A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs

被引:55
作者
Maes, Roel [1 ]
Schellekens, Dries [1 ]
Verbauwhede, Ingrid [1 ]
机构
[1] Katholieke Univ Leuven, COSIC Res Grp, Dept Elect Engn ESAT, B-3001 Heverlee, Belgium
关键词
Cloning; design security; field-programmable gate array (FPGA); hardware metering; intellectual property (IP) protection; reverse-engineering; soft intellectual property (IP); SECURITY;
D O I
10.1109/TIFS.2011.2169667
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently achievable intellectual property (IP) protection solutions for field-programmable gate arrays (FPGAs) are limited to single large "monolithic" configurations. However, the ever growing capabilities of FPGAs and the consequential increasing complexity of their designs ask for a modular development model, where individual IP cores from multiple parties are integrated into a larger system. To enable such a model, the availability of IP protection at the modular level is imperative. In this work, we propose an IP protection mechanism for FPGA designs at the level of individual IP cores, by making use of the self-reconfiguring capabilities of modern FPGAs and deploying a trusted third party to run a metering service, similar to the work of Guneysu et al. and Drimer et al. The proposed scheme makes it possible to enforce a pay-per-use licensing scheme which holds considerable advantages, both for IP core providers as well as for system integrators. Moreover, the scheme has a minimal implementation overhead and is the first of its kind to be solely based on primitives that are already available in recent commercially available FPGA devices. This allows for an immediate and feasible deployment, in contrast to earlier proposed solutions.
引用
收藏
页码:98 / 108
页数:11
相关论文
共 41 条
[1]   A survey on IP watermarking techniques [J].
Abdel-Hamid, AT ;
Tahar, S ;
Aboulhamid, EM .
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2004, 9 (03) :211-227
[2]   TRANSACTION SECURITY SYSTEM [J].
ABRAHAM, DG ;
DOLAN, GM ;
DOUBLE, GP ;
STEVENS, JV .
IBM SYSTEMS JOURNAL, 1991, 30 (02) :206-229
[3]  
Alkabani Y, 2007, IEEE IC CAD, P674
[4]  
Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
[5]  
[Anonymous], 766 XIL
[6]  
[Anonymous], 2005, 267 XIL
[7]  
[Anonymous], 2008, 266 XIL
[8]  
[Anonymous], 2004, M2DSGN ALT
[9]  
[Anonymous], 2008, PROTECTING MULTIPLE
[10]  
[Anonymous], 2010, STRATIX V FGPAS BUIL