Watermarking Techniques for Electronic Circuit Des

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

WatermarkingTechniquesforElectronicCircuitDesignEdoardoCharbon1andIlhamiTorunoglu21SwissFederalInstituteofTecnology,Lausanne,Switzerlandedoardo.charbon@epfl.ch2CanestaInc.,SanJose,CaliforniaU.S.A.ilhami@canesta.comAbstract.Enforcingcopyrightlawsrelatedtocircuitdesignisusuallyhard,sincediscoveryandproofofinfringementsarerequiredbeyondrea-sonabledoubt.Provingthatagivencircuitryistriviallyderivedfromapatentedtechniqueormethodisingeneralapainstakinglyslowtask,oftenrequiringreverse-engineeringandforensicanalysisoffabricatedchips.Thesetechniquesaresocomplexthattheirapplicationtolargecollectionsofcommercialproductsisalmostalwaysprohibitive.Water-markingisoneofseveraltechniquesavailabletodaytodetercopyrightinfringementinelectronicsystems.Thetechniqueconsistsofimplantingindeliblestampsinthecircuit'sinnerstructure,whilenotdisruptingitsfunctionalityorsigni cantlydegradingitsperformance.Inthispaperaseriesofmethodsisproposedforthecreationofwatermarksatseveralstagesofthedesigncycle,fromhigh-leveldesigntolayout.Algorithmsaredescribedforimplantingrobustwatermarkstominimizetheover-headand,ultimately,toreducetheimpactonperformance.Detectionmethodsarediscussedinthepresenceofinfringement.Theresilienceofthemethodsinseveraltamperingregimesisestimated.1IntroductionWiththeintroductionoflarge-scalesystem-on-chip(SOC)designparadigms,theVLSIsemiconductorindustryisundergoingarevolution.Asaconsequence,asigni cantincreaseinoperatingspeedsanddesignproductivityisexpected.Circuitcomponentswillbeavailabletointegratorsinelectronicformratherthaninsilicon.Suchcomponents,knownasvirtualcomponents,willbedeliveredforaparticularapplicationaccordingtoaspeci ccontract.Duetothenewmediumofstorageandexchange,virtualcomponentsarepronetoinfringementsandabuses,i.e.usesbeyondtheoriginalcontractsand/orbyunauthorizedintegra-tors.ProtectingtheIntellectualProperty(IP)rightsoftheauthorsofvirtualcomponentisanemergingmulti-disciplinary eldencompassingseveralaspectsoftoday'sICdesignprocess.Existinglegaldevices,suchaspatents,tradesecrets,copyrights,andnon-disclosureagreementsareaimedatdeterringpotentialinfringement.However,therealAchille'shealofthesystemiscurrentlytheenforcementofsuchrights.ThegoalofIPprotectionasawholeistoprovidenecessarytechnologiestomakeenforcementamoremanageabletaskwhiledeterringinfringementatalllevelsofadesign.Apossiblesuchschemerequiresthecapabilityofe ectivelydetectingandsubsequentlytrackingIPinfringementcases.Thistaskcanbeaccomplishedbyaprocessknownaswatermarking.Themethodconsistsofem-beddingauniquecode,orwatermark,whichexploitstheIP'suniquefeatures.Fundamentalrequirementsforawatermarkarethatitbe(1)transparent,i.e.notinterferingwiththedesignfunctionality,(2)robust,i.e.hardtoremoveorforge,(3)detectable,i.e.easytoextractfromthedesign.Theprocessusedformanagingwatermarksmustnotnecessarilybeproprietary,whilethecodeusedintheencryptionprocessshouldbesecretforanyreleasedIP.Thereexistthreebasictypesofvirtualcomponent,basedonitscharacteriza-tionthrough(a)behavioraldescription(softIP),(b)structuraldescription( rmIP),and(c)physicaldescription(hardIP).HardIPsaregenerallyreleasedasaplug-and-playcomponentforoneormoretechnologies,while rmandsoftIPsarepartiallyimplementedversionsofadesign,thusanumberofdegreesoffree-domarestillavailabletotheintegratorandpotentiallyalltechnologiescanbeusedforimplementation.DuetothediversityoftheimplementationlandscapeofIPs,theirprotectionisalsoacomplextask.Recently,watermarkinghasbeenproposedtoprotectdigitalaudio-visualIPs.Theliteratureisveryextensiveonthesubject.Herewementiononlytwoworks[1,2]becausetheyallowustointroducesomeofthetechniquesusedinthispaper.Themainmethoddescribedin[1,2],thoughwithsmallvariations,essentiallyconsistofsuperimposingapseudo-randomnoisetothesignaloftherecord.Suchnoise,thoughcompletelyinaudible,canbeeasilydetectedviadigitalsignalprocessingmethods.SchemesbasedonwatermarkinghavebeenrecentlyproposedforelectronicIPsaswell.In[3,4]thewatermarkassumestheformofaextraneousbitstream,hiddeninsidelargeFieldProgrammableGateArrays(FPGAs).Thewatermarkisstoredinsomeoftheunusedcon gurablecontrollogicblocksoftheFPGA.Eachunusedlookuptableisresponsibleforstoringasinglebitinthecode.Allthecon gurablecontrolelementsusedinthewatermarkarethenroutedinthedesignformimeticpurposes.Thisisdoneinsuchamannertoavoidanyimpactontheoriginalfunctionality.Themethodhaslaterbeenre nedin[5]wherethesignatureismodi edbeforebeingembeddedsoastomimicthestatisticalpropertiesoftheexistingdesign,hencereducingdetectability.Oneissueinouropinionstillremaininginthisapproachisthefactthattodatewatermarkedlookuptablesdonotreectanyfunctionality,thusrepresentingapotentialweakpointinthescheme.In[6,7]itwasproposedtoincorporateseveralwatermarks,distributedoveralltheabstractionlevelsofagivendesign.Thetechniquesdi erdependingontheabstractionleveltheyareapplicableto.Atthephysicaldesignlevel,thewatermarkassumestheformofasetoftopologicalconstraintsgoverningtherelativeposition,orientation,and,possibly,scalingofthedevicesorgatesofthecircuit.AtstructuralandRTLlevel,const

1 / 24
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功