Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware

  • John Lach
  • William H. Mangione-Smith
  • Miodrag Potkonjak
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1768)

Abstract

The use of digital marks to provide ownership (watermarking) and recipient (fingerprinting) identification for intellectual property (IP) has become widespread. However, many of these techniques require a high complexity of copy detection, are vulnerable to mark removal after revelation for ownership verification, and are susceptible to reduced mark integrity due to partial mark removal. This paper presents a method for both watermarking and fingerprinting intellectual property, in the form of designs implemented on field programmable gate arrays (FPGAs), that achieves robustness by responding to these three weaknesses. The key techniques involve using secure hash functions to generate and embed multiple small marks that are more detectable, verifiable, and secure than existing FPGA IP protection techniques.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Furber, S.: ARM System Architecture, p. 329. Addison-Wesley, Menlo Park (1996)Google Scholar
  2. 2.
    Montanaro, J., et al.: A 160MHz 32b 0.5W CMOS RISC Microprocessor. In: International Solid-State Circuits Conference, pp. 49–62 (1996)Google Scholar
  3. 3.
    Turley, J.: ARM Grabs Embedded Speed Lead. Microprocessor Report  I10 (1996)Google Scholar
  4. 4.
    Lach, J., Mangione-Smith, W.H., Potkonjak, M.: Signature Hiding Techniques for FPGA Intellectual Property Protection. In: International Conference on Computer-Aided Design, pp. 186–189 (1998)Google Scholar
  5. 5.
    Lach, J., Mangione-Smith, W.H., Potkonjak, M.: Fingerprinting Digital Circuits on Programmable Hardware. In: International Workshop on Information Hiding, pp. 16–31 (1998)Google Scholar
  6. 6.
    Trimberger, S.: Personal Communication, Xilinx Corporation (1997)Google Scholar
  7. 7.
    Goering, R.: IP98 Forum Exposes Struggling Industry – Undefined Business Models, Unstable Core Prices Cited. EE Times, Issue 1000, March 30 (1998)Google Scholar
  8. 8.
    Brassil, J., O’Gorman, L.: Watermarking Document Images with Bounding Box Expansion. In: International Workshop on Information Hiding, pp. 227–235 (1996)Google Scholar
  9. 9.
    Cox, I.J., et al.: Secure Spread Spectrum Watermarking for Images, Audio, and Video. In: International Conference on Image Processing, pp. 243–246 (1996)Google Scholar
  10. 10.
    Smith, J., Comiskey, B.: Modulation and Information Hiding in Images. In: International Workshop on Information Hiding, pp. 207–226 (1996)Google Scholar
  11. 11.
    Craver, S., et al.: Can Invisible Watermarks Resolve Rightful Ownership? International Society for Optical Engineering  3022 (1997)Google Scholar
  12. 12.
    Bender, W., et al.: Techniques for Data Hiding. IBM Systems Journal 35(3-4), 313–336 (1996)CrossRefGoogle Scholar
  13. 13.
    Boney, L., et al.: Digital Watermarks for Audio Signals. In: International Conference on Multimedia Computing and Systems, pp. 473–480 (1996)Google Scholar
  14. 14.
    Hartung, F., Girod, B.: Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video. In: European Conference on Multimedia Applications, Services and Techniques, pp. 423–436 (1997)Google Scholar
  15. 15.
    Spanos, G.A., Maples, T.B.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: International Conference on Computer Communications and Networks, pp. 2–10 (1995)Google Scholar
  16. 16.
    Caldwell, A.E., et al.: Effective Iterative Techniques for Fingerprinting Design IP. In: Design Automation Conference, pp. 843–848 (1999)Google Scholar
  17. 17.
    Charbon, E., "Hierarchical Watermarking in IC Design, Custom Integrated Circuits Conference, pp. 295-298 (1998)Google Scholar
  18. 18.
    Hong, I., Potkonjak, M.: Behavioral Synthesis Techniques for Intellectual Property Protection. In: Design Automation Conference, pp. 849–854 (1997)Google Scholar
  19. 19.
    Kahng, A.B., et al.: Robust IP Watermarking Methodologies for Physical Design. In: Design Automation Conference, pp. 782–787 (1998)Google Scholar
  20. 20.
    Kahng, A.B., et al.: Watermarking Techniques for Intellectual Property Protection. In: Design Automation Conference, pp. 776–781 (1998)Google Scholar
  21. 21.
    Oliveira, A.: Robust Techniques for Watermarking Sequential Circuit Designs. In: Design Automation Conference, pp. 837–842 (1999)Google Scholar
  22. 22.
    Torunoglu, I., Charbon, E.: Watermarking-Based Copyright Protection of Sequential Functions. In: Custom Integrated Circuits Conference (1999)Google Scholar
  23. 23.
    Schneier, B.: 1963- Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York (1996)Google Scholar
  24. 24.
    Hutchings, B., et al.: BYUcore: A MIPS R2000 Processor for FPGAs (1997)Google Scholar
  25. 25.
    Villasenor, J., et al.: Configurable Computing Solutions for Automatic Target Recognition. In: IEEE Workshop on FPGAs for Custom Computing Machines, pp. 70–79 (1996)Google Scholar
  26. 26.
    Leonard, J., Mangione-Smith, W.H.: A Case Study of Partially Evaluated Hardware Circuits: Key-Specific DES. Field Programmable Logic, 151–160 (1997)Google Scholar
  27. 27.
    Xilinx, The Programmable Logic Data Book, San Jose, CA (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • John Lach
    • 1
  • William H. Mangione-Smith
    • 1
  • Miodrag Potkonjak
    • 2
  1. 1.Department of Electrical EngineeringUniversity of California, Los AngelesLos Angeles
  2. 2.Department of Computer ScienceUniversity of California, Los AngelesLos Angeles

Personalised recommendations