Skip to main content

Fingerprinting Digital Circuits on Programmable Hardware

  • Conference paper
  • First Online:
Book cover Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

Advanced CAD tools and high-density VLSI technologies have combined to create a new market for reusable digital designs. The economic viability of the new core-based design paradigm is pending on the development of techniques for intellectual property protection. A design watermark is a permanent identification code that is difficult to detect and remove, is an integral part of the design, and has only nominal impact on performances and cost of design. Field Programmable Gate Arrays (FPGAs) present a particularly interesting set of problems and opportunities, because of their flexibility. We propose the first technique that leverages the unique characteristics of FPGAs to protect commercial investment in intellectual property through fingerprinting. A hidden encrypted message is embedded into the physical layout of a digital circuit when it is mapped into the FPGA. This message uniquely identifies both the circuit origin and original circuit recipient, yet is difficult to detect and or remove. While this approach imposes additional constraints on the back-end CAD tools for circuit place and route, experiments involving a number of industrial-strength designs indicate that the performance impact is minimal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Turley, “ARM Grabs Embedded Speed Lead”, Microprocessor Report, vol. 10, 1996.

    Google Scholar 

  2. J. Montanaro et al., “A 160MHz 32b 0.5W CMOS RISC Microprocessor,” Proc. of International Solid-State Circuits Conference, 1996.

    Google Scholar 

  3. S. Furber, ARM System Architecture, Menlo Park: Addison-Wesley, 1996, p. 329.

    Google Scholar 

  4. I. Ayres and S. D. Levitt, “Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack”, The Economics Review, 1997.

    Google Scholar 

  5. J. Lach, W. H. Mangione-Smith, and M. Potkonjak, “Signature Hiding Techniques for FPGA Intellectual Property Protection”, submitted to ICCAD’ 98, 1998.

    Google Scholar 

  6. J. Lach, W. H. Mangione-Smith, and M. Potkonjak, “Low Overhead Fault-Tolerant FPGA Systems”, IEEE Transactions on VLSI, vol. 6, 1998.

    Google Scholar 

  7. Xilinx, The Programmable Logic Data Book, San Jose, CA, 1996.

    Google Scholar 

  8. Programmable Electronic PerformanceGroup, “PREP Benchmark Suite #1, Version 1.3,” Los Altos CA, 1994.

    Google Scholar 

  9. S. Trimberger, Personal Communication, Xilinx Corporation, 1997.

    Google Scholar 

  10. H. Berghel and L. O’Gorman, “Protecting Ownership Rights Through Digital Watermarking,” IEEE Computer, 1996, pp. 101–103.

    Google Scholar 

  11. J. Brassil and L. O’Gorman, “Watermarking Document Images with Bounding Box Expansion,” First International Workshop on Information Hiding, Cambridge U.K., 1996.

    Google Scholar 

  12. I. J. Cox et al., “Secure Spread Spectrum Watermarking for Images, Audio and Video,” International Conference on Image Processing, 1996.

    Google Scholar 

  13. J. Smith and B. Comiskey, “Modulation and Information Hiding in Images,” First International Workshop on Information Hiding, Cambridge U.K., 1996.

    Google Scholar 

  14. S. Craver et al., “Can Invisible Watermarks Resolve Rightful Ownership?” The International Society for Optical Engineering, 1997.

    Google Scholar 

  15. A. H. Tewfik and M. Swanson, “Data Hiding for Multimedia Personalization, Interaction, and Protection,” IEEE Signal Processing Magazine, 1997, pp. 41–44.

    Google Scholar 

  16. [16]W. Bender et al., “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, 1996, pp. 313–336.

    Article  Google Scholar 

  17. L. Boney et al., “Digital Watermarks for Audio Signals,” International Conference on Multimedia Computing and Systems, 1996.

    Google Scholar 

  18. G. A. Spanos and T. B. Maples, “Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video,” International Conference on Computer Communications and Networks, 1995.

    Google Scholar 

  19. F. Hartung and B. Girod, “Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video,” ECMAST’ 97, 1997.

    Google Scholar 

  20. F. Hartung and F. Girod, “Watermarking of MPEG-2 Encoded Video Without Decoding and Re-Encoding,” Multimedia Computing and Networking, 1997.

    Google Scholar 

  21. I. Hong and M. Potkonjak, “Behavioral Synthesis Techniques for Intellectual Property Protection,” unpublished manuscript, 1997.

    Google Scholar 

  22. D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data,” CRYPTO’ 95, 1995.

    Google Scholar 

  23. I. Biehl and B. Meyer, “Protocols for Collusion-Secure Asymmetric Fingerprinting,” STACS’ 97, 14 th Annual Symposium on Theoretical Aspects of Computer Science, 1997.

    Google Scholar 

  24. B. Pfitzmann and M. Waidner, “Anonymous Fingerprinting,” International Conference on the Theory and Application of Cryptographic Techniques, 1997.

    Google Scholar 

  25. R. Anderson and M. Kuhn, “Tamper Resistance-A Cautionary Note,” USENIX Electronic Commerce Workshop, 1996.

    Google Scholar 

  26. B. Schneier, Applied Cryptography: Protocols Algorithms and Source Code in C. New York: John Wiley & Sons, 1996.

    MATH  Google Scholar 

  27. A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lach, J., Mangione-Smith, W.H., Potkonjak, M. (1998). Fingerprinting Digital Circuits on Programmable Hardware. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics