scispace - formally typeset
Proceedings ArticleDOI

Secure Leakage-Proof Public Verification of IP Marks in VLSI Physical Design

Debasri Saha, +1 more
- pp 169-174
Reads0
Chats0
TLDR
A zero-knowledge protocol to ensure robust and absolutely leakage proof convincing public verification with the help of private marks is proposed and the results on overhead and robustness are encouraging.
Abstract
Reuse of Intellectual Property (IP) of VLSI physical design facilitates integration of more components on a single chip in shrinking time-to-market. For intellectual property protection (IPP), various kinds of IP marks are embedded into the design for establishing the veracity of a legal owner. However, public verification of IP marks is not leakage-proof. Current techniques include a sufficiently large set of public marks containing a header and a message body in addition to private ones to facilitate only public verification at the cost of significant increase in design overhead. But these techniques are not effective, as attackers manage to obtain potential clues to tamper public marks rendering public verification invalid and may also suitably override the marks to include own signature resulting in wrong public identification of IP owner. Here we propose a zero-knowledge protocol to ensure robust and absolutely leakage proof convincing public verification with the help of private marks. We have tested our protocol for FPGA benchmarks. The results on overhead and robustness are encouraging.

read more

Citations
More filters
Journal ArticleDOI

Secure Public Verification of IP Marks in FPGA Design Through a Zero-Knowledge Protocol

TL;DR: This work establishes that Verify_ZKP satisfies zero-knowledge property, and introduces statistical metrics to measure its robustness and overhead, and has simulated the protocol for IWLS'05 FPGA benchmarks.
Proceedings ArticleDOI

Trusted sharing of intellectual property in electronic hardware design

TL;DR: In the emerging field of Intellectual property protection and security for ICs and SoCs with design reuse for shorter time-to-market, misappropriation may be categorized as unauthorized access or interception, generation of illegal copies and insertion of hardware trojan horse.
References
More filters
Book

Space-filling curves

Hans Sagan
TL;DR: The subject of space-filling curves has generated a great deal of interest in the 100 years since the first such curve was discovered by Peano as discussed by the authors, but there have been no comprehensive treatment of the subject since Siepinsky's in 1912.
Journal ArticleDOI

Constraint-based watermarking techniques for design IP protection

TL;DR: Watermarking-based IP protection as mentioned in this paper addresses IP protection by tracing unauthorized reuse and making untraceable unauthorized reuse as difficult as recreating given pieces of IP from scratch, where a watermark is a mechanism for identification that is nearly invisible to human and machine inspection; difficult to remove; and permanently embedded as an integral part of the design.
Journal ArticleDOI

Fingerprinting techniques for field-programmable gate array intellectual property protection

TL;DR: This work presents the first technique that leverages the unique characteristics of field-programmable gate arrays (FPGAs) to protect commercial investment in intellectual property through fingerprinting.
Proceedings ArticleDOI

Fast Robust Intellectual Property Protection for VLSI Physical Design

TL;DR: The proposed algorithm ROBUST-IP facilitates faster extraction of signatures of IP owner and buyer, whereas removing or tampering the watermarks by an attacker remains infeasible, even if public verification is allowed.
Proceedings ArticleDOI

Publicly detectable techniques for the protection of virtual components

TL;DR: This paper proposes a new watermarking method which allows the watermark to be public detected without forensic experts, gives little advantage to attackers for forgery, and does not lose the strength of protection provided by other water marking techniques.
Related Papers (5)