Hierarchical Watermarking Method for FPGA IP Protection

Abstract With the increasing intellectual property (IP) abuse in System-on-a-Chip design, watermarking technique is playing an important role for IP protection. In this paper, we combine watermarking methods at different levels to construct a hierarchical watermarking scheme for field programmable gate array (FPGA) IP protection. We first embed the watermark into the netlist by using a look-up table-SRL transformation. Then we embed the watermark into the bitstream of the same design by using JBits. We test our method on three public FPGA benchmarks. The experimental results show that the overhead of watermarking is significantly reduced due to our judicious strategies. The watermark embedded at high level is well propagated to lower level. Our technique provides a robust and secure watermarking solution.

[1]  Susmita Sur-Kolay,et al.  Fast Robust Intellectual Property Protection for VLSI Physical Design , 2007, 10th International Conference on Information Technology (ICIT 2007).

[2]  Yongqiang Lyu,et al.  Efficient verification of IP watermarks in FPGA designs through lookup table content extracting , 2012, IEICE Electron. Express.

[3]  Gang Qu,et al.  Zero overhead watermarking technique for FPGA designs , 2003, GLSVLSI '03.

[4]  Edoardo Charbon Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).

[5]  Kaushik Roy,et al.  CLIP: Circuit Level IC Protection Through Direct Injection of Process Variations , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[6]  Sofiène Tahar,et al.  A Robust FSM Watermarking Scheme for IP Protection of Sequential Circuit Design , 2011, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[7]  Jürgen Teich,et al.  Netlist-level IP protection by watermarking for LUT-based FPGAs , 2008, 2008 International Conference on Field-Programmable Technology.

[8]  Sofiène Tahar,et al.  IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level , 2008, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[9]  Jürgen Teich,et al.  Power Signature Watermarking of IP Cores for FPGAs , 2008, J. Signal Process. Syst..

[10]  Tingyuan Nie,et al.  An Efficient and Reliable Watermarking System for IP Protection , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Sorin A. Huss,et al.  Bil: A tool-chain for bitstream reverse-engineering , 2012, 22nd International Conference on Field Programmable Logic and Applications (FPL).

[12]  Jarrod A. Roy,et al.  Protecting bus-based hardware IP by secret sharing , 2008, 2008 45th ACM/IEEE Design Automation Conference.

[13]  Miodrag Potkonjak,et al.  Fingerprinting intellectual property using constraint-addition , 2000, DAC.

[14]  Edoardo Charbon,et al.  Intellectual Property Protection Via Hierarchical Watermarking , 1998 .

[15]  Miodrag Potkonjak,et al.  Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[16]  Miodrag Potkonjak,et al.  Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.

[17]  Kwang-Ting Cheng,et al.  Combinational and sequential logic optimization by redundancy addition and removal , 1995, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[18]  Guangyu Sun,et al.  A watermarking system for IP protection by buffer insertion technique , 2006, 7th International Symposium on Quality Electronic Design (ISQED'06).

[19]  Miodrag Potkonjak,et al.  Signature hiding techniques for FPGA intellectual property protection , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).

[20]  Jürgen Teich,et al.  Multiplexing methods for power watermarking , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[21]  Yaping Lin,et al.  Watermarking FPGA Bitfile for Intellectual Property Protection , 2012 .

[22]  Farinaz Koushanfar,et al.  Provably secure obfuscation of diverse watermarks for sequential circuits , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[23]  M. Potkonjak,et al.  Hierarchical watermarking for protection of DSP filter cores , 1999, Proceedings of the IEEE 1999 Custom Integrated Circuits Conference (Cat. No.99CH36327).

[24]  Miodrag Potkonjak,et al.  Effective iterative techniques for fingerprinting design IP , 1999, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[25]  Miodrag Potkonjak,et al.  Differential public physically unclonable functions: Architecture and applications , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).

[26]  Miodrag Potkonjak,et al.  Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).

[27]  M. Potkonjak,et al.  FPGA fingerprinting techniques for protecting intellectual property , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).

[28]  Farinaz Koushanfar,et al.  Time-Bounded Authentication of FPGAs , 2011, IEEE Transactions on Information Forensics and Security.

[29]  Spyros Tragoudas,et al.  Rewiring for watermarking digital circuit netlists , 2005, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[30]  Hongxia Wang,et al.  JPEG Images Authentication with Discrimination of Tampers on the Image Content or Watermark , 2010 .