P1800 Requirements for IP Protection John Shields.

Slides:



Advertisements
Similar presentations
Overview of the SDE Protocol Presented by Ken Alonge Chair,
Advertisements

P1801 PAR Extension Motivation Address deferred issues Consider further UPF/CPF convergence SAIF integration and extension Continue to raise the abstraction.
Dave Graubart & Parminder Gill November 1, 2010
Doc.: IEEE Submission March 2004 Robert F. HeileSlide 1 PAR for b Amendment to Scope: [This amendment contains.
1 Introduction to Software Engineering Lecture 42 – Communication Skills.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Mark HahnDesign Constraints Working Group 1 1 Mark Hahn, Chair Cadence Design Systems, Inc (408) (408) (Fax)
The chapter will address the following questions:
TM Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc. All other product or service names are the property of their respective.
TM Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc. All other product or service names are the property of their respective.
UML Unified Markup Language Ziya Karakaya Atılım University, Computer Engineering
Managing Software Quality
Profiling Metadata Specifications David Massart, EUN Budapest, Hungary – Nov. 2, 2009.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Patient Protection and Affordable Care Act March 23, 2010.
1 PAR Presentation DASC meeting at DAC, June 21, 2001 Project title: A standard for an Advanced Library Format (ALF) describing Integrated Circuit (IC)
Conformance Mark Skall Lynne S. Rosenthal National Institute of Standards and Technology
An Introduction to Digital Systems Simulation Paolo PRINETTO Politecnico di Torino (Italy) University of Illinois at Chicago, IL (USA)
OpenSG Conformity IPRM Overview July 20, ITCA goals under the IPRM at a high level and in outline form these include: Organize the Test and Certification.
Comments on doing a CIM Project
© 2005 Global Grid Forum The information contained herein is subject to change without notice Leading the pervasive adoption of grid computing for research.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
1 DHCP Authentication Discussion INTAREA meeting, 70th IETF Vancouver, Canada Jari Arkko and Ralph Droms.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
Doc.: IEEE /0036r0 Submission Sept 2005 Tom Siep, Cambridge Silicon Radio PlcSlide 1 Matthew Sherman’s Comments to P&P Notice: This document.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Rosetta Study Group Report IEEE DASC. 1. Broad market potential Applications: heterogeneous model integration –ESL, System-Level Design, System Security,
Structure for Packaging, Integrating and Re-using IP within Tool-flows Study Group Status.
HDL+ Sub-Committees Chairs Meeting Vassilios Gerousis HDL+ Committee Chairman + Accellera Technical Chairman Infineon Technologies.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
PG 1 Netconf Data Model Netmod BOF – IETF 60 Sharon Chisholm – Randy Presuhn -
1 ECCF Training 2.0 Introduction ECCF Training Working Group January 2011.
1 PAR Presentation DASC meeting at DAC, June 21, 2001 Project title: A standard for an Advanced Library Format (ALF) describing Integrated Circuit (IC)
1 Quality Attributes of Requirements Documents Lecture # 25.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
STEP Tutorial: “ Fundamentals of STEP” David Briggs, Boeing January 16, 2001 ® PDES, Inc NASA STEP Workshop step.nasa.gov.
TSG-S Project Coordination Recommendations Nick Yamasaki TSG-S Chair ABSTRACT: This document presents TSG-S recommendations for improved coordination of.
1 January 25, 2016 P1800 SV Charter Maintain and enhance SystemVerilog language.
Requirement engineering & Requirement tasks/Management. 1Prepared By:Jay A.Dave.
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
Doc.: IEEE /320R0 Submission May 2003 Terry Cole, AMDSlide SDL Amendments Terry Cole, AMD WG Technical Editor.
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
Request approval from DASC for the formation of an IP Encryption Study Group Proposal prepared by: Gary Delp VSI Alliance CTO.
DASC Overview October, 2008 Victor Berman, Chair (Improv Systems) Stan Krolikoski, Vice Chair (Cadence) Kathy Werner, Secretary (Freescale) Karen Bartleson,
ISCUG Keynote May 2008 Acknowledgements to the TI-Nokia ESL forum (held Jan 2007) and to James Aldis, TI and OSCI TLM WG Chair 1 SystemC: Untapped Value.
YANG Background and Discussion: Why we need a new language for NETCONF configuration modeling The YANG Gang IETF 70 Vancouver, Canada.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Single_Radio_HO_Response_Comments Title: Response for comments on proposed.
Doc.: IEEE /0295r0 Submission March 15, 2011 Fei Tong, CSRSlide 1 Reference waveform generator for 11ac Notice: This document has been prepared.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Based on Draft 3 and 3a work in progress John Shields Mentor Graphics, Inc. P1735 Standard Overview.
Muen Policy & Toolchain
SysML v2 Formalism: Requirements & Benefits
SysML 2.0 Model Lifecycle Management (MLM) Working Group
Working Group Re-charter Draft Charter Reference Materials
Thursday’s Lecture Chemistry Building Musspratt Lecture Theatre,
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Post WG LC NMDA datastore architecture draft
Network Services Interface Working Group
Verilog-AMS Integration with P1800 SV Standard
Metadata The metadata contains
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Matthew Sherman’s Comments to P&P
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE 1850 PSL Update January 2008.
Clause 7 Comment Resolutions
STA Location for emergency call support in SSPN interface
RASGCIM Study Group Teleconference 2 Agenda
Presentation transcript:

P1800 Requirements for IP Protection John Shields

Initials, Presentation Subject, Month 2005/ Two questions n What contribution will P1735 make that affects the P1800 LRM? n What expectations does P1735 have of the P1800 WG?

Initials, Presentation Subject, Month 2005/ P1735 Charter n P1735 has been chartered by DASC to reconcile the IP Encryption and Design Protection technologies across the family of DASC sponsored standards. Our PAR specifies a “Recommended Practices” document, targeted at three communities: — IP producers looking for best practices guidance — EDA tool providers/users looking for inter-operability — Working Groups looking for subject matter experts n Working documents and status for P1735 are maintained at: —

Initials, Presentation Subject, Month 2005/ Our Contribution n Document recommended practices with detailed use cases and necessary pragma changes to enable effective use of IP protection n clarify omissions, make interpretations, and correct errors in P1800 and 1076 by liaison n recommend revisions to the “Protected Envelopes” clause. — At minimum the changes will consist of inter-operability resolutions — There is a possibility of more extensive changes to improve readability and precision n define new or revise existing pragma syntax to enable use models as required — Syntax and necessary semantics go into P1800 — Use model details are a P1735 work product n recommend enhancements to introduce a rights management and licensing framework

Initials, Presentation Subject, Month 2005/ Implications n P1735 is not re-factoring the LRMs into a common specification n We will lead on the language independent aspects n P1800 has to vet and incorporate the inputs — Continuing the relationship and process used to address the “initial vector” problem in — This discussion should give you a feel for the scope n The language specific issues are yours — This discussion has our requirements — We’ll work with you

Initials, Presentation Subject, Month 2005/ Outline n Interoperability n Rights Management n Licensing n Visibility n Flow Issues

Initials, Presentation Subject, Month 2005/ Basic Interoperability n The specified IEEE encryption isn’t interoperable for minor reasons n P1735 has a set of recommendations to resolve ambiguities and errors that affect IP exchange between vendor tools n Recent changes to export control regulations enable us to revisit the required algorithms list n Working group unanimous approval of version 1, which is roughly equivalent to a draft standard

Initials, Presentation Subject, Month 2005/ Version 1 Recommendation n Digital envelope use model with required algorithm support n Pragma versioning to manage conformance and backward compatibility n Syntax errata for and 1076 n Clarification of default behavior for tools that produce derivative outputs like synthesis

