Abstract
Hardware design reuse has been the viable solution to deal with the ever-increasing logic density in the semiconductor industry. For instance, an application-specific integrated circuit (ASIC) architecture can be designed using previously designed subcomponents or subsystems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
M. Tehranipoor, C. Wang (eds.), Introduction to Hardware Security and Trust (Springer Science+Business Media, LLC, 2012), Chaps. 6 and 17
L. Bossuet, D. Hely, Salware: salutary hardware to design trusted IC, in Proceedings of the Trustworthy Manufacturing and Utilization of Secure Devices Workshop (TRUDEVICE ’13), Avignon, France (2013), pp. 30–31. http://hal-ujm.ccsd.cnrs.fr/ujm-00833871
G. Wolfe, J.L. Wong, M. Potkonjak, Watermarking graph partitioning solutions. IEEE Trans. Comp.-Aided Des. Integ. Cir. Sys. 21, 1196–1204 (2002). doi:10.1109/TCAD.2002.802277
J.L. Wong, G. Qu, M. Potkonjak, Optimization-intensive watermarking techniques for decision problems. IEEE Trans. Comp.-Aided Des. Integ. Cir. Syst. 23(1), 119–127 (2006). doi:10.1109/TCAD.2003.819900
G. Qu, M. Potkonjak, Analysis of watermarking techniques for graph coloring problem, in Proceedings of the IEEE/ACM international conference on Computer-aided design (ICCAD ‘98) (ACM, New York, NY, USA, 1998), pp. 190–193. doi:10.1145/288548.288607
L. Yuan, G. Qu, Information hiding in finite state machine, in J. Fridrich (ed.), Proceedings of the 6th international conference on Information Hiding (IH’04) (Springer-Verlag, Berlin, Heidelberg, 2004), pp. 340–354. doi:10.1007/978-3-540-30114-1_24
J. Lach, W.H. Mangione-Smith, M. Potkonjak, Robust FPGA intellectual property protection through multiple small watermarks, in M.J. Irwin (ed.) Proceedings of the 36th annual ACM/IEEE Design Automation Conference (DAC ‘99) (ACM, New York, NY, USA, 1999), pp. 831–836. doi:10.1145/309847.310080
F. Koushanfar, Y. Alkabani, Provably secure obfuscation of diverse watermarks for sequential circuits, in Proceedings of the International Symposium on Hardware-Oriented Security and Trust (HOST ‘10), (2010), pp. 42–47. doi:10.1109/HST.2010.5513115
B. Le Gal, L. Bossuet, Automatic low-cost IP watermarking techniques based on output mark insertions, in Design Automation for Embedded Systems, vol. 16, issue 2 (Springer Science+Business Media, 2012), pp. 71–92. doi:10.1007/s10617-012-9085-y
F.A. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, in Proceedings of the IEEE, 87(7), 1062–1078 (1999). doi:10.1109/5.771065
A.T. Abdel-Hamid, S. Tahar, E.M. Aboulhamid, A survey on IP watermarking techniques, in Design Automation for Embedded Systems, vol. 9 (Springer Science+Business Media, Berlin, 2004), pp. 211–227. doi:10.1007/s10617-005-1395-x
A.L. Oliveira, Robust techniques for watermarking sequential circuit designs, in Irwin, M.J. (ed.) Proceedings of the 36th annual ACM/IEEE Design Automation Conference (DAC ‘99) (ACM, New York, NY, USA, 1999), pp. 837–842. doi:10.1145/309847.310082
A.L. Oliveira, Techniques for the creation of digital watermarks in sequential circuit design. IEEE Trans. Comp.-Aided Des. Integ. Cir. Sys. 20(9), 1101–1117 (2001). doi:10.1109/43.945306
I. Torunoglu, E. Charbon, Watermarking-based copyright protection of sequential functions. IEEE J. Solid-State Circuits 35(3), 434–440 (2000). doi:10.1109/4.826826
F. Koushanfar, I. Hong, M. Potkonjak, Behavioral synthesis techniques for intellectual property protection. ACM Trans. Des. Autom. Electron. Syst. 10, 3, 523–545 (2005). doi:10.1145/1080334.1080338
A. Cui, C.H. Chang, S. Tahar, A.T. Abdel-Hamid, A robust FSM watermarking scheme for IP protection of sequential circuit design. IEEE Trans. Comp.-Aided Des. Integ. Cir. Sys. 30(5), 678−690 (2011). doi:10.1109/TCAD.2010.2098131
M. Lewandowski, R. Meana, M. Morrison, S. Katkoori, A novel method for watermarking sequential circuits, in Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’12), San Francisco, CA, pp. 21–24 (2012). doi:10.1109/HST.2012.6224313
J. Hartmanis, R.E. Stearns, Algebraic Structure Theory of Sequential Machines (Prentice-Hall International Series in Applied Mathematics) (Prentice-Hall, Inc. (1996), Upper Saddle River, NJ, USA
Z. Kohavi, Switching and Finite Automata Theory, 2nd edn. (McGraw-Hill, 1978)
A. Kerckhoffs, La Crytographie Militaire. Journal des sciences militaires, 9, 5–38 (1883). 161−191 (February 1883)
E. Jung, S. Choi, Identification of IP control units by state encoding, in IEEE Computer Society Annual Symposium on VLSI, July 2015, pp. 216–220. doi:10.1109/ISVLSI.2015.43
C. Marchand, L. Bossuet, E. Jung, IP watermarking verification based on power consumption analysis, in Proceedings of the 27th IEEE International System-on-Chip Conference (SOCC ’14), Las Vegas, Sept 2014, pp. 330–335. doi:10.1109/SOCC.2014.6948949
I.J. Cox, M.L. Miller, J.A. Bloom, C. Honsinger, Digital watermarking (Morgan Kaufmann Publishers, 1998)
Acknowledgement
The work presented in this paper was realized in the frame of the SALWARE project number ANR-13-JS03-0003 supported by the French” Agence Nationale de la Recherche” and by the French “Fondation de Recherche pour l’Aéronautique et l’Espace”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Jung, E., Bossuet, L. (2017). IP FSM Watermarking. In: Bossuet, L., Torres, L. (eds) Foundations of Hardware IP Protection. Springer, Cham. https://doi.org/10.1007/978-3-319-50380-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-50380-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50378-3
Online ISBN: 978-3-319-50380-6
eBook Packages: EngineeringEngineering (R0)