Binary decision diagrams and beyond: enabling technologies for formal verification
ICCAD '95 Proceedings of the 1995 IEEE/ACM international conference on Computer-aided design
IBM Systems Journal
Efficient procedure mapping using cache line coloring
Proceedings of the ACM SIGPLAN 1997 conference on Programming language design and implementation
System-level synthesis of low-power hard real-time systems
DAC '97 Proceedings of the 34th annual Design Automation Conference
Minimizing Area Cost of On-Chip Cache Memories by Caching Address Tags
IEEE Transactions on Computers
Robust IP watermarking methodologies for physical design
DAC '98 Proceedings of the 35th annual Design Automation Conference
A Computing Procedure for Quantification Theory
Journal of the ACM (JACM)
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Search State Equivalence for Redundancy Identification and Test Generation
Proceedings of the IEEE International Test Conference on Test: Faster, Better, Sooner
Document marking and identification using both line and word shifting
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume - Volume 2
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Robust IP watermarking methodologies for physical design
DAC '98 Proceedings of the 35th annual Design Automation Conference
Signature hiding techniques for FPGA intellectual property protection
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Analysis of emerging core-based design lifecycle
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Optimization-intensive watermarking techniques for decision problems
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Robust FPGA intellectual property protection through multiple small watermarks
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Effective iterative techniques for fingerprinting design IP
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Fingerprinting intellectual property using constraint-addition
Proceedings of the 37th Annual Design Automation Conference
Hardware/software IP protection
Proceedings of the 37th Annual Design Automation Conference
Localized watermarking: methodology and application to operation scheduling
ICCAD '99 Proceedings of the 1999 IEEE/ACM international conference on Computer-aided design
Copy detection for intellectual property protection of VLSI designs
ICCAD '99 Proceedings of the 1999 IEEE/ACM international conference on Computer-aided design
ASP-DAC '00 Proceedings of the 2000 Asia and South Pacific Design Automation Conference
Publicly detectable techniques for the protection virtual components
Proceedings of the 38th annual Design Automation Conference
Watermarking of SAT using combinatorial isolation lemmas
Proceedings of the 38th annual Design Automation Conference
Watermarking graph partitioning solutions
Proceedings of the 38th annual Design Automation Conference
Proceedings of the 38th annual Design Automation Conference
Watermarking integer linear programming solutions
Proceedings of the 39th annual Design Automation Conference
A Survey of Digital Design Reuse
IEEE Design & Test
Virtual Simulation of Distributed IP-Based Designs
IEEE Design & Test
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Keyless Public Watermarking for Intellectual Property Authentication
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Intellectual Property Metering
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Novel Watermarking Technique for LUT Based FPGA Designs
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
A watermarking system for IP protection by a post layout incremental router
Proceedings of the 42nd annual Design Automation Conference
IPP@HDL: efficient intellectual property protection scheme for IP cores
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Active hardware metering for intellectual property protection and security
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A method for hardware metering
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Protecting bus-based hardware IP by secret sharing
Proceedings of the 45th annual Design Automation Conference
Hardware protection and authentication through netlist level obfuscation
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
An Efficient and Reliable Watermarking System for IP Protection
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Information Systems Frontiers
Video Watermarking and Benchmarking
Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies
A SVD-based fragile watermarking scheme for image authentication
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
IPR protection in IC's using watermarks
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia
An FPGA intellectual property authentication scheme through watermarking techniques
IMCAS'06 Proceedings of the 5th WSEAS international conference on Instrumentation, measurement, circuits and systems
Offline hardware/software authentication for reconfigurable platforms
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Soft IP protection: watermarking HDL codes
IH'04 Proceedings of the 6th international conference on Information Hiding
Information hiding in finite state machine
IH'04 Proceedings of the 6th international conference on Information Hiding
Proceedings of the 3rd Multimedia Systems Conference
Spider: A system for finding 3D video copies
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
CLIP: circuit level IC protection through direct injection of process variations
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Security analysis of integrated circuit camouflaging
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hardware security: threat models and metrics
Proceedings of the International Conference on Computer-Aided Design
Hi-index | 0.00 |
Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is (i) nearly invisible to human and machine inspection, (ii) difficult to remove, and (iii) permanently embedded as an integral part of the design. We survey related work in cryptography and design methodology, then develop desiderata, metrics and example approaches — centering on constraint-based techniques — for watermarking at various stages of the VLSI design process.