Fingerprinting techniques for field-programmable gate arrayintellectual property protection

As current computer-aided design (CAD) tool and very large scale integration technology capabilities create a new market of reusable digital designs, the economic viability of this new core-based design paradigm is pending on the development of techniques for intellectual property protection. This work presents the first technique that leverages the unique characteristics of field-programmable gate arrays (FPGAs) to protect commercial investment in intellectual property through fingerprinting. A hidden encrypted mark is embedded into the physical layout of a digital circuit when it is placed and routed onto the FPGA. This mark uniquely identifies both the circuit origin and original circuit recipient, yet is difficult to detect and/or remove, even via recipient collusion. While this approach imposes additional constraints on the backend CAD tools for circuit place and route, experiments indicate that the performance and area impacts are minimal.

[1]  Miodrag Potkonjak,et al.  Low overhead fault-tolerant FPGA systems , 1998, IEEE Trans. Very Large Scale Integr. Syst..

[2]  Arlindo L. Oliveira Robust techniques for watermarking sequential circuit designs , 1999, DAC '99.

[3]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[4]  Lawrence O'Gorman,et al.  Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.

[5]  Bernd Meyer,et al.  Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract) , 1997, STACS.

[6]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[7]  Steve Furber,et al.  ARM System Architecture , 1996 .

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Edoardo Charbon Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).

[10]  R. S. Fabry,et al.  A fast file system for UNIX , 1984, TOCS.

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  Ahmed H. Tewfik,et al.  Data hiding for multimedia personalization, interaction, and protection , 1997 .

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[14]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[15]  Steven D. Levitt,et al.  Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .

[16]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[17]  Bernd Girod,et al.  Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.

[18]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[19]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[20]  I. Torunoglu,et al.  Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.

[21]  Miodrag Potkonjak,et al.  Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).

[22]  Miodrag Potkonjak,et al.  Effective iterative techniques for fingerprinting design IP [VLSI CAD] , 1999, Proceedings 1999 Design Automation Conference (Cat. No. 99CH36361).

[23]  Birgit Pfitzmann,et al.  Anonymous Fingerprinting , 1997, EUROCRYPT.

[24]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[25]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[26]  Richard T. Witek,et al.  A 160 MHz 32 b 0.5 W CMOS RISC microprocessor , 1996, 1996 IEEE International Solid-State Circuits Conference. Digest of TEchnical Papers, ISSCC.

[27]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[28]  Miodrag Potkonjak,et al.  Signature hiding techniques for FPGA intellectual property protection , 1998, ICCAD '98.

[29]  Miodrag Potkonjak,et al.  Signature hiding techniques for FPGA intellectual property protection , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).