您好,欢迎访问三七文档
WatermarkingTechniquesforElectronicCircuitDesignEdoardoCharbon1andIlhamiTorunoglu21SwissFederalInstituteofTecnology,Lausanne,Switzerlandedoardo.charbon@epfl.ch2CanestaInc.,SanJose,CaliforniaU.S.A.ilhami@canesta.comAbstract.Enforcingcopyrightlawsrelatedtocircuitdesignisusuallyhard,sincediscoveryandproofofinfringementsarerequiredbeyondrea-sonabledoubt.Provingthatagivencircuitryistriviallyderivedfromapatentedtechniqueormethodisingeneralapainstakinglyslowtask,oftenrequiringreverse-engineeringandforensicanalysisoffabricatedchips.Thesetechniquesaresocomplexthattheirapplicationtolargecollectionsofcommercialproductsisalmostalwaysprohibitive.Water-markingisoneofseveraltechniquesavailabletodaytodetercopyrightinfringementinelectronicsystems.Thetechniqueconsistsofimplantingindeliblestampsinthecircuit'sinnerstructure,whilenotdisruptingitsfunctionalityorsignicantlydegradingitsperformance.Inthispaperaseriesofmethodsisproposedforthecreationofwatermarksatseveralstagesofthedesigncycle,fromhigh-leveldesigntolayout.Algorithmsaredescribedforimplantingrobustwatermarkstominimizetheover-headand,ultimately,toreducetheimpactonperformance.Detectionmethodsarediscussedinthepresenceofinfringement.Theresilienceofthemethodsinseveraltamperingregimesisestimated.1IntroductionWiththeintroductionoflarge-scalesystem-on-chip(SOC)designparadigms,theVLSIsemiconductorindustryisundergoingarevolution.Asaconsequence,asignicantincreaseinoperatingspeedsanddesignproductivityisexpected.Circuitcomponentswillbeavailabletointegratorsinelectronicformratherthaninsilicon.Suchcomponents,knownasvirtualcomponents,willbedeliveredforaparticularapplicationaccordingtoaspeciccontract.Duetothenewmediumofstorageandexchange,virtualcomponentsarepronetoinfringementsandabuses,i.e.usesbeyondtheoriginalcontractsand/orbyunauthorizedintegra-tors.ProtectingtheIntellectualProperty(IP)rightsoftheauthorsofvirtualcomponentisanemergingmulti-disciplinaryeldencompassingseveralaspectsoftoday'sICdesignprocess.Existinglegaldevices,suchaspatents,tradesecrets,copyrights,andnon-disclosureagreementsareaimedatdeterringpotentialinfringement.However,therealAchille'shealofthesystemiscurrentlytheenforcementofsuchrights.ThegoalofIPprotectionasawholeistoprovidenecessarytechnologiestomakeenforcementamoremanageabletaskwhiledeterringinfringementatalllevelsofadesign.ApossiblesuchschemerequiresthecapabilityofeectivelydetectingandsubsequentlytrackingIPinfringementcases.Thistaskcanbeaccomplishedbyaprocessknownaswatermarking.Themethodconsistsofem-beddingauniquecode,orwatermark,whichexploitstheIP'suniquefeatures.Fundamentalrequirementsforawatermarkarethatitbe(1)transparent,i.e.notinterferingwiththedesignfunctionality,(2)robust,i.e.hardtoremoveorforge,(3)detectable,i.e.easytoextractfromthedesign.Theprocessusedformanagingwatermarksmustnotnecessarilybeproprietary,whilethecodeusedintheencryptionprocessshouldbesecretforanyreleasedIP.Thereexistthreebasictypesofvirtualcomponent,basedonitscharacteriza-tionthrough(a)behavioraldescription(softIP),(b)structuraldescription(rmIP),and(c)physicaldescription(hardIP).HardIPsaregenerallyreleasedasaplug-and-playcomponentforoneormoretechnologies,whilermandsoftIPsarepartiallyimplementedversionsofadesign,thusanumberofdegreesoffree-domarestillavailabletotheintegratorandpotentiallyalltechnologiescanbeusedforimplementation.DuetothediversityoftheimplementationlandscapeofIPs,theirprotectionisalsoacomplextask.Recently,watermarkinghasbeenproposedtoprotectdigitalaudio-visualIPs.Theliteratureisveryextensiveonthesubject.Herewementiononlytwoworks[1,2]becausetheyallowustointroducesomeofthetechniquesusedinthispaper.Themainmethoddescribedin[1,2],thoughwithsmallvariations,essentiallyconsistofsuperimposingapseudo-randomnoisetothesignaloftherecord.Suchnoise,thoughcompletelyinaudible,canbeeasilydetectedviadigitalsignalprocessingmethods.SchemesbasedonwatermarkinghavebeenrecentlyproposedforelectronicIPsaswell.In[3,4]thewatermarkassumestheformofaextraneousbitstream,hiddeninsidelargeFieldProgrammableGateArrays(FPGAs).ThewatermarkisstoredinsomeoftheunusedcongurablecontrollogicblocksoftheFPGA.Eachunusedlookuptableisresponsibleforstoringasinglebitinthecode.Allthecongurablecontrolelementsusedinthewatermarkarethenroutedinthedesignformimeticpurposes.Thisisdoneinsuchamannertoavoidanyimpactontheoriginalfunctionality.Themethodhaslaterbeenrenedin[5]wherethesignatureismodiedbeforebeingembeddedsoastomimicthestatisticalpropertiesoftheexistingdesign,hencereducingdetectability.Oneissueinouropinionstillremaininginthisapproachisthefactthattodatewatermarkedlookuptablesdonotreectanyfunctionality,thusrepresentingapotentialweakpointinthescheme.In[6,7]itwasproposedtoincorporateseveralwatermarks,distributedoveralltheabstractionlevelsofagivendesign.Thetechniquesdierdependingontheabstractionleveltheyareapplicableto.Atthephysicaldesignlevel,thewatermarkassumestheformofasetoftopologicalconstraintsgoverningtherelativeposition,orientation,and,possibly,scalingofthedevicesorgatesofthecircuit.AtstructuralandRTLlevel,const
本文标题:Watermarking Techniques for Electronic Circuit Des
链接地址:https://www.777doc.com/doc-6188719 .html