Advertisement

Fingerprinting Digital Circuits on Programmable Hardware

  • John Lach
  • William H. Mangione-Smith
  • Miodrag Potkonjak
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

Advanced CAD tools and high-density VLSI technologies have combined to create a new market for reusable digital designs. The economic viability of the new core-based design paradigm is pending on the development of techniques for intellectual property protection. A design watermark is a permanent identification code that is difficult to detect and remove, is an integral part of the design, and has only nominal impact on performances and cost of design. Field Programmable Gate Arrays (FPGAs) present a particularly interesting set of problems and opportunities, because of their flexibility. We propose the first technique that leverages the unique characteristics of FPGAs to protect commercial investment in intellectual property through fingerprinting. A hidden encrypted message is embedded into the physical layout of a digital circuit when it is mapped into the FPGA. This message uniquely identifies both the circuit origin and original circuit recipient, yet is difficult to detect and or remove. While this approach imposes additional constraints on the back-end CAD tools for circuit place and route, experiments involving a number of industrial-strength designs indicate that the performance impact is minimal.

Keywords

Field Programmable Gate Array Reverse Engineering Intellectual Property Protection Timing Overhead Tile Size 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    J. Turley, “ARM Grabs Embedded Speed Lead”, Microprocessor Report, vol. 10, 1996.Google Scholar
  2. [2]
    J. Montanaro et al., “A 160MHz 32b 0.5W CMOS RISC Microprocessor,” Proc. of International Solid-State Circuits Conference, 1996.Google Scholar
  3. [3]
    S. Furber, ARM System Architecture, Menlo Park: Addison-Wesley, 1996, p. 329.Google Scholar
  4. [4]
    I. Ayres and S. D. Levitt, “Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack”, The Economics Review, 1997.Google Scholar
  5. [5]
    J. Lach, W. H. Mangione-Smith, and M. Potkonjak, “Signature Hiding Techniques for FPGA Intellectual Property Protection”, submitted to ICCAD’ 98, 1998.Google Scholar
  6. [6]
    J. Lach, W. H. Mangione-Smith, and M. Potkonjak, “Low Overhead Fault-Tolerant FPGA Systems”, IEEE Transactions on VLSI, vol. 6, 1998.Google Scholar
  7. [7]
    Xilinx, The Programmable Logic Data Book, San Jose, CA, 1996.Google Scholar
  8. [8]
    Programmable Electronic PerformanceGroup, “PREP Benchmark Suite #1, Version 1.3,” Los Altos CA, 1994.Google Scholar
  9. [9]
    S. Trimberger, Personal Communication, Xilinx Corporation, 1997.Google Scholar
  10. [10]
    H. Berghel and L. O’Gorman, “Protecting Ownership Rights Through Digital Watermarking,” IEEE Computer, 1996, pp. 101–103.Google Scholar
  11. [11]
    J. Brassil and L. O’Gorman, “Watermarking Document Images with Bounding Box Expansion,” First International Workshop on Information Hiding, Cambridge U.K., 1996.Google Scholar
  12. [12]
    I. J. Cox et al., “Secure Spread Spectrum Watermarking for Images, Audio and Video,” International Conference on Image Processing, 1996.Google Scholar
  13. [13]
    J. Smith and B. Comiskey, “Modulation and Information Hiding in Images,” First International Workshop on Information Hiding, Cambridge U.K., 1996.Google Scholar
  14. [14]
    S. Craver et al., “Can Invisible Watermarks Resolve Rightful Ownership?” The International Society for Optical Engineering, 1997.Google Scholar
  15. [15]
    A. H. Tewfik and M. Swanson, “Data Hiding for Multimedia Personalization, Interaction, and Protection,” IEEE Signal Processing Magazine, 1997, pp. 41–44.Google Scholar
  16. [16]W. Bender et al., “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, 1996, pp. 313–336.CrossRefGoogle Scholar
  17. [17]
    L. Boney et al., “Digital Watermarks for Audio Signals,” International Conference on Multimedia Computing and Systems, 1996.Google Scholar
  18. [18]
    G. A. Spanos and T. B. Maples, “Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video,” International Conference on Computer Communications and Networks, 1995.Google Scholar
  19. [19]
    F. Hartung and B. Girod, “Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video,” ECMAST’ 97, 1997.Google Scholar
  20. [20]
    F. Hartung and F. Girod, “Watermarking of MPEG-2 Encoded Video Without Decoding and Re-Encoding,” Multimedia Computing and Networking, 1997.Google Scholar
  21. [21]
    I. Hong and M. Potkonjak, “Behavioral Synthesis Techniques for Intellectual Property Protection,” unpublished manuscript, 1997.Google Scholar
  22. [22]
    D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data,” CRYPTO’ 95, 1995.Google Scholar
  23. [23]
    I. Biehl and B. Meyer, “Protocols for Collusion-Secure Asymmetric Fingerprinting,” STACS’ 97, 14 th Annual Symposium on Theoretical Aspects of Computer Science, 1997.Google Scholar
  24. [24]
    B. Pfitzmann and M. Waidner, “Anonymous Fingerprinting,” International Conference on the Theory and Application of Cryptographic Techniques, 1997.Google Scholar
  25. [25]
    R. Anderson and M. Kuhn, “Tamper Resistance-A Cautionary Note,” USENIX Electronic Commerce Workshop, 1996.Google Scholar
  26. [26]
    B. Schneier, Applied Cryptography: Protocols Algorithms and Source Code in C. New York: John Wiley & Sons, 1996.zbMATHGoogle Scholar
  27. [27]
    A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • John Lach
    • 1
  • William H. Mangione-Smith
    • 1
  • Miodrag Potkonjak
    • 2
  1. 1.Department of Electrical EngineeringUniversity of CaliforniaLos Angeles
  2. 2.Department of Computer ScienceUniversity of California, Los AngelesLos Angeles

Personalised recommendations