Behavioral synthesis techniques for intellectual property protection

We introduce dynamic watermarking techniques for protecting the value of intellectual property of CAD and compilation tools and reusable design components. The essence of the new approach is the addition of a set of design and timing constraints which encodes the author's signature. The constraints are selected in such a way that they result in a minimal hardware overhead while embedding a unique signature that is difficult to remove and forge. Techniques are applicable in conjunction with an arbitrary behavioral synthesis task such as scheduling, assignment, allocation, transformation, and template matching.On a large set of design examples, studies indicate the effectiveness of the new approach that results in signature data that is highly resilient, difficult to detect and remove, and yet is easy to verify and can be embedded in designs with very low hardware overhead. For example, the probability that the same design with the embedded signature is obtained by any other designers by themselves is less than 1 in 10102, and no register overhead was incurred. The probability of tampering, the probability that part of the embedded signature can be removed by random attempts, is shown to be extremely low, and the watermark is additionally protected from such tampering with error-correcting codes.

[1]  Miodrag Potkonjak,et al.  Fast prototyping of datapath-intensive architectures , 1991, IEEE Design & Test of Computers.

[2]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[3]  Miodrag Potkonjak,et al.  Behavioral synthesis techniques for intellectual property protection , 2005, TODE.

[4]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[5]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[6]  J.D. Carothers,et al.  Placement watermarking of standard-cell designs , 2001, 2001 Southwest Symposium on Mixed-Signal Design (Cat. No.01EX475).

[7]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[8]  Boon-Lock Yeo,et al.  Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.

[9]  Ingemar J. Cox,et al.  A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia , 1996, Southcon/96 Conference Record.

[10]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[11]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[12]  A.V. Oppenheim,et al.  Analysis of linear digital networks , 1975, Proceedings of the IEEE.

[13]  Catherine A. Schevon,et al.  Optimization by simulated annealing: An experimental evaluation , 1984 .

[14]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[15]  Miodrag Potkonjak,et al.  Intellectual Property Metering , 2001, Information Hiding.

[16]  Miodrag Potkonjak,et al.  Computational forensic techniques for intellectual property protection , 2001, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[17]  Darko Kirovski,et al.  Robust spread-spectrum audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[18]  Jeffrey J. Rodríguez,et al.  Mixed signal design watermarking for IP protection , 2003, Integr. Comput. Aided Eng..

[19]  Satoshi Hada,et al.  Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.

[20]  Miodrag Potkonjak,et al.  Fingerprinting techniques for field-programmable gate arrayintellectual property protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[21]  I. Torunoglu,et al.  Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.

[22]  David A. Wagner,et al.  A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.

[23]  Minerva M. Yeung,et al.  Digital watermarking for high-quality imaging , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[24]  Ahmed H. Tewfik,et al.  Object-based transparent video watermarking , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[25]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[26]  Dennis S. Fernandez Intellectual Property Protection in the EDA Industry , 1994, 31st Design Automation Conference.

[27]  J.D. Carothers,et al.  Mixed signal design watermarking for IP protection , 2001, 2001 Southwest Symposium on Mixed-Signal Design (Cat. No.01EX475).

[28]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[29]  Cecilia R. Aragon,et al.  Optimization by Simulated Annealing: An Experimental Evaluation; Part I, Graph Partitioning , 1989, Oper. Res..

[30]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[31]  W. R. Daasch,et al.  IC identification circuit using device mismatch , 2000, 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.00CH37056).

[32]  M. Potkonjak,et al.  Protecting ownership rights of a lossless image coder through hierarchical watermarking , 1998, 1998 IEEE Workshop on Signal Processing Systems. SIPS 98. Design and Implementation (Cat. No.98TH8374).

[33]  Miodrag Potkonjak,et al.  Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).

[34]  Wenjun Zeng,et al.  Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[35]  Miodrag Potkonjak,et al.  Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.

[36]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[37]  Jeffrey J. Rodriguez,et al.  Watermarking ICs for IP protection , 2002 .

[38]  Miodrag Potkonjak,et al.  Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[39]  Miodrag Potkonjak,et al.  Watermarking while preserving the critical path , 2000, Proceedings 37th Design Automation Conference.

[40]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[41]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[42]  Tariq S. Durrani,et al.  IP protection of DSP algorithms for system on chip implementation , 2000, IEEE Trans. Signal Process..

[43]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[44]  Darko Kirovski,et al.  Spread-spectrum audio watermarking: requirements, applications, and limitations , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[45]  Stefan Winkler,et al.  A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..

[46]  Hiroshi Masuda,et al.  A shape-preserving data embedding algorithm for NURBS curves and surfaces , 1999, 1999 Proceedings Computer Graphics International.

[47]  Giovanni De Micheli,et al.  Synthesis and Optimization of Digital Circuits , 1994 .

[48]  Miodrag Potkonjak,et al.  Local watermarks: methodology and application to behavioral synthesis , 2003, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[49]  Edoardo Charbon Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).

[50]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[51]  Christoph Busch,et al.  Towards Blind Detection of Robust Watermarks in Polygonal Models , 2000, Comput. Graph. Forum.

[52]  Arlindo L. Oliveira Techniques for the creation of digital watermarks in sequentialcircuit designs , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[53]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[54]  J. Kumagai,et al.  Chip detectives [reverse engineering] , 2000 .

[55]  Jason Cong,et al.  Intellectual property protection by watermarking combinational logic synthesis solutions , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).

[56]  M. Potkonjak,et al.  Hierarchical watermarking for protection of DSP filter cores , 1999, Proceedings of the IEEE 1999 Custom Integrated Circuits Conference (Cat. No.99CH36327).

[57]  L. Litwin,et al.  Error control coding , 2001 .

[58]  Cecilia R. Aragon,et al.  Optimization by Simulated Annealing: An Experimental Evaluation; Part II, Graph Coloring and Number Partitioning , 1991, Oper. Res..

[59]  Edoardo Charbon,et al.  Watermarking-based copyright protection of sequential functions , 1999 .

[60]  Sanjeev Khanna,et al.  Watermarking maps: hiding information in structured data , 2000, SODA '00.

[61]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[62]  Emil F. Girczyc,et al.  Increasing Design Quality and Engineering Productivity through Design Reuse , 1993, 30th ACM/IEEE Design Automation Conference.

[63]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .