240 likes | 263 Views
Explore the innovative approach of computational forensic engineering as an alternative to watermarking for protecting intellectual property. Learn how intrinsic properties analysis can deduce production processes without embedded information, providing zero overhead. Discover the goal of problem definition, foundational development, and practical demonstration. Benefit from solutions for isomorphic problem variants, feature extraction, clustering, and validation algorithms. Enhance your understanding of clustering, validation, Boolean satisfiability algorithms, and experimental results in forensic engineering applications.
E N D
Statistical Forensic Engineering Techniques for Intellectual Property Protection Jennifer L. Wong†, Darko Kirovski*, Miodrag Potkonjak† †UCLA Computer Science Department University of California, Los Angeles, CA *Microsoft Research, Redmond, WA IHW, April 2001
Computational Forensic Engineering • Alternative to watermarking for IPP • Analyze intrinsic properties to deduce process of production • Resolves legacy issue • Zero overhead • Goal: Define problem, develop sound foundations, demonstrate in practice
Forensic Resolves legacy issue No info embedded Zero overhead Many applications Watermarking IPP only Embed information Control level of information Fingerprinting Fast / Easy to detect Watermarking vs. Forensic
Related Work • Java Byte Codes (Baker &Manber 98) • Software Obfuscation (Collberg 99) • Reverse Engineering (Kuhn &Anderson 97, Maher 97) • Information Recovery (Gutmann 96) • Disk & Semi conductor memory
. . Isomorphic problem variants of P Feature Extraction Clustering Validation Algorithm 1 Solution provided for each problem instance P and algorithm A Algorithm 2 Algorithm N Generic Approach: Data Collection Data Collection Original Problem Instance P Original Problem Instance P Isomorphic problem variants of P Perturbations Perturbations Algorithm 1 Solution provided for each problem instance P and algorithm A Algorithm 2 Algorithm N
Feature Extraction Clustering Validation Generic Approach: Feature Extraction Data Collection • Extract property information from solutions • Identify Relevant Properties • Quantify Relevant Properties • Develop Fast Algorithm for Property Extraction
Feature Extraction Clustering Validation Generic Approach: Clustering Data Collection • Partitioning of n-dimensional space • NP-complete problem
Feature Extraction Clustering Validation Generic Approach: Clustering Data Collection
Feature Extraction Clustering Validation Generic Approach: Validation Data Collection • Estimation and Validation Techniques • Nonparametric Statistical Techniques • Resubstitution
Boolean Satisfiability Properties • Percentage of Non-Important Variables • Ratio of True Assigned Variables vs. Total Number of Variables in a Clause • Ratio of Coverage using True and False Appearance of a Variable • Clausal Stability
Boolean Satisfiability Algorithms • Max/Min • Constructive • Clause oriented • Maximally constrained • Small clauses • Variable: appearance ratio not in favor • Minimally constraining • Assign var who does the least amount of damage
Boolean Satisfiability Algorithms • GSAT (Selman ‘92) • Iterative Improvement • Variable oriented • Initial random assignment • Maximize satisfied number of clauses by flipping initial assignment
Boolean Satisfiability Algorithms • Maximum Variable Benefit • Constructive • Variable oriented • Weighted clause appearance
Experimental Results • Boolean Satisfiability • NTAB, GSAT, Rel_SAT_rand • % of non-important variables • Ratio of true assigned variables
Experimental Results: Boolean Satisfiability -% of Non-Important Variables
Forensic Engineering Applications • Intellectual Property Protection • Efficient Algorithm Selection • Algorithm Tuning • Instance Partitioning • Benchmark Selection
Advancements • Properties of an Instance • Clause difficulty • Variable appearance ratio • Likelihood of a constraint to be satisfied • Calibration of Properties • Instance properties: classify the instances • Solution properties: calibrated per instance → proper perspective for the algorithm classification • Classification of “Not seen algorithm”
Non-important Variables weighted average of “short ”clauses
Clausal Stability weighted average of “short ”clauses
Conclusion • Intrinsic Information Hiding • Attractive IPP technique • Alternative applications • In search for new applications and new techniques