IP watermark verification based on power consumption analysis

The increasing production costs of electronic devices and changes in the design methods of integrated circuits (ICs) has led to emerging threats in the microelectronics industry. Today, high value chips are the target of counterfeiting, theft and malicious hardware insertion (such as hardware trojans). Intellectual property (IP) protection has become a major concern and we propose to fight counterfeiting and theft by designing salutary hardware (salware). Instead of insert malicious effects inside an IP like a malware (e.g. a hardware trojan), a salware uses the same techniques, strategies and means for IP protection. One of the most studied salware is IP watermarking. Many works propose to target the finite state machine of digital IP to perform the watermarking. But, most of the time, the verification of the watermark is not clearly described. This conduces to a lack of credibility of these works. This paper proposes a watermark verification scheme using a correlation analysis based on the measurement of the IC power consumption. This article presents this process of verification and also discusses the selection of its parameters according to experimental results.

[1]  Miodrag Potkonjak,et al.  Watermarking graph partitioning solutions , 2002, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[2]  Miodrag Potkonjak,et al.  Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.

[3]  Bertrand Le Gal,et al.  Automatic low-cost IP watermarking technique based on output mark insertions , 2012, Des. Autom. Embed. Syst..

[4]  Vincent Rijmen,et al.  The Advanced Encryption Standard Process , 2002 .

[5]  Christof Paar,et al.  Side-channel based watermarks for integrated circuits , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[6]  Celia Gorman,et al.  Counterfeit chips on the rise , 2012 .

[7]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[8]  Gang Qu,et al.  Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).

[9]  Rajat Subhra Chakraborty,et al.  Hardware IP Protection During Evaluation Using Embedded Sequential Trojan , 2012, IEEE Design & Test of Computers.

[10]  Lilian Bossuet,et al.  SALWARE: Salutary Hardware to design Trusted IC. , 2013 .

[11]  Yiorgos Makris,et al.  Counterfeit electronics: A rising threat in the semiconductor manufacturing industry , 2013, 2013 IEEE International Test Conference (ITC).

[12]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[13]  Ingrid Verbauwhede,et al.  Analysis and design of active IC metering schemes , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[14]  Edoardo Charbon,et al.  Watermarking-based copyright protection of sequential functions , 1999 .

[15]  Amr T. Abdel-Hamid,et al.  A Survey on IP Watermarking Techniques , 2004, Des. Autom. Embed. Syst..

[16]  I. Torunoglu,et al.  Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.

[17]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[18]  François Durvaux,et al.  Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[19]  C. Hung,et al.  An Locking and Unlocking Primitive Function of FSM-modeled Sequential Systems Based on Extracting Logical Property , 2013 .

[20]  M. Pecht,et al.  Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics , 2006, IEEE Spectrum.