Skip to main content

Digital Fingerprint: A Practical Hardware Security Primitive

  • Chapter
  • First Online:
Digital Fingerprinting

Abstract

Digital fingerprinting was introduced for the protection of VLSI design intellectual property (IP). Since each copy of the IP will receive a distinct fingerprint, it can also be used as an identification for the IP or the integrated circuits (IC). This enables the IP/IC designer to trace each piece of the IP/IC and thus identify the dishonest user should piracy or misuse occurs. In this chapter, after defining the basic requirements of fingerprinting, we focus on how to solve the core challenge in digital fingerprinting, namely, how to effectively create large amount of distinct but functionally identical IPs. We first use the graph coloring problem as an example to demonstrate a general approach based on constraint manipulation; then we show how the popular iterative improvement paradigm can be leveraged for fingerprinting; the highlight will be three recently developed post-silicon fingerprinting techniques that can be automatically integrated into the design and test phases: the first two approaches take advantages of the Observability Don’t Cares and Satisfiability Don’t Cares, which are almost always present in IC designs, to generate fingerprints. The third method utilizes the different interconnect styles between flip flops in a scan chain to create unique fingerprints that can be detected with ease. These techniques have high practical values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qu, G., Potkonjak, M.: Intellectual Property Protection in VLSI Designs: Theory and Practice. Kluwer Academic Publishers, ISBN 1-4020-7320-8, January 2003

    Google Scholar 

  2. Guin, U., Huang, K., DiMase, D., Carulli Jr., J.M., Tehranipoor, M., Makris, Y.: Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc. IEEE 102(8), 1207–1228 (2014)

    Article  Google Scholar 

  3. IHS Technology: Reports of counterfeit parts quadruple since 2009, challenging US defense industry and national security. https://technology.ihs.com/389481/. Accessed 14 Feb 2012

  4. Qu, G., Yuan, L.: Secure hardware IPs by digital watermark. In Introduction to hardware security and trust, pp. 123–142. Springer, ISBN 978-1-4419-8079-3 (2012)

    Google Scholar 

  5. Kahng, A.B., Lach, J., Magione-Smith, W.H., Mantik, S. Markov, I.L., Potkonjak, M., Tucker, P., Wang, H., Wolfe, G.: Watermarking techniques for intellectual property protection. In: 35th Design Automation Conference Proceedings, pp. 776–781 (1998)

    Google Scholar 

  6. Patel, H.J., Crouch, J.W., Kim, Y.C., Kim, T.C.: Creating a unique digital fingerprint using existing combinational logic. In: IEEE International Symposium on Circuits and Systems, Taipei (2009)

    Google Scholar 

  7. Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerpring. In: IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim, CA (2008)

    Google Scholar 

  8. Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002)

    Google Scholar 

  9. Zhang, J., Qu, G., Lv, Y., Zhou, Q.: A survey on silicon PUFs and recent advances in ring oscillator PUFs. J. Comput. Sci. Technol. 29(4), 664–678 (2014). doi:10.1007/s11390-014-1458-1

    Article  Google Scholar 

  10. Lach, J., Mangione-Smith, W.H., Potkonjak, M.: FPGA fingerprinti-ng techniques for protecting intellectual property. Proc. CI-CC (1998)

    Google Scholar 

  11. Caldwell, A.E., et.al.: Effective iterative techniques for fingerprin- ting design IP. In: Proceedings of the 36th Annual ACM/IEEE Design A-utomation Conference, New York, NY (1999)

    Google Scholar 

  12. Qu, G., Potkonjak, M.: Fingerprinting intellectual property using co-nstraint-addtion. In: Proceedings of the 37th Annual ACM/IEEE Design Automation Conference, New York, NY (2000)

    Google Scholar 

  13. Dunbar, C., Qu, G.: A practical circuit fingerprinting method utilizing observability don’t care conditions. In: Design Automation Conference (DAC’15), June 2015

    Google Scholar 

  14. Dunbar, C., Qu, G.: Satisfiability don’t care condition based circuit fingerprinting techniques. 20th Asia and South Pacific Design Automation Conference (ASPDAC’15), pp. 815–820, January 2015

    Google Scholar 

  15. Wagner, N.R.: Fingerprinting. In: IEEE Computer Society Proceedings of the 1983 Symposium on Security and Privacy, pp. 18–22 (1983)

    Google Scholar 

  16. Biehl, I., Meyer, B.: Protocols for collusion-secure asymmetric fingerprinting. In: Reischuk, Morvan (eds.) STACS’97 Proceedings of 14th Annual Symposium on Theoretical Aspect of Computer Science, pp. 399–412. Springer (1997)

    Google Scholar 

  17. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith (ed.) Advances in Cryptology—CRYPTO’95, Proceedings of 15th Annual International Cryptology Conference, pp. 452–465. Springer (1995)

    Google Scholar 

  18. Chang, K., Markov, I.L., Bertacco, V.: Automating post-silicon debugging and repair. In: IEEE/ACM Intl Conference on Computer Aided Design, San Jose, CA (2007)

    Google Scholar 

  19. Gupta, S., Vaish, T., Chattopadhyay, S.: Flip-flop chaining architecture for power-effcient scan during test application. In: Proceedings of Asia Test Symposium, pp. 410–413. Kolkata, India (2005)

    Google Scholar 

  20. Cui, A., Qu, G., Zhang, Y.: Dynamic Watermarking on Scan Design for Hard IP Protection with Ultra-low Overhead. IEEE Trans. Inf. Foren. Secur. 10(11), 2298–2313 (2015). doi:10.1109/TIFS.2015.2455338

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by Army Research Office under grant W911NF1210416 and W911NF1510289, and by AFOSR MURI under award number FA9550-14-1-0351.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Qu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media New York

About this chapter

Cite this chapter

Qu, G., Dunbar, C., Chen, X., Cui, A. (2016). Digital Fingerprint: A Practical Hardware Security Primitive. In: Wang, C., Gerdes, R., Guan, Y., Kasera, S. (eds) Digital Fingerprinting. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-6601-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-6601-1_6

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-6599-1

  • Online ISBN: 978-1-4939-6601-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics