Abstract
Advanced CAD tools and high-density VLSI technologies have combined to create a new market for reusable digital designs. The economic viability of the new core-based design paradigm is pending on the development of techniques for intellectual property protection. A design watermark is a permanent identification code that is difficult to detect and remove, is an integral part of the design, and has only nominal impact on performances and cost of design. Field Programmable Gate Arrays (FPGAs) present a particularly interesting set of problems and opportunities, because of their flexibility. We propose the first technique that leverages the unique characteristics of FPGAs to protect commercial investment in intellectual property through fingerprinting. A hidden encrypted message is embedded into the physical layout of a digital circuit when it is mapped into the FPGA. This message uniquely identifies both the circuit origin and original circuit recipient, yet is difficult to detect and or remove. While this approach imposes additional constraints on the back-end CAD tools for circuit place and route, experiments involving a number of industrial-strength designs indicate that the performance impact is minimal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Turley, “ARM Grabs Embedded Speed Lead”, Microprocessor Report, vol. 10, 1996.
J. Montanaro et al., “A 160MHz 32b 0.5W CMOS RISC Microprocessor,” Proc. of International Solid-State Circuits Conference, 1996.
S. Furber, ARM System Architecture, Menlo Park: Addison-Wesley, 1996, p. 329.
I. Ayres and S. D. Levitt, “Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack”, The Economics Review, 1997.
J. Lach, W. H. Mangione-Smith, and M. Potkonjak, “Signature Hiding Techniques for FPGA Intellectual Property Protection”, submitted to ICCAD’ 98, 1998.
J. Lach, W. H. Mangione-Smith, and M. Potkonjak, “Low Overhead Fault-Tolerant FPGA Systems”, IEEE Transactions on VLSI, vol. 6, 1998.
Xilinx, The Programmable Logic Data Book, San Jose, CA, 1996.
Programmable Electronic PerformanceGroup, “PREP Benchmark Suite #1, Version 1.3,” Los Altos CA, 1994.
S. Trimberger, Personal Communication, Xilinx Corporation, 1997.
H. Berghel and L. O’Gorman, “Protecting Ownership Rights Through Digital Watermarking,” IEEE Computer, 1996, pp. 101–103.
J. Brassil and L. O’Gorman, “Watermarking Document Images with Bounding Box Expansion,” First International Workshop on Information Hiding, Cambridge U.K., 1996.
I. J. Cox et al., “Secure Spread Spectrum Watermarking for Images, Audio and Video,” International Conference on Image Processing, 1996.
J. Smith and B. Comiskey, “Modulation and Information Hiding in Images,” First International Workshop on Information Hiding, Cambridge U.K., 1996.
S. Craver et al., “Can Invisible Watermarks Resolve Rightful Ownership?” The International Society for Optical Engineering, 1997.
A. H. Tewfik and M. Swanson, “Data Hiding for Multimedia Personalization, Interaction, and Protection,” IEEE Signal Processing Magazine, 1997, pp. 41–44.
[16]W. Bender et al., “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, 1996, pp. 313–336.
L. Boney et al., “Digital Watermarks for Audio Signals,” International Conference on Multimedia Computing and Systems, 1996.
G. A. Spanos and T. B. Maples, “Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video,” International Conference on Computer Communications and Networks, 1995.
F. Hartung and B. Girod, “Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video,” ECMAST’ 97, 1997.
F. Hartung and F. Girod, “Watermarking of MPEG-2 Encoded Video Without Decoding and Re-Encoding,” Multimedia Computing and Networking, 1997.
I. Hong and M. Potkonjak, “Behavioral Synthesis Techniques for Intellectual Property Protection,” unpublished manuscript, 1997.
D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data,” CRYPTO’ 95, 1995.
I. Biehl and B. Meyer, “Protocols for Collusion-Secure Asymmetric Fingerprinting,” STACS’ 97, 14 th Annual Symposium on Theoretical Aspects of Computer Science, 1997.
B. Pfitzmann and M. Waidner, “Anonymous Fingerprinting,” International Conference on the Theory and Application of Cryptographic Techniques, 1997.
R. Anderson and M. Kuhn, “Tamper Resistance-A Cautionary Note,” USENIX Electronic Commerce Workshop, 1996.
B. Schneier, Applied Cryptography: Protocols Algorithms and Source Code in C. New York: John Wiley & Sons, 1996.
A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lach, J., Mangione-Smith, W.H., Potkonjak, M. (1998). Fingerprinting Digital Circuits on Programmable Hardware. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_2
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive