skip to main content
10.1145/1057661.1057743acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
Article

VLSI CAD tool protection by birthmarking design solutions

Published: 17 April 2005 Publication History

Abstract

Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern VLSI designs; however, little has been done to protect them. Basically, given a problem Ρ and a solution Σ, we want to be able to determine whether Σ is obtained by a particular tool or algorithm.We propose two techniques that intentionally leave some trace or birthmark, which refers to certain easy detectable properties, in the design solutions to facilitate CAD tool tracing and protection. The pre-processing technique provides the ideal protection at the cost of losing control of solution's quality. The post-processing technique balances the level of protection and design quality.We conduct a case study on how to protect a timing-driven gate duplication algorithm. Experimental results on a large set of MCNC benchmarks confirm that the pre-processing technique results in a significant reduction (about 48%) of the optimization power of the tool, while the post-processing technique has almost no penalty (less than 2%) on the tool's performance.

References

[1]
E. Charbon. "Hierarchical Watermarking in IC Design", CICC 98, pp. 295--298.
[2]
C.S. Collberg and C. Thomborson, "Watermarking, tamper-proofing, and obfuscation--tools for software protection", IEEE Transactions on Software Engineering, Vol. 8, series 8, 2002.
[3]
A. Fin and F. Fummi. "A Web-CAD Methodology for IP-Core Analysis and Simulation", DAC 00, pp. 597--600.
[4]
D. Kirovski, D. Liu, J.L. Wong, and M. Potkonjak. "Forensic Engineering Techniques for VLSI CAD Tools", DAC 00, pp. 581--586.
[5]
G. Qu and M. Potkonjak. Intellectual Property Protection in VLSI Designs: Theory and Practice, Kluwer Academic Publishers, 2003.
[6]
E. M. Sentovich et al., SIS: A System for Sequential Circuit Synthesis, Memorandum No. UCB/ERL M92/41, Department of EECS. UC Berkeley, May 1992.
[7]
A. Srivastava, R. Kastner, C. Chen and M. Sarrafzadeh, "Timing Driven Gate Duplication," IEEE Transactions on Very Large Scale Integrated Systems, Jan 2004.
[8]
http://eet.com/news/97/946news/evidence.html

Cited By

View all
  • (2019)Software Birthmark Design and Estimation: A Systematic Literature ReviewArabian Journal for Science and Engineering10.1007/s13369-019-03718-9Online publication date: 16-Jan-2019
  • (2018)A Reverse Engineering-Based Framework Assisting Hardware Trojan Detection for Encrypted IPs2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)10.1109/IMCCC.2018.00340(1649-1652)Online publication date: Jul-2018
  • (2017)Combined packet and TDM circuit switching NoCs with novel connection configuration mechanism2017 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS.2017.8050829(1-4)Online publication date: May-2017
  • Show More Cited By

Index Terms

  1. VLSI CAD tool protection by birthmarking design solutions

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '05: Proceedings of the 15th ACM Great Lakes symposium on VLSI
    April 2005
    518 pages
    ISBN:1595930574
    DOI:10.1145/1057661
    • General Chair:
    • John Lach,
    • Program Chairs:
    • Gang Qu,
    • Yehea Ismail
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 April 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CAD
    2. birthmarking
    3. intellectual property
    4. protection

    Qualifiers

    • Article

    Conference

    GLSVLSI05
    Sponsor:
    GLSVLSI05: Great Lakes Symposium on VLSI 2005
    April 17 - 19, 2005
    Illinois, Chicago, USA

    Acceptance Rates

    Overall Acceptance Rate 312 of 1,156 submissions, 27%

    Upcoming Conference

    GLSVLSI '25
    Great Lakes Symposium on VLSI 2025
    June 30 - July 2, 2025
    New Orleans , LA , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Software Birthmark Design and Estimation: A Systematic Literature ReviewArabian Journal for Science and Engineering10.1007/s13369-019-03718-9Online publication date: 16-Jan-2019
    • (2018)A Reverse Engineering-Based Framework Assisting Hardware Trojan Detection for Encrypted IPs2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)10.1109/IMCCC.2018.00340(1649-1652)Online publication date: Jul-2018
    • (2017)Combined packet and TDM circuit switching NoCs with novel connection configuration mechanism2017 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS.2017.8050829(1-4)Online publication date: May-2017
    • (2017)Practical IP watermarking and fingerprinting methods for ASIC designs2017 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS.2017.8050604(1-4)Online publication date: May-2017
    • (2016)VLSI supply chain security risks and mitigation techniques: A surveyIntegration10.1016/j.vlsi.2016.03.00255(438-448)Online publication date: Sep-2016
    • (2006)VLSI Design IP ProtectionProceedings of the first NASA/ESA conference on Adaptive Hardware and Systems10.1109/AHS.2006.77(469-476)Online publication date: 15-Jun-2006

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media