2015
DOI: 10.1109/tifs.2015.2455338
|View full text |Cite
|
Sign up to set email alerts
|

Ultra-Low Overhead Dynamic Watermarking on Scan Design for Hard IP Protection

Abstract: Unlike conventional legal means, digital watermark enables an effective self-protection mechanism for VLSI designers to protect their intellectual property (IP). However, existing watermarking techniques come with unpredictable and often high design and performance overhead which makes them impractical. In this paper, we propose an ultra-low overhead watermarking scheme to protect hard IPs, the dominating form of commercial IPs. Our approach is based on the observation that an optimized scan design uses both Q… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(20 citation statements)
references
References 30 publications
0
20
0
Order By: Relevance
“…In this section, the design of a mapping function to trace the content of IP circuit trading under the Blockchain environment is discussed, where a circuit can be protected by adding a watermark. As an attacker intends to destroy the content of IP trading, he should attack the watermark in the IP circuit first, given that the copyright requires verification, the traceable mapping function can be used to restore the impaired information [16]- [18]. The mathematical model of quadratic matrix transformation is defined as follows.…”
Section: Mathematical Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, the design of a mapping function to trace the content of IP circuit trading under the Blockchain environment is discussed, where a circuit can be protected by adding a watermark. As an attacker intends to destroy the content of IP trading, he should attack the watermark in the IP circuit first, given that the copyright requires verification, the traceable mapping function can be used to restore the impaired information [16]- [18]. The mathematical model of quadratic matrix transformation is defined as follows.…”
Section: Mathematical Modelmentioning
confidence: 99%
“…To evaluate the resource overhead and delay, the proposed algorithm is compared to the one proposed by Cui et al [16]. The MD5 IP core is used as the benchmark, respectively representing embedded 100%, 75%, 50% and 25% watermark.…”
Section: A Stability Analysismentioning
confidence: 99%
“…Additionally, the constrained watermarks cannot be detected at another design level, where the low traceability is also a drawback. Cui et al proposed an ultra-low overhead dynamic watermarking on scan design for hard IP protection [30], which has greatly improved the security of the watermarks and reduced the overhead.…”
Section: Preliminariesmentioning
confidence: 99%
“…These algorithms are classified into two groups: constraints-based watermarking and additive watermarking [33]. Constraints-based watermarking methods in FPGA mainly place extra constraints for configurable logic blocks (CLBs) in odd/even rows [11], restrict the timing of uncritical path [10], exploit the scan chains [9][8] [4] or preserve nets during the procedure of logic synthesis [13]. Other additive methods usually add a signature into the functional IP core.…”
Section: Related Workmentioning
confidence: 99%