06 watermarking of hw ips - university of floridatehranipoor.ece.ufl.edu/06 watermarking of hw...

43
1 Watermarking of HW IPs/ Secure IP Introduction to Hardware Security & Trust Mark Tehranipoor University of Florida

Upload: others

Post on 09-Oct-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

11

Watermarking of HW IPs/ Secure IP

Introduction to Hardware Security & Trust

Mark TehranipoorUniversity of Florida

Page 2: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

2

Contents

IP Piracy

HW IP

Secure IP

ReverseEngineeringIP Cloning

Attacks and

Defenses

Constraint Additive

SecurityTaggingWatermarking Encryption

FPGA

Military

Don’t Care

Over-production

PowerAnalysis

Testbased

Placeand

Route

PeriodicLicensing

Attacks Solutions

Wifi System on Chip (GainSpan)

Different levels of abstraction

and chip levels

Page 3: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

3

Hardware Intellectual Property (HW IP)

n Why HW IP?q Design reuseq System-on-Chip (SoC)q FPGA

n Playersq IP designerq System integratorq Foundry

n What qualifies as an HW IP?q HDL code, GDSII, netlist,

layout, technique, ...

IP Designer

SystemIntegrator Foundry

Figure from http://pdf.directindustry.com/pdf/cypress-semiconductor/cypress-psoc-programmable-system-on-chip-brochure/34220-70363.html

Page 4: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

4

HW IP Lexicon

n Soft IPsq HDL codes

n Firm IPsq Placed RTL designq Fully placed netlist

n Hard IPsq GDSII file

Figure from http://www.artwork.com/gdsii/gdsfilt/apd_note/apd_note.htm

GDSII file HDL code

Page 5: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

5

IP Piracy: Vulnerabilities

n ICs:q Reverse engineering

n Hard IPsq Overproductionq Reverse engineeringq Cloning of FPGA bitstream

n Firm and Soft IPsq Overusageq Cloningq Reverse engineering

Page 6: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

6

IP Piracy: Threats

n IP Overusageq Use more than contracted to (Attacker: SOC Integrator)

n IP Modificationq Modify an IP from 3PIP vendor, sell as a new IP to other SoC

integrators (Attacker: SOC Integrator)

n IP Cloningq Use of HW IPs without license (Attacker: SOC Integrator)

n Production of compatible IPs are not IP cloning

n Overproductionq By foundry

Page 7: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

7

IP Piracy: Threats, cont'

n Reverse Engineeringq By 3rd party system integratorq On hardware: is often legal

n Often used to determine infringementn Often banned in software end-user license agreement (EULA)

q Typesn In order to make cloning possiblen Also is crucial in attacking secure IP designs

q Methodsn IO analysisn Decap, Delayer, SEMn Thermal imaging

Page 8: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

8

Approaches to Secure IP

n Prevention/Protectionq Chemical (Military)

n in military applications chemicals and other self-destruct devices are used to protect the military secrets

q Obfuscation

q Expiration of Servicen Periodic licensing

n Trojan insertion (Kill Switch?)

q Encryptionn FPGA bitstream

Page 9: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

9

Approaches to Secure IPn Detection/Identification

q "Stolen from Apple"q Watermarkingq Security tagging

"Stolen from Apple" icon in MacIntosh® ROM, inserted after Apple v. Franklin Computerslawsuit, intended as identification method

In 1980, a company called Franklin Computer produced a clone of the Apple II called the Franklin Ace, designed to run the same software. They copied almost every detail of the Apple II, including all of its ROM based software and all the documentation, and sold it at a lower price than Apple. We even found a place in the manual where they forgot to change "Apple" to "Ace". Apple was infuriated, and sued Franklin. They eventually won, and forced Franklin to withdraw the Ace from the market.

After the incident with Franklin, Steve Jobs decided to protect the ROM by embedding a small token into it that could be displayed in court during a trial. The idea was that he would be able to enter a few keystrokes on the offending machine and display the token, proving unequivocally that the ROM was stolen from Apple.

Page 10: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

10

Secure IP Design Goals

n Robustnessq Higher predictable performanceq More design flexibility

n Overheadq Less risksq Acceptable constraint

n Tradeoffq Pre-processing: more robustness, more overheadq Post-processing: less overhead, less robustness

Page 11: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

Obfuscation

n Denies unlicensed usage

n Normal functional behavior is enabled only after application of a specific input sequence or keyq Inserting finite state machine to obfuscate IOq Insert a key to unlock logic block

Page 12: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

P0 P1

P2Start

S1

S0 S2 S6

S7S8

S3

S4 0

Obfuscated Mode(Incorrect function)

Normal Mode(Correct function)

R2 R3

R6

R5

R4

R1

M2

n2 n΄2

g2

State Elements (SE)

Inserted FSM

f2

M1

n1 n΄1

g1

f1

M3

n3 n΄3

g3

f3

Pri

mar

y In

puts

Prim

ary Outputs

Inserted SE

Combinational Logic

Modification Cell

S3S4

P3P4

P5

S0 S1 TkT1 T2 Sn

Original SE

Enabling Key: {P0, P1, P2}

Basic Idea:● A locking approach where

normal behavior is enabledonly upon appn. of a key

● Provable robustness

Protects against Piracy, RE & Tampering

Key Innovations:● It obfuscates the state

space AND the comb. logic● Uses rich theory of

automata to transform the state space & associated logic

State Space Obfuscation

Page 13: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

13

Secure IP: Periodic Licensing

n System compositionq License tokenq License controllerq Timerq Non-volatile memory

n Goalq Disable the IP when expire/fail to access

n Methodq Encrypted token (Encryption)

Page 14: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

14

Encryption: Secure FPGA

n Why is FPGA vulnerable?q Configuration bitstream stored in EPROM or Flash

n When power on -> download

n When power off -> removed

n Encryptionq Used to prevent interception (Prevention)

q Limitations:

n Key is exposed to a lot of people.

n Battery is needed to�power on the Encryption key.

n Vulnerable to side channel attacks.

Page 15: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

15

Encryption: Secure FPGA, cont'n One Time Programmable FPGA

q No encryption and on-site battery is neededq Configuration data is permanently burned in chip.q Based on Antifuse technology.q Limitations:

n Expensiven Inflexiblen Difficult to test

n Non-volatile Reprogrammable FPGAq Configuration data stored in on-chip non-volatile memory.q Robust security scheme prevents readback of configuration data.q Present technology even prevents direct probing of the memory cell.q Limitations:

n Extra non-standard voltages are needed to reprogramming.

Page 16: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

16

Secure IP: Security Tagging

n System compositionq Tag to transmit label of the IP coreq Detector to identify that label

n Goalq Identify the existence of the IP core and determine its

versionn Method

q E.g., Covert transmission channel (obfuscation)

Page 17: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

17

Secure IP: Watermarking

n Why Watermarking?q Uniquely identify IP Coresq Ease of detection of piracy and counterfeitingq Trace pirated parts back to the sourceq Deter piracy

Page 18: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

18

Digital vs. IP Watermarking

n Digital Watermarkingq Performed on data: Image, audio, video, ...q Insert unique signature into the dataq Data carries a unique identifierq Invasive: the data is altered by the watermark

Page 19: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

19

Watermarking Validation

Page 20: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

20

Digital vs. IP Watermarking Example

n Cartographer’s Watermark

q "Trap streets" can be used on maps

q However, this cannot enter navigational data (e.g.

GPS) lest hurt the functionality

Page 21: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

21

Digital vs. IP Watermarking

n IP Watermarkingq Performed on IP (RTL,

Gate level, or GDSII)

q Noninvasive: data can't be altered otherwise the function will be altered

Page 22: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

22

IP Core Watermarking: Principles

n Must not alter the functionality of the IP Core

n Performance degradation should be unnoticeable

n Should be hard to detect or remove

n Overall goal: high probability of authorship

Page 23: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

23

Topics in IP Watermarking

n Major approachesq Constraint-based watermarkingq Additive watermarking

n Evaluation of watermarking techniquen Method of application

q Test-based watermarkingq Don’t Care Condition watermarkingq Power Analysis watermarkingq Placement and Route-based watermarking

n Attacking and defending watermarks

Page 24: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

24

IP Watermarking Flow

Page 25: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

25

Additive Watermarkingn Method

q Done at source code level, independent from layout constraints

q Implanted into functional logic so as to prevent removaln Advantage

q Strength easily adjustableq Hard to discover or removeq Easy to read in stego key

n Stego key refers to key used to encrypt/decrypt author signatures.n Weaknesses

q Could potentially incur area overhead, depending on the implementation

q Could degrade performance

Page 26: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

26

Don�t-Care Condition Based Watermarking

n Method formulationq Function blocks that have unneeded input

combinationsq Outputs to these input combinations can be forcedq Don’t care: in Logic and FSM

n Applicationq To assert a �1�, add one such input combinationq To assert a �0�, remove this input combination

n Exampleq Original functionq To assert , change it to

( ) dcbbdacbadcbaf ++=,,,

'1'=dcba ( ) dcbadcbbdacbadcbaf +++=,,,

Page 27: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

27

Constraint Based Watermarking

n Author’s signature à a set of constraintsq Watermarking constraints in addition to functional

constraintsq More constraints, higher probability of authorship

n Choice of constraint must not impact performance

A stego solution

Page 28: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

28

Constraint Based Watermarking, cont�

n Example methodsq Unused CLB (Combinational Logic Block) blocks q Path timing constraints

CryptographyFunctions

Signature

Stego Key

Original Problem(IP Core Function)

Embedded Problem(IP Core function+

Watermark)

CryptographyFunctionsSignature

Page 29: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

29

Advantages and Disadvantages

n By constraining CLB blockq - Easy to discover through reverse engineeringq - Easy to remove from bitstreamq + No performance degradation and minimal area

overheadn By constraining path timing

q + Sub path can also be usedq + Hard to detect or removeq + No performance degradation, minimal area

overhead

Page 30: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

30

Testing based Watermarkingn Method

q Add watermark to the test circuitry at functional level

n Extractionq Switch to scan more, scan out

the signaturen Advantage

q Very tough to removen Weaknesses

q Potentially large area overhead, depending on the implementation

q Power consumption overhead

Example: 1. Run the circuit in

function mode for some number of clock cycles

2. Switch to test mode3. Scan out the content

Page 31: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

31

Other Testing based Watermarking

n Methodsq Apply watermark as a header

n Easy to implement, but easy to remove

q Pseudorandom bit insertionn Harder to implement, added obscurity

q XOR the watermark and test bitsn Easy to implement, secure, but prone to errors

Page 32: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

32

Power Analysis Watermarking

n Methodq Add components that draw power at certain frequencies

(not multiples of clock)n Extraction

q Monitor the power supply pin on the ICq Dynamic power consumption magnitude will be higher at

certain frequenciesn Advantage

q Very tough to removen Weaknesses

q Large area overheadq Power consumption overhead

n Depending on the implementation

Page 33: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

33

Place-and-Route based Watermarking

n Method

q Region and grouping constraints

n Constrain the physical placement of standard cells

n Can cause performance degradation when not used properly

q Row placement constraints

n Deliberately place standard cells in even or odd rows of the

layout with a grid abstraction

Page 34: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

34

Place-and-Route based Watermarking, cont�

n Advantageq + Negligible area overheadq + Strong proof of authorship easily attainable

n Coincidence chance = 1 over 2 to the power of number of blocks placed

q Removal or circumvention will most likely render the IP Core uselessn IP core thus protected are hard/firm IP, therefore tampering

requires reverse engineering its soft IP

n Weaknessq Not applicable to soft IP

Page 35: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

35

Attacking and Defending Watermarks

n Attacksq Ghost Signaturesq Tamperingq Forging

n Defensesq Watermark Obfuscationq Multiple Small Watermarksq Parity in Watermarks

Page 36: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

36

Ghost Signatures

n Intention: To announce a watermark when there is noneq So that you may announce it contains your watermark

as welln Methods

q Starting from solution characteristics, try to figure out the input pattern from current solution

q Try different signatures, hope for a collisionn Unlikely

q Addition of a new signaturen Easy to disprove

Page 37: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

37

Tampering

n Alter, damage, or remove the watermarkq Prohibitively large amount of effort required

n Move backwards through design phaseq Keep going back until before the watermark was

added, then remove or replace it at will

n Depend heavily on reverse engineering previous design steps

Page 38: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

38

Forging

n Objective: to subvert proprietor's watermark by inappropriately watermarking other solutions with proprietor's watermark

n Need to Steal the Private Key of an IP Author

n Usually prevented by encryption

Page 39: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

39

Defense Against Attacks on Watermark

n Watermark Obfuscationq Against tamperingq Make watermark harder to detect

n Multiple Small Watermarksq Against tamperingq Make watermark harder to alter

n Parity in Watermarksq Against tamperingq Detect and repair tamperingq Often use XOR for parity check (whether sum is odd

or even)

Page 40: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

40

Evaluation of Watermarking Techniques

n Proof of Authorshipq As low as possible

n Err on overestimation when exact value is hard to calculate

[ ]å =- --

=£ºb

iiiC

c

ppiiCC

bXPP

0)1(*)(*)!)!*/(!(

)(

‘p’ - probability of satisfying one random constraint by coincidence.‘C’ - number of imposed constraints.‘b’ - number of constraints unsatisfied.‘x’ - random variable, represents how many of the ‘c’ constraints were not satisfied.

Page 41: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

41

Boolean Satisfiability Problem (SAT)

n Set of Variables q U={u1, u2, ..., un}q ui = 1 or 0, i∈[1,n]

n Clausesq Means logic OR; for example {u1,u2} means u1|u2

n Satisfiabilityq Is there an assignment of U that satisfy all clauses?

n Example}},{},{},,{{};,{ 2112121 uuuuuCuuU ==

}},{},{},,{{};,{ 2112121 uuuuuCuuU ==

Example from ref[1]

Page 42: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

Method to Add Constraint

n Assuming function of the IP is described by example problem to the right

n Task: To modify this SAT problem so thatq Any solution to modified

problem satisfies old problem

q Both modified problem and solution contain information uniquely identifying author

Figure from ref[1]

Page 43: 06 Watermarking of HW IPs - University of Floridatehranipoor.ece.ufl.edu/06 Watermarking of HW IPs.pdfq Watermarking q Security tagging "Stolen from Apple" icon in MacIntosh® ROM,

43

Referencesn A. Kahng and J. Lach, "Constraint-Based Watermarking Techniques for Design IP Protection" in IEEE Transactions on

Computer-Aided Design of Integrated Circuits and Systems, vol. 20, October 2001

n A. Kahng and W. Mangione-Smith, "Watermarking Techniques for Intellectual Property Protection" in Proceedings of the 35th Design Automation Conference (DAC98), June 15-19 1998

n D. Ziener and S. Aßmus, "Identifying FPGA IP-Cores Based on Lookup Table Content Analysis", 2006 IEEE Xplore

n J. Lach and W. Magione-Smith, "Signature Hiding Techniques for FPGA Intellectual Property Protection", 1998 ACM

n J. Lach and W. Magione-Smith, "Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks", 1999 ACM

n D. Zeiner and Jurgen Teich, "FPGA Core Watermarking Based on Power Signature Analysis", 2006 IEEE

n Y. Fan, "Testing-Based Watermarking Techniques for Intellectual-Property Identification in SOC Design", March 2008 IEEE Transactions

n Narasimhan, S.; Chakraborty, R.; Bhunia, S.; , "Hardware IP Protection During Evaluation Using Embedded Sequential Trojan," Design & Test of Computers, IEEE , vol.PP, no.99, pp.1, 0

n Chakraborty, R.S.; Bhunia, S.; , "RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation," VLSI Design, 2010. VLSID '10. 23rd International Conference on , vol., no., pp.405-410, 3-7 Jan. 2010