Scandella, Nanoreplication in polymers using hot embossing and injection molding. Microelectronic Eng. 53(1–4), 171–174 (2000)CrossRefGoogle Scholar
  18. 18.
    D. Stinson, F. Ameli, N. Zaino, Lifetime of Kodak Writable CD and Photo CD Media (Eastman Kodak Company, Digital & Applied Imaging, Rochester, NY, 1995)Google Scholar
  19. 19.
    P. Tuyls, G.J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, R. Wolters, in Read-Proof Hardware from Protective Coatings. Proceedings of CHES 2006. Lecture Notes in Computer Science, vol. 4249 (Springer-Verlag, Heidelberg, 2006), pp. 369–383Google Scholar
  20. 20.
    F.M.J. Willems, The context-tree weighting method: extensions. IEEE Trans. Inf. Theory 44(2), 792–798 (1998)MathSciNetMATHCrossRefGoogle Scholar
  21. 21.
    F.M.J. Willems, Y.M. Shtarkov, T.J. Tjalkens, The context-tree weighting method: basic properties. IEEE Trans. Inf. Theory 41(3), 653–664 (1995)MATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.CRIS Lab, Worcester Polytechnic InstituteWorcesterUSA
  2. 2.UNAM, Institute of Materials Science and Nanotechnology, Bilkent UniversityAnkaraTurkey
  3. 3.Cryptography & Information SecurityWorcester Polytechnic InstituteWorcesterUSA

Personalised recommendations