Behavioral synthesis techniques for intellectual property protection
F Koushanfar, I Hong, M Potkonjak - ACM Transactions on Design …, 2005 - dl.acm.org
F Koushanfar, I Hong, M Potkonjak
ACM Transactions on Design Automation of Electronic Systems (TODAES), 2005•dl.acm.orgWe introduce dynamic watermarking techniques for protecting the value of intellectual
property of CAD and compilation tools and reusable design components. The essence of the
new approach is the addition of a set of design and timing constraints which encodes the
author's signature. The constraints are selected in such a way that they result in a minimal
hardware overhead while embedding a unique signature that is difficult to remove and forge.
Techniques are applicable in conjunction with an arbitrary behavioral synthesis task such as …
property of CAD and compilation tools and reusable design components. The essence of the
new approach is the addition of a set of design and timing constraints which encodes the
author's signature. The constraints are selected in such a way that they result in a minimal
hardware overhead while embedding a unique signature that is difficult to remove and forge.
Techniques are applicable in conjunction with an arbitrary behavioral synthesis task such as …
We introduce dynamic watermarking techniques for protecting the value of intellectual property of CAD and compilation tools and reusable design components. The essence of the new approach is the addition of a set of design and timing constraints which encodes the author's signature. The constraints are selected in such a way that they result in a minimal hardware overhead while embedding a unique signature that is difficult to remove and forge. Techniques are applicable in conjunction with an arbitrary behavioral synthesis task such as scheduling, assignment, allocation, transformation, and template matching.On a large set of design examples, studies indicate the effectiveness of the new approach that results in signature data that is highly resilient, difficult to detect and remove, and yet is easy to verify and can be embedded in designs with very low hardware overhead. For example, the probability that the same design with the embedded signature is obtained by any other designers by themselves is less than 1 in 10102, and no register overhead was incurred. The probability of tampering, the probability that part of the embedded signature can be removed by random attempts, is shown to be extremely low, and the watermark is additionally protected from such tampering with error-correcting codes.
ACM Digital Library