skip to main content
10.1145/1601896.1601915acmconferencesArticle/Chapter ViewAbstractPublication PagessbcciConference Proceedingsconference-collections
research-article

An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking

Published: 31 August 2009 Publication History

Abstract

IP reuse is rapidly proliferating recent automated circuit design. It is facing serious challenges like forgery, theft and misappropriation of intellectual property (IP) of the design. Thus, protection of design IP is a matter of prime concern. In this paper, we propose a novel Internet-based scheme to tackle this problem. Input to the proposed scheme is a graph corresponding to a digital system design. Watermarking of the graph and its encryption are achieved using a new linear feedback shift register(LFSR)-based locking scheme. The proposed scheme makes unauthorized disclosure of valuable design almost infeasible, and can easily detect any alteration of the design file during transmission. It ensures authentication of the original designer as well as non-repudiation between the seller and the buyer. Empirical evidences on several benchmark problem sets are encouraging.

References

[1]
J. Lach. A. B. Kahng and H. Mangione-Smith. Constraint-based watermarking techniques for design ip protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 20(10):1236--1251, 2001.
[2]
H. J. Choi A. E. Caldwell and A. B. Kahng. Effective iterative technique for fingerprinting design ip. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 23(2), 2004.
[3]
P. R. Pari G. Qu. A. Jain L. Yuan. Zero overhead watermarking technique for fpga designs. In Proc. of the Great Lakes Symposium on VLSI (GLSVLSI), pages 147--152, April 2003.
[4]
I. L. Markov M. Potkonjak P. Tucker H. Wang A. B. Kahng, S. Mantik and G. Wolfe. Robust ip watermarking methodologies for physical design. In Proc. of the Design Automation Conference, pages 782--787, June 1998.
[5]
E. Charbon. Hierarchical watermarking in ic design. In Proc. of the Custom Integrated Circuits Conference, 1998.
[6]
E. Charbon and I. H. Torunoglu. On intellectual property protection. In Proc. of the Custom Integrated Circuits Conference, pages 517--522, 2000.
[7]
S. Sur-Kolay S. Sen-Sarma D. Saha P. Dasgupta. A novel scheme for encoding and watermark embedding in vlsi physical design for ip protection. In Proc. of the International Computing Conference: Theory and Algorithms, pages 111--116, 2007.
[8]
A. Garcia A. Loris U. Meyer-Baese E. Castillo, L. Parrilla. Ipp watermarking technique for ip core protection on fpl devices. In Proc. of the Field Programmable Logic and Applications, pages 1--6, August 2006.
[9]
J. P. Hayes. Computer Architecture and Organization. Tata Mc-graw Hill, 1996.
[10]
W. H. Mangionne-Smith J. Lach and M. Potkonjak. Robust fpga intellectual property protection through multiple small watermarks. In Proc. of IEEE/ACM Design Automation Conference, pages 831--836, June 1999.
[11]
L. Ghouti L. Yuan, G. Qu and A. Bouridane. Vlsi design ip protection: Solutions, new challenges, and opportunities. In Proc. of NASA/ESA Conf. on AHS, 2006.
[12]
R. C. Merkle. Secrecy, authentication, and public key systems. Stanford Ph.D. Thesis, 1979.
[13]
A. D. Friedman Miron Abramovici Melvin A. Breuer. Digital System testing and Testable Design. Jaico Publishers, 2001.
[14]
M. Ni and Z. Gao. Detector-based watermarking technique for soft ip core protection in high synthesis design level. In Proc. of the, pages 1348--1352, 2005.
[15]
W. Stallings. Cryptography and network security. Prentice-Hall India, 2005.
[16]
The ISPD98 Circuit Benchmark Suite. http://vlsicad.ucsd.edu/uclaweb/cheese/ispd98.html.
[17]
G. Qu L. Yuan P. R. Pari. Soft ip protection: Watermarking hdl codes. In Proc. of the 6th Information Hiding Workshop (IHWŠ04), pages 224--238, May 2004.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SBCCI '09: Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design: Chip on the Dunes
August 2009
325 pages
ISBN:9781605587059
DOI:10.1145/1601896
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 August 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. decryption
  2. encryption
  3. intellectual property protection (IPP)
  4. watermarking

Qualifiers

  • Research-article

Conference

SBCCI '09
Sponsor:

Acceptance Rates

SBCCI '09 Paper Acceptance Rate 50 of 119 submissions, 42%;
Overall Acceptance Rate 133 of 347 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media