Review Article
SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection
Table 1
Effectiveness of IPP techniques for the following security aspects.
| IPP techniques | Access control | Authentication | Trojan detection | IP | IC | Data from IC | IP | IC | From design | From hardware |
| Charbon and Torunoglu 2000 [10] | Y | | | | | | |
| Adi et al. 2006 [12] | Y | | | | | | |
| Saha and Sur-Kolay 2009 [13] | Y | | | | | | |
| Roy et al. 2008 [14] | | Y | | | | | |
| Alkabani et al. 2008 [15] | | Y | | | | | |
| Alkabani and Koushanfar 2007 [16] | | Y | | | | | |
| Alkabani et al. 2007 [17] | | Y | | | Y | | |
| Chakraborty and Bhunia 2009 [18] | | Y | | | Y | | |
| Granado-Criado et al. 2010 [19] | | | Y | | | | |
| Dyka and Langendoerfer 2005 [20] | | | Y | | | | |
| Suzuki et al. 2004 [21] | | | Y | | | | |
| Deng et al. 2009 [23] | | | Y | Y | | | |
| Castillo et al. 2007 [24] | | | | Y | | | |
| Abdel-Hamid et al. 2005 [25] | | | | Y | | | |
| Saha and Sur-Kolay 2010 [26] | | | | Y | | | |
| Majzoobi and Koushanfar 2009 [27] | | | | | Y | | |
| Agrawal et al. 2007 [28] | | | | | Y | | Y |
| Cui et al. 2008 [29] | | | | Y | | | |
| Lach et al. 2001 [30] | | | | Y | Y | | |
| Gu et al. 2009 [31] | | | | | | Y | |
| Li and Lach 2008 [32] | | | | | Y | | Y |
| Potkonjak et al. 2009 [33] | | | | | | | Y |
| Wei et al. 2010 [34] | | | | | | | Y |
| Dutt and Li 2009 [35] | | | | | | Y | Y |
| Potkonjak 2010 [36] | | | | | | Y | |
|
|