skip to main content
article

Behavioral synthesis techniques for intellectual property protection

Published:01 July 2005Publication History
Skip Abstract Section

Abstract

We introduce dynamic watermarking techniques for protecting the value of intellectual property of CAD and compilation tools and reusable design components. The essence of the new approach is the addition of a set of design and timing constraints which encodes the author's signature. The constraints are selected in such a way that they result in a minimal hardware overhead while embedding a unique signature that is difficult to remove and forge. Techniques are applicable in conjunction with an arbitrary behavioral synthesis task such as scheduling, assignment, allocation, transformation, and template matching.On a large set of design examples, studies indicate the effectiveness of the new approach that results in signature data that is highly resilient, difficult to detect and remove, and yet is easy to verify and can be embedded in designs with very low hardware overhead. For example, the probability that the same design with the embedded signature is obtained by any other designers by themselves is less than 1 in 10102, and no register overhead was incurred. The probability of tampering, the probability that part of the embedded signature can be removed by random attempts, is shown to be extremely low, and the watermark is additionally protected from such tampering with error-correcting codes.

References

  1. Anderson, R. and Kuhn, M. 1996. Tamper resistance---A cautionary note. In 2nd USENIX Workshop on Electronic Commerce, 1--11.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bender, W., Gruhl, D., Morimoto, N., and Lu, A. 1996. Techniques for data hiding. IBM Syst. J. 35, 3/4, 313--336.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Benedens, O. and Busch, C. 2000. Towards blind detection of robust watermarks in polygonal models. In Proceedings of the European Association for Computer Graphics (EUROGRAPHICS) vol. 19, 199--208.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. Berghel, H. and O'Gorman, L. 1996. Protecting ownership rights through digital watermarking. IEEE Comput. 29, 7, 101--103.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Boney, L., Tewfik, A. H., and Hamdy, K. N. 1996. Digital watermarks for audio signals. In Proceedings of the International Conference on Multimedia Computing and Systems. 473--480.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Brassil, J. T., Low, S., and Maxemchuk, N. F. 1999. Copyright protection for the electronic distribution of text documents. Proceedings of the IEEE, 87, 7, 1181--1196.]]Google ScholarGoogle ScholarCross RefCross Ref
  7. Chapman, R. and Durrani, T. S. 2000. Ip protection of dsp algorithms for system on chip implementation. IEEE Trans. Signal Process. 48, 3, 854--861.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Charbon, E. 1998. Hierarchical watermarking in ic design. In Proceedings of the Custom Integrated Circuits Conference. 295--235.]]Google ScholarGoogle ScholarCross RefCross Ref
  9. Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T. 1996. A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia. In Proceedings of IEEE Southcon. 192--197.]]Google ScholarGoogle Scholar
  10. Craver, S., Memon, N., Yeo, B. L., and Yeung, M. M. 1996. Can invisible watermarks resolve rightful ownerships? IBM Tech. rep., RC 20509, 1996.]]Google ScholarGoogle Scholar
  11. Crochiere, R. E. and Oppenheim, A. V. 1975. Analysis of linear digital networks. In Proceedings of the IEEE 63, 4, 581--595.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. Fernandez, D. 1994. Intellectual property protection in the EDA industry. In Proceedings of the Design Automation Conference. 161--163.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Girczyc, E. and Carlson, S. 1993. Increasing design quality and engineering productivity through design reuse. In Proceedings of the Design Automation Conference. 48--53.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hada, S. 2000. Zero-knowledge and code obfuscation. In Proceedings of the (ASIACRYPT) International Conference on the Theory and Application of Cryptology and Information Security, T. Okamoto Ed., 443--457.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hartung, F. and Kutter, M. 1999. Multimedia watermarking techniques. In Proceedings of the IEEE 87, 1079--1107.]]Google ScholarGoogle ScholarCross RefCross Ref
  16. Irby, D. L., Newbould, R. D., Carothers, J. D., and Rodriguez, J. J. 2001. Placement watermarking of standard-cell designs. In IEEE Southwest Symposium on Mixed-Signal Design. 116--120.]]Google ScholarGoogle Scholar
  17. Johnson, D. S., Aragon, C. R., McGeoch, L. A., and Schevon, C. 1991. Optimization by simulated annealing: An experimental evaluation, Part II. Operat. Res. 39, 3, 378--406.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Johnson, N. F., Duric, Z., and Jajodia, S. 2001. Information Hiding: Steganography and Watermarking---Attacks and Countermeasures. Kluwer Academic, Boston, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Kahng, A. B., Lach, J., Mangione-Smith, W. H., and Mantik, S. 2001. Constraint-based watermarking techniques for design ip protection. IEEE Trans. Comput.-Aid. Design Integrat. Circuits Syst. 20, 10, 1236--1252.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Katzenbeisser, S. and Petitcolas, F. A. P. Eds. 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Khanna, S. and Zane, F. 2000. Watermarking maps: hiding information in structured data. In ACM/SIAM Symposium on Discrete Algorithms (SODA), 596--605.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kim, H. J., Mangione-Smith, W. H., and Potkonjak, M. 1998. Protecting ownership rights of a lossless image coder through hierarchical watermarking. In Workshop on Signal Processing Systems, 73--82.]]Google ScholarGoogle Scholar
