Skip to main content

IP FSM Watermarking

  • Chapter
  • First Online:
Foundations of Hardware IP Protection

Abstract

Hardware design reuse has been the viable solution to deal with the ever-increasing logic density in the semiconductor industry. For instance, an application-specific integrated circuit (ASIC) architecture can be designed using previously designed subcomponents or subsystems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. M. Tehranipoor, C. Wang (eds.), Introduction to Hardware Security and Trust (Springer Science+Business Media, LLC, 2012), Chaps. 6 and 17

    Google Scholar 

  2. L. Bossuet, D. Hely, Salware: salutary hardware to design trusted IC, in Proceedings of the Trustworthy Manufacturing and Utilization of Secure Devices Workshop (TRUDEVICE ’13), Avignon, France (2013), pp. 30–31. http://hal-ujm.ccsd.cnrs.fr/ujm-00833871

  3. G. Wolfe, J.L. Wong, M. Potkonjak, Watermarking graph partitioning solutions. IEEE Trans. Comp.-Aided Des. Integ. Cir. Sys. 21, 1196–1204 (2002). doi:10.1109/TCAD.2002.802277

  4. J.L. Wong, G. Qu, M. Potkonjak, Optimization-intensive watermarking techniques for decision problems. IEEE Trans. Comp.-Aided Des. Integ. Cir. Syst. 23(1), 119–127 (2006). doi:10.1109/TCAD.2003.819900

  5. G. Qu, M. Potkonjak, Analysis of watermarking techniques for graph coloring problem, in Proceedings of the IEEE/ACM international conference on Computer-aided design (ICCAD ‘98) (ACM, New York, NY, USA, 1998), pp. 190–193. doi:10.1145/288548.288607

  6. L. Yuan, G. Qu, Information hiding in finite state machine, in J. Fridrich (ed.), Proceedings of the 6th international conference on Information Hiding (IH’04) (Springer-Verlag, Berlin, Heidelberg, 2004), pp. 340–354. doi:10.1007/978-3-540-30114-1_24

  7. J. Lach, W.H. Mangione-Smith, M. Potkonjak, Robust FPGA intellectual property protection through multiple small watermarks, in M.J. Irwin (ed.) Proceedings of the 36th annual ACM/IEEE Design Automation Conference (DAC ‘99) (ACM, New York, NY, USA, 1999), pp. 831–836. doi:10.1145/309847.310080

  8. F. Koushanfar, Y. Alkabani, Provably secure obfuscation of diverse watermarks for sequential circuits, in Proceedings of the International Symposium on Hardware-Oriented Security and Trust (HOST ‘10), (2010), pp. 42–47. doi:10.1109/HST.2010.5513115

  9. B. Le Gal, L. Bossuet, Automatic low-cost IP watermarking techniques based on output mark insertions, in Design Automation for Embedded Systems, vol. 16, issue 2 (Springer Science+Business Media, 2012), pp. 71–92. doi:10.1007/s10617-012-9085-y

  10. F.A. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, in Proceedings of the IEEE, 87(7), 1062–1078 (1999). doi:10.1109/5.771065

  11. A.T. Abdel-Hamid, S. Tahar, E.M. Aboulhamid, A survey on IP watermarking techniques, in Design Automation for Embedded Systems, vol. 9 (Springer Science+Business Media, Berlin, 2004), pp. 211–227. doi:10.1007/s10617-005-1395-x

  12. A.L. Oliveira, Robust techniques for watermarking sequential circuit designs, in Irwin, M.J. (ed.) Proceedings of the 36th annual ACM/IEEE Design Automation Conference (DAC ‘99) (ACM, New York, NY, USA, 1999), pp. 837–842. doi:10.1145/309847.310082

  13. A.L. Oliveira, Techniques for the creation of digital watermarks in sequential circuit design. IEEE Trans. Comp.-Aided Des. Integ. Cir. Sys. 20(9), 1101–1117 (2001). doi:10.1109/43.945306

  14. I. Torunoglu, E. Charbon, Watermarking-based copyright protection of sequential functions. IEEE J. Solid-State Circuits 35(3), 434–440 (2000). doi:10.1109/4.826826

    Article  Google Scholar 

  15. F. Koushanfar, I. Hong, M. Potkonjak, Behavioral synthesis techniques for intellectual property protection. ACM Trans. Des. Autom. Electron. Syst. 10, 3, 523–545 (2005). doi:10.1145/1080334.1080338

  16. A. Cui, C.H. Chang, S. Tahar, A.T. Abdel-Hamid, A robust FSM watermarking scheme for IP protection of sequential circuit design. IEEE Trans. Comp.-Aided Des. Integ. Cir. Sys. 30(5), 678−690 (2011). doi:10.1109/TCAD.2010.2098131

  17. M. Lewandowski, R. Meana, M. Morrison, S. Katkoori, A novel method for watermarking sequential circuits, in Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’12), San Francisco, CA, pp. 21–24 (2012). doi:10.1109/HST.2012.6224313

  18. J. Hartmanis, R.E. Stearns, Algebraic Structure Theory of Sequential Machines (Prentice-Hall International Series in Applied Mathematics) (Prentice-Hall, Inc. (1996), Upper Saddle River, NJ, USA

    Google Scholar 

  19. Z. Kohavi, Switching and Finite Automata Theory, 2nd edn. (McGraw-Hill, 1978)

    Google Scholar 

  20. A. Kerckhoffs, La Crytographie Militaire. Journal des sciences militaires, 9, 5–38 (1883). 161−191 (February 1883)

    Google Scholar 

  21. E. Jung, S. Choi, Identification of IP control units by state encoding, in IEEE Computer Society Annual Symposium on VLSI, July 2015, pp. 216–220. doi:10.1109/ISVLSI.2015.43

  22. C. Marchand, L. Bossuet, E. Jung, IP watermarking verification based on power consumption analysis, in Proceedings of the 27th IEEE International System-on-Chip Conference (SOCC ’14), Las Vegas, Sept 2014, pp. 330–335. doi:10.1109/SOCC.2014.6948949

  23. I.J. Cox, M.L. Miller, J.A. Bloom, C. Honsinger, Digital watermarking (Morgan Kaufmann Publishers, 1998)

    Google Scholar 

Download references

Acknowledgement

The work presented in this paper was realized in the frame of the SALWARE project number ANR-13-JS03-0003 supported by the French” Agence Nationale de la Recherche” and by the French “Fondation de Recherche pour l’Aéronautique et l’Espace”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edward Jung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Jung, E., Bossuet, L. (2017). IP FSM Watermarking. In: Bossuet, L., Torres, L. (eds) Foundations of Hardware IP Protection. Springer, Cham. https://doi.org/10.1007/978-3-319-50380-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50380-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50378-3

  • Online ISBN: 978-3-319-50380-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics