0% found this document useful (0 votes)
19 views17 pages

Cursul 3 SAS

The document discusses techniques for digital watermarking and fingerprinting of intellectual property (IP) cores in field-programmable gate arrays (FPGAs). It describes zero-overhead watermarking methods that insert watermarks without degrading circuit performance. Fingerprinting techniques are also covered, which allow generating multiple unique versions of an IP with different watermarks to identify specific customers. Hardware metering is briefly discussed as a method to control and identify integrated circuits after fabrication to prevent overproduction by third-party manufacturers.

Uploaded by

Bot Bot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views17 pages

Cursul 3 SAS

The document discusses techniques for digital watermarking and fingerprinting of intellectual property (IP) cores in field-programmable gate arrays (FPGAs). It describes zero-overhead watermarking methods that insert watermarks without degrading circuit performance. Fingerprinting techniques are also covered, which allow generating multiple unique versions of an IP with different watermarks to identify specific customers. Hardware metering is briefly discussed as a method to control and identify integrated circuits after fabrication to prevent overproduction by third-party manufacturers.

Uploaded by

Bot Bot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

• Making a good watermark involves:

• Keeping the correct FUNCTIONALITY of the IP

• The overhead introduced by the watermark must be negligible or very small

• Demonstration with high credibility of the IP manufacturer or the probability of ip


repetition is very small

• Easily detecting it

• It is difficult or even impossible to remove

• Its addition and detection must be transparent to existing design tools

• Protecting a specific part of the project


• Unpredictable design overhead
• Random constraints based on the watermark
• Non-deterministic design tools and software
• Controllability vs security

• Zero-overhead watermark
• Normal design to achieve optimal performance

• Identifying where we can include the watermark without causing performance


degradation

• Inclusion of watermark

• Partial or total redesign


• Zero-overhead watermark in FPGA
• Reading the circuit code

• Circuit synthesis

• Place & Route


• Get information about delays in the circuit

• Change the constraints about delay for n selected wires (n represents the number of bits of
signature)

• Place & Route

• There are fulfilled constraints for running time ?

• If not, we will return to modify the constraints by reselect the wires or we will reduce the
dimension of the signature

• Generate bitstream ??????


Source FF Destination FF Original delay Watermark Delay
Inst_reg_0 Aluinp1_reg_3 17.758 0 17.750
Inst_reg_6 Aluinp1_reg_3 17.755 1 17.751
Inst_reg_1 Aluinp1_reg_3 17.733 0 17.730
Inst_reg_3 Aluinp1_reg_3 17.651 0 17.650
Inst_reg_6 Aluinp1_reg_1 17.374 1 17.371
Inst_reg_1 Aluinp1_reg_1 17.352 1 17.351
Inst_reg_5 Aluinp1_reg_3 17.312 0 17.310
Inst_reg_0 Aluinp1_reg_5 17.066 1 17.061
Proiectare în FPGA Original Watermark Distanța Hamming
DAP Resources 1011 1011 1.09%
f = 40 MHz Yes Yes
Video Resources 961 961 4.39%
f = 40 MHz yes Yes
RISC Resources 410 410 2.52%
f = 50 MHz Yes Yes
ADDRGEN Resources 174 174 2.41%
f = 50 MHz Yes yes
Detectability of watermark
How to discover the embedded watermark and prove authorship ?
Fingerprinting
• Watermark cannot distinguish between different copies of the same IP (different IPs).

• If we sell the IP to 10 users, we will want to know which IP is assigned to whom

• Digital fingerprint is a protocol that make every copy of an object unique and
distinguishable.

• Fingerprint = multiple distinct watermarks

• The technique addresses 2 problems: how do we generate IPs with different fingerprints
and how to distribute solutions to users
Fingerprinting
• Phase 1 – IP generation
• Quantity - how he could create a large lot of solutions
• Quality - assumes that the solutions found keep the values of the IPs
• Run-time - how we minimize time and complexity to generate as many solutions as
possible.

• Phase 2 – IP distribution
• Uniqueness - different users must receive unique fingerprint IPs
• Robustness - modifying or removing fingerprints from IPs should be impossible or as
difficult as possible to achieve by a hacker.
• Collation - fingerprint IPs should be as different as possible from each other in order
to avoid collations
Tehnici Fingerprinting
Metoda 1 – adăugarea de constrângeri Metoda 2 - iterativă
Tehnici Fingerprinting
Metoda 1 – adăugarea de constrângeri Metoda 2 - iterativă
Exemplu de colorare a grafului
Exemplul 2
Metoda duplicării
• Puteam crea mai multe soluții prin modificarea culorii sau
specificarea nodurilor fără a mai verifica nodurile adiacente sau
vecinii.
Fingerprint: condiții don’t cares
Fingerprint: condiții don’t cares
Hardware metering
• Companies that design circuits can not afford to assume the costs of producing them

• Manufacture of designed circuits – outsourcing

• Outsourcing companies have access to all the details of the circuit and the possibility to produce more chips than were
ordered

• ‘’ Integrated circuits metering, or hardware metering, is an effective method to defend against this IP infringement.
Integrated circuit metering is a set of security protocols that enable the design house to achieve post-fabrication control
over their Ics’ – F. Koushanfar

• Once the IP is made and the circuit mask is built, the company that designed the circuit no longer has any control over the
circuit

• The chip company can use all the information in its possession as well as the production facilities to reproduce the design
with negligible costs.

• Can we use digital watermarking ?


Hardware metering
• Using a unique tag for each circuit built and controlling them

• Chip identification – passive metering (enable, disable or control


the chip)

• Metering methods can be controlled internally or externally


depending on how the control is – part of the design or not

• Using serial numbers

• A serial number can be inscribed on the circuit or can remain


permanently in a memory

• The ICID tag was proposed in 2007 and is considered non-


clonable because it is based on the variation of silicone
production

You might also like