  23. Kirovski, D., Hwang, Y., Potkonjak, M., and Cong, J. 1998. Intellectual property protection by watermarking combinational logic synthesis solutions. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design. 194--198.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kirovski, D. and Malvar, H. S. 2001. Spread-spectrum audio watermarking: Requirements, applications, and limitations. In IEEE International Workshop on Multimedia Signal Processing.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Kirovski, D. and Potkonjak, M. 2003. Local watermarks: Methodology and application to behavioral synthesis. IEEE Trans. VLSI CAD 22, 9, 1277--1284.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Kocher, P. C. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science, Advances in Cryptology, CRYPTO, 104--113.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Kocher, P. C. 1999. Differential power analysis: Leaking secrets. Lecture Notes in Computer Science, 388--397.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Koushanfar, F., Hong, I., and Potkonjak, M. 2003. Behavioral synthesis techniques for intellectual property protection. Tech. Rep., UCLA Computer Science Department.]]Google ScholarGoogle Scholar
  29. Koushanfar, F., Qu, G., and Potkonjak, M. 2001. Intellectual property metering. In IHW Information Hiding Workshop, 2137, 87--102.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Kumagai, J. 2000. Chip detectives {reverse engineering}. IEEE Spectrum 37, 11, 43--48.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Kutter, M. and Winkler, S. A. 2002. A vision-based masking model for spread-spectrum image watermarking. IEEE Trans. Image Process. 11, 1, 16--25.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Lach, J., Mangione-Smith, W. H., and Potkonjak, M. 1998. Fingerprinting digital circuits on programmable hardware. Information Hiding Workshop. 16--31.]]Google ScholarGoogle Scholar
  33. Lach, J., Mangione-Smith, W. H., and Potkonjak, M. 2001. Fingerprinting techniques for field-programmable gate array intellectual property protection. IEEE Trans. Comput.-Aid. Design Integrat. Circuits Syst. 20, 10, 1253--1261.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Lee, E. A. and Messerschmitt, D. G. 1987. Synchronous dataflow. In Proceedings of the IEEE 75, 9, 1235--1245.]]Google ScholarGoogle ScholarCross RefCross Ref
  35. Lin, S. and Costello, D. J. 1983. Error Control Coding. Prentice Hall.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Lofstrom, K., Daasch, W. R., and Taylor, D. 2000. IC identification circuit using device mismatch. In Proceedings of the IEEE International Solid-State Circuits Conference. 372--373.]]Google ScholarGoogle Scholar
  37. Meguerdichian, S. and Potkonjak, M. 2000. Watermarking while preserving the critical path. In Design Automation Conference. 108--111.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. De Micheli, G. 1994. Synthesis and Optimization of Digital Circuits. McGraw-Hill, New York, NY.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Newbould, R. D., Carothers, J. D., and Rodriguez, J. J. 2002. Watermarking ics for ip protection. Electron. Letters 38, 6, 272--274.]]Google ScholarGoogle ScholarCross RefCross Ref
  40. Newbould, R. D., Irby, D. L., Carothers, J. D., and Rodriguez, J. J. 2001. Mixed signal design watermarking for ip protection. In IEEE Southwest Symposium on Mixed-Signal Design. 110--115.]]Google ScholarGoogle Scholar
  41. Ohbuchi, R., Masuda, H., and Aono, M. 2000. A shape-preserving data embedding algorithm for nurbs curves and surfaces. Trans. Inform. Process. Soc. Japan 41, 3, 559--569.]]Google ScholarGoogle Scholar
  42. Oliveira, A. L. 2001. Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. Comput.-Aid. Design Integrat Circuits Syst. 20, 9, 1101--1117.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Podilchuk, C. and Zeng, W. 1997. Perceptual watermarking of still images. In IEEE Workshop on Multimedia Signal Processing. 363--368.]]Google ScholarGoogle Scholar
  44. Rabaey, J., Chu, C., Hoang, P., and Potkonjak, M. 1991. Fast prototyping of data path intensive architectures. IEEE Design and Test of Comput. 8, 2, 40--51.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Rashid, A., Asher, J., Mangione-Smith, W. H., and Potkonjak, M. 1999. Hierarchical watermarking for protection of dsp filter cores. In Custom Integrated Circuits Conference. 39--42.]]Google ScholarGoogle Scholar
  46. Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, New York, NY.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Swanson, M. D., Zhu, B., Chau, B., and Tewfik, A. H. 1997. Object-based transparent video watermarking. In IEEE Workshop on Multimedia Signal Processing. 369--374.]]Google ScholarGoogle Scholar
  48. Torunoglu, I. and Charbon, E. 1999. Watermarking-based copyright protection of sequential functions. In Custom Integrated Circuits Conference.]]Google ScholarGoogle Scholar
  49. van Schyndel, R. G., Tirkel, A. Z., and Osborne, C. F. 1994. A digital watermark. In Proceedings of the International Conference on Image Processing. 86--90.]]Google ScholarGoogle Scholar
  50. Wagner, D., Foster, J. S., Brewer, E. A., and Aiken, A. 2000. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium.]]Google ScholarGoogle Scholar
  51. Wong, J. L., Kirovski, D., and Potkonjak, M. 2001. Computational forensic techniques for intellectual property protection. In Information Hiding Workshop, 2137, 71--86.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Yeo, B. and Yeung, M. M. 1999. Watermarking 3d objects for verification. IEEE Comput. Graph. Applica. 19, 1, 36--45.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Yeung, M. M., Mintzer, F. C., Braudaway, G. W., and Rao, A. R. 1997. Digital watermarking for high-quality imaging. In IEEE Workshop on Multimedia Signal Processing. 357--362.]]Google ScholarGoogle Scholar

Index Terms

  1. Behavioral synthesis techniques for intellectual property protection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Design Automation of Electronic Systems
          ACM Transactions on Design Automation of Electronic Systems  Volume 10, Issue 3
          July 2005
          156 pages
          ISSN:1084-4309
          EISSN:1557-7309
          DOI:10.1145/1080334
          Issue’s Table of Contents

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 July 2005
          Published in todaes Volume 10, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader