Constraint-based watermarking techniques for design IP protection

被引:136
作者
Kahng, AB [1 ]
Lach, J
Mangione-Smith, WH
Mantik, S
Markov, IL
Potkonjak, M
Tucker, P
Wang, HJ
Wolfe, G
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Univ Virginia, Dept Elect & Comp Engn, Charlottesville, VA 22904 USA
[3] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
[4] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[5] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
[6] Univ Calif San Diego, Dept Comp Sci & Elect, La Jolla, CA 92093 USA
[7] Sun Microsyst Inc, Palo Alto, CA 94303 USA
基金
美国国家科学基金会;
关键词
intellectual property protection; physical design; VLSI; watermark;
D O I
10.1109/43.952740
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is: 1) nearly invisible to human and machine inspection; 2) difficult to remove, and 3) permanently embedded as an integral part of the design. Watermarking addresses IP protection by tracing unauthorized reuse and making untraceable unauthorized reuse as difficult as recreating given pieces of IP from scratch. We survey related work in cryptography and design methodology, then develop desiderata, metrics, and concrete protocols for constraint-based watermarking at various stages of the very large scale integration (VLSI) design process. In particular, we propose a new preprocessing approach that embeds watermarks as constraints into the input of a black-box design tool and a new postprocessing approach that embeds watermarks as constraints into the output of a black-box design tool. To demonstrate that our protocols can be transparently integrated into existing design flows, we use a testbed of commercial tools for VLSI physical design and embed watermarks into real-world industrial designs. We show that the implementation overhead is low-both in terms of central processing unit time and such standard physical design metrics as wirelength, layout area, number of vias, and routing congestion. We empirically show that in the placement and routing applications considered in our methods achieve strong proofs of authorship are resistant to tampering and do not adversely influence timing.
引用
收藏
页码:1236 / 1252
页数:17
相关论文
共 57 条
[1]   RECENT DIRECTIONS IN NETLIST PARTITIONING - A SURVEY [J].
ALPERT, CJ ;
KAHNG, AB .
INTEGRATION-THE VLSI JOURNAL, 1995, 19 (1-2) :1-81
[2]  
ALPERT CJ, 1997, P ACM IEEE INT S PHY, P4
[3]  
[Anonymous], 1983, NOTES INTRO COMBINAT
[4]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
[5]  
[Anonymous], FALL WORLDW MEMB M Y
[6]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[7]   Protecting ownership rights through digital watermarking [J].
Berghel, H ;
OGorman, L .
COMPUTER, 1996, 29 (07) :101-103
[8]   A NEW ADAPTIVE MULTI-START TECHNIQUE FOR COMBINATORIAL GLOBAL OPTIMIZATIONS [J].
BOESE, KD ;
KAHNG, AB ;
MUDDU, S .
OPERATIONS RESEARCH LETTERS, 1994, 16 (02) :101-113
[9]   Digital watermarks for audio signals [J].
Boney, L ;
Tewfik, AH ;
Hamdy, KN .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, 1996, :473-480
[10]  
Bors AG, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P231, DOI 10.1109/ICIP.1996.560426