Loading…

Constraint-based watermarking techniques for design IP protection

Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on computer-aided design of integrated circuits and systems 2001-10, Vol.20 (10), p.1236-1252
Main Authors: Kahng, A.B., Lach, J., Mangione-Smith, W.H., Mantik, S., Markov, I.L., Potkonjak, M., Tucker, P., Wang, H., Wolfe, G.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c402t-a313ff555badd4662ac7a03b739df89af8b8c8dbc92ee43d50f1c5ad1867781d3
cites cdi_FETCH-LOGICAL-c402t-a313ff555badd4662ac7a03b739df89af8b8c8dbc92ee43d50f1c5ad1867781d3
container_end_page 1252
container_issue 10
container_start_page 1236
container_title IEEE transactions on computer-aided design of integrated circuits and systems
container_volume 20
creator Kahng, A.B.
Lach, J.
Mangione-Smith, W.H.
Mantik, S.
Markov, I.L.
Potkonjak, M.
Tucker, P.
Wang, H.
Wolfe, G.
description Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is: (1) nearly invisible to human and machine inspection; (2) difficult to remove; and (3) permanently embedded as an integral part of the design. Watermarking addresses IP protection by tracing unauthorized reuse and making untraceable unauthorized reuse as difficult as recreating given pieces of IP from scratch. We survey related work in cryptography and design methodology, then develop desiderata, metrics, and concrete protocols for constraint-based watermarking at various stages of the very large scale integration (VLSI) design process. In particular, we propose a new preprocessing approach that embeds watermarks as constraints into the input of a black-box design tool and a new postprocessing approach that embeds watermarks as constraints into the output of a black-box design tool. To demonstrate that our protocols can be transparently integrated into existing design flows, we use a testbed of commercial tools for VLSI physical design and embed watermarks into real-world industrial designs. We show that the implementation overhead is low-both in terms of central processing unit time and such standard physical design metrics as wirelength, layout area, number of vias, and routing congestion. We empirically show that the placement and routing applications considered in our methods achieve strong proofs of authorship and are resistant to tampering and do not adversely influence timing.
doi_str_mv 10.1109/43.952740
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_914666335</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>952740</ieee_id><sourcerecordid>26678743</sourcerecordid><originalsourceid>FETCH-LOGICAL-c402t-a313ff555badd4662ac7a03b739df89af8b8c8dbc92ee43d50f1c5ad1867781d3</originalsourceid><addsrcrecordid>eNqF0btLAzEYAPAgCtbq4Op0OCgOV_NObizFR6Ggg84hl0dNbXM1uSL-96a0ODjo9A3fj-8JwDmCI4Rgc0vJqGFYUHgABqghoqaIoUMwgFjIGkIBj8FJzgsIEWW4GYDxpIu5TzrEvm51drb61L1LK53eQ5xXvTNvMXxsXK58lyrrcpjHavpcrVNXcn3o4ik48nqZ3dk-DsHr_d3L5LGePT1MJ-NZbSjEfa0JIt4zxlptLeUcayM0JK0gjfWy0V620kjbmgY7R4ll0CPDtEWSCyGRJUNwvatbWm8H6tUqZOOWSx1dt8mqQaUqJ4QVefWnxBIJygn9H3IupKCkwMtfcNFtUizrKimpQIhjXNDNDpnU5ZycV-sUyiG_FIJq-xxFido9p9iLnQ3OuR-3T34DZwaI3Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>884711622</pqid></control><display><type>article</type><title>Constraint-based watermarking techniques for design IP protection</title><source>IEEE Xplore (Online service)</source><creator>Kahng, A.B. ; Lach, J. ; Mangione-Smith, W.H. ; Mantik, S. ; Markov, I.L. ; Potkonjak, M. ; Tucker, P. ; Wang, H. ; Wolfe, G.</creator><creatorcontrib>Kahng, A.B. ; Lach, J. ; Mangione-Smith, W.H. ; Mantik, S. ; Markov, I.L. ; Potkonjak, M. ; Tucker, P. ; Wang, H. ; Wolfe, G.</creatorcontrib><description>Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is: (1) nearly invisible to human and machine inspection; (2) difficult to remove; and (3) permanently embedded as an integral part of the design. Watermarking addresses IP protection by tracing unauthorized reuse and making untraceable unauthorized reuse as difficult as recreating given pieces of IP from scratch. We survey related work in cryptography and design methodology, then develop desiderata, metrics, and concrete protocols for constraint-based watermarking at various stages of the very large scale integration (VLSI) design process. In particular, we propose a new preprocessing approach that embeds watermarks as constraints into the input of a black-box design tool and a new postprocessing approach that embeds watermarks as constraints into the output of a black-box design tool. To demonstrate that our protocols can be transparently integrated into existing design flows, we use a testbed of commercial tools for VLSI physical design and embed watermarks into real-world industrial designs. We show that the implementation overhead is low-both in terms of central processing unit time and such standard physical design metrics as wirelength, layout area, number of vias, and routing congestion. We empirically show that the placement and routing applications considered in our methods achieve strong proofs of authorship and are resistant to tampering and do not adversely influence timing.</description><identifier>ISSN: 0278-0070</identifier><identifier>EISSN: 1937-4151</identifier><identifier>DOI: 10.1109/43.952740</identifier><identifier>CODEN: ITCSDI</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Design engineering ; Design methodology ; Digital systems ; Hardware design languages ; Humans ; Inspection ; Integrated circuits ; Intellectual property ; IP (Internet Protocol) ; Product design ; Protection ; Reuse ; Studies ; Unauthorized ; Very large scale integration ; Watermarking</subject><ispartof>IEEE transactions on computer-aided design of integrated circuits and systems, 2001-10, Vol.20 (10), p.1236-1252</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2001</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c402t-a313ff555badd4662ac7a03b739df89af8b8c8dbc92ee43d50f1c5ad1867781d3</citedby><cites>FETCH-LOGICAL-c402t-a313ff555badd4662ac7a03b739df89af8b8c8dbc92ee43d50f1c5ad1867781d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/952740$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Kahng, A.