Initials, Presentation Subject, Month 2005/ Rights Management n The primary objective of rights management is IP author control over tool functionality in the flow — Example: Distributing protected IP that is freely available for simulation, but needs further rights for synthesis and layout n Licensing is viewed as a subset of rights that are granted to specific users — Needs to be integrated as part of the overall rights specification — Current license pragma is insecure and not feature oriented

Initials, Presentation Subject, Month 2005/ P1735 Licensing Model n External Model (required) — Secure RPC or client/server model — IP author provides/obtains compliant licensing technology — Reference implementation TBD n Internal Model (optional) — Relies on tool vendor licensing technology n Use cases, license verification, detailed comparision of models in P1735 WG Twiki

Initials, Presentation Subject, Month 2005/ IP Visibility n There are basic semantics at the 30K ft level — hide everything — with enough visibility for tools to satisfy their purpose n The underlying VPI information model has a few details — a protection flag for objects — some semantics for access/navigation n IP author controls are limited — Disjoint protected envelopes — Viewport is a markup syntax placeholder in SV for proprietary use — portable feature in VHDL

Initials, Presentation Subject, Month 2005/ What’s Wrong With That? n Important tool outputs are not considered n The information model only considers the 1364 subset of SV — A basic non-trivial effort is needed — more use cases than VPI access at stake n Portable visibility control is needed — Use of protected IP has to be debug able — Configuration, binding SVAs, disjoint protected regions, other flow issues…

Initials, Presentation Subject, Month 2005/ Tool Outputs n What should assertions embedded in IP do when they fire? — Be silent, be cryptic, be transparent, be controllable by the IP author? n Can coverage be gathered and reported within protected IP? n Error and Warning message issues matter — IP is rotten to the core — It has to be possible for the IP user to get tool vendor/IP author support while protecting their own proprietary data

Initials, Presentation Subject, Month 2005/ A closer look at the information model and protected HDL n IM needs to be well formed and there are missing protection semantic rules — The protect pragmas can be applied to any lexical subset of an HDL model — What semantic rules should govern partially protected constructs? n Is a partially protected composite type reasonable? n Hiding data members and methods? n Hrefs across disjoint protected regions? n IM protection semantics should serve more than just PLI — Should tool outputs and error messages have their defined access in the IM?

Initials, Presentation Subject, Month 2005/ Some Flow Issues Go Beyond 1800 n Can I bind or annotate anything into protected IP if I am given enough information (default implicit visibility rule) ? — i.e., should there be default implicit visibility rules n Do SDF files need to be generated in an encrypted form for protected blocks? n Is a tool expected to annotate unprotected SDF to an encrypted region? n What’s the access implication of the power supply network of a UPF power region that contains protected IP? P1735 needs more collaboration on such issues

Initials, Presentation Subject, Month 2005/ Summary n We’ll have inputs to be incorporated n You should focus on visibility, an improved formal information model, and deal with tool outputs n Please make your next PAR broad enough to include all this

Initials, Presentation Subject, Month 2005/

Initials, Presentation Subject, Month 2005/ Basic IP exchange Tools providing basic IP exchange consistent with this recommendation shall support the following changes to the standards: 1. In the defined identifiers table associated with the data_method pragma keyword, replace the Encryption algorithm portion of the description for the "rsa" encryption algorithm with "RSAES-PKCS1-v1_5, see IETF RFC 3447". 2. Replace IEEE Std key_block description with a restatement of key_block content from IEEE Std Extend IEEE Std to require key_public_key block be supported to accept public keys in the HDL input to encryption tools. 4. Extend IEEE Std to require key_block support in the encryption envelope for specifying additional key blocks. Tools which transform data protected by a decryption envelope shall document the protection mechanism used for data derived from the decryption envelope. If the tool claims basic IP exchange conformance for the output, the session key used for the derived data must be identical to that of the decryption envelope from which it is derived. As a further restriction, the set of key blocks that apply to the derived data shall be a subset of those that apply to the data from which it is derived. A version pragma value of no less than 1 shall be used to mark protected envelopes for encryption and/or decryption under basic IP exchange rules.