A Robust FSM Watermarking Scheme for IP Protection of Sequential Circuit Design
read more
Citations
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing
Designing Trusted Embedded Systems from Finite State Machines
A novel method for watermarking sequential circuits
Ultra-Low Overhead Dynamic Watermarking on Scan Design for Hard IP Protection
A Blind Dynamic Fingerprinting Technique for Sequential Circuit Intellectual Property Protection
References
Handbook of Applied Cryptography
Synthesis and optimization of digital circuits
Sequential circuit design using synthesis and optimization
Constraint-based watermarking techniques for design IP protection
Techniques for the creation of digital watermarks in sequential circuit designs
Related Papers (5)
Frequently Asked Questions (16)
Q2. How can the authorship of the watermarked FSM be verified off the chip?
Since only the test signals can be traced after the chip is packaged, the authorship of the watermarked FSM can be verified off chip by making it a part of the test kernel.
Q3. How many transitions are needed to avoid the introduction of unspecified input variables?
To avoid introducing an excessive number of unspecified transitions due to the addition of pseudo input variables, N needs to be sufficiently larger thanm/k.
Q4. What is the probability that the watermark is detected in the output sequence?
The false positive rate, which is the probability that the watermark is detected in the output sequence under a different random input sequence, can be estimated statistically.
Q5. What is the weakness of the scheme?
The weakness of this scheme is the monotonous use of only the unspecified transitions with the specified outputs of STG for watermark insertion.
Q6. How many transitions are used for watermarking?
The probability of the output of a transition coinciding with the watermark bits is as low as 1/8, which results in only one out of three existing transitions being used for watermarking.
Q7. What is the concept of constraint-based watermarking?
The notion of constraint-based watermarking, first proposed by Hong and Potkonjak, [2] has now been widely applied to embed authorship signature into VLSI designs developed at different design abstraction levels, such as architectural level [9], [10], combinational logic synthesis level [4]-[7] and physical placement and routing [8].
Q8. How many transitions can be generated by GenFSM?
As SIS tool can only read STG in KISS2 format, to show the applicability of their method on large designs, the authors use GenFSM [28] to generate ten arbitrary STGs of hundreds to thousands of transitions for experimentation by specifying the number of inputs/outputs and states.
Q9. What is the advantage of FSM watermarking?
FSM watermarking has the advantage that the IP author signature can be lucidly recovered by applying a verification code sequence.
Q10. How many transitions are used to produce the watermark?
As the 8 watermark bits are dispersed into 8 transitions, the probability of the output of an existing transition coinciding with the watermark bit is as high as 1/2, which results in five existing transitions being reused for watermarking and only one new transition is added, as shown in Fig. 1(d).
Q11. What is the effect of watermarking on the FSM?
When all output bits of an existing transition of a visited node coincide with a substring of the watermark, that transition is automatically watermarked.
Q12. What is the applicability of this type of sequential redundancy removal?
Even with the use of implicit STG traversal techniques, the applicability of this type of sequential redundancy removal is restricted to small circuits.
Q13. What is the probability of the watermarking overheads for the designs?
It is conjecture that the watermarking overheads will become negligible for FSMs with many more states and input and output variables than those simulated.
Q14. How many transitions are searched to match the watermark bits?
When the scheme in [14] is applied to embed an 8-bit watermark sequence “10101000”, three (m/k = 3) consecutive transitions will be searched to match the watermark bits with the output bits.
Q15. Why is it not possible for Bob to add his own watermark into Alice’s watermarked?
Owing to the resilience of the proposed watermarking scheme against watermark erasure without changing the properties of FSM, even if Bob can succeed in adding his own watermark into Alice’s watermarked FSM, Bob’s watermarked design will contain Alice’s watermark.
Q16. What is the way to remove the pseudo inputs?
Even if Bob knows about the addition of some pseudo inputs, removal of the circuitries connected to these pseudo inputs will cause malfunction to the watermarked FSM.