2008 International Conference on Field-Programmable Technology 2008
DOI: 10.1109/fpt.2008.4762385
|View full text |Cite
|
Sign up to set email alerts
|

Netlist-level IP protection by watermarking for LUT-based FPGAs

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(35 citation statements)
references
References 16 publications
0
35
0
Order By: Relevance
“…This methodology can be integrated in the System-on-Chip design and manufacturing flow to simultaneously obfuscate and authenticate the design. Ziener et aL [18] proposed a novel approach that can achieve the goals of zero overhead without affecting the function and performance of design .In this method details of effectively not utilized LUTs (ILUTs) details are from post layout of FPGA design flow. Pseudo random number sequence determines the location where encrypted watermarks need to be encrypted.…”
Section: A Ip Protection At Layout Levelmentioning
confidence: 99%
“…This methodology can be integrated in the System-on-Chip design and manufacturing flow to simultaneously obfuscate and authenticate the design. Ziener et aL [18] proposed a novel approach that can achieve the goals of zero overhead without affecting the function and performance of design .In this method details of effectively not utilized LUTs (ILUTs) details are from post layout of FPGA design flow. Pseudo random number sequence determines the location where encrypted watermarks need to be encrypted.…”
Section: A Ip Protection At Layout Levelmentioning
confidence: 99%
“…O�i naldes�n 32 bi t watermark 256 bi t watermark 512bi 1watermark Ci rcui 1 CeUs(sli ces) Ti mi ng(lIS) iIR(%) lIT(%) iIR(%) lIT(%) iIR(%) lIT(%) In this section, the presented method is compared with methods in literature [8] and literature [11] for performance evaluation. Take MD5 core as test circuit, we sample the experiment results after embedding 32bit, 64bit, 1 28bit, 256bit and 5l 2bit watermark respectively using our method, methods in literature [8] and literature [1 1 ].…”
Section: Tabl the Change Rate Of Resource And Timing After Watermarkmentioning
confidence: 99%
“…On the basis of FPGA design flow, specific watermark could be inserted into any design level for ownership identification [4][5][6][7][8][9][11][12]. 1.…”
Section: Introductionmentioning
confidence: 99%
“…Currently there are various types of FPGA-based watermarking schemes in practise [8][9][10][11][12][13]. Further these watermarking schemes are employed at different abstraction levels of FPGA design flow like the physical design level [14][15][16][17], structural level [18][19][20][21] and behavioural level [22][23], in order to provide the required intellectual property protection of the FPGA IP cores. Also there are various fingerprinting techniques available for the FPGA IP core protection [24][25][26].…”
Section: Introductionmentioning
confidence: 99%