Reference Hub2
Signature Restoration for Enhancing Robustness of FPGA IP Designs

Signature Restoration for Enhancing Robustness of FPGA IP Designs

Jing Long, Dafang Zhang, Wei Liang, Xia'an Bi
Copyright: © 2015 |Volume: 9 |Issue: 3 |Pages: 16
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466676374|DOI: 10.4018/IJISP.2015070103
Cite Article Cite Article

MLA

Long, Jing, et al. "Signature Restoration for Enhancing Robustness of FPGA IP Designs." IJISP vol.9, no.3 2015: pp.41-56. http://doi.org/10.4018/IJISP.2015070103

APA

Long, J., Zhang, D., Liang, W., & Bi, X. (2015). Signature Restoration for Enhancing Robustness of FPGA IP Designs. International Journal of Information Security and Privacy (IJISP), 9(3), 41-56. http://doi.org/10.4018/IJISP.2015070103

Chicago

Long, Jing, et al. "Signature Restoration for Enhancing Robustness of FPGA IP Designs," International Journal of Information Security and Privacy (IJISP) 9, no.3: 41-56. http://doi.org/10.4018/IJISP.2015070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Many watermarking techniques for intellectual property (IP) protection are not resilient to tampering or removal attacks, especially for field programmable gate array (FPGA)-based IP cores. If attacked, the damaged watermarks cannot provide sufficient evidence in front of a court. To address this issue, the authors present a signature restoration scheme. The thought of secret sharing is introduced to share the signature into small watermarks. These watermarks are encoded with Reed-Solomon (RS) codes and embedded into unused lookup tables (LUTs) of used slices. Unlike most of existing techniques, the proposed scheme can restore the signature only by extracting parts of watermarks. So, it is tolerant to some damaged watermarks caused by removal attacks. The experiments show that the proposed scheme incurs no extra hardware resource and timing overhead. The robustness against attacks is much better by comparing to other schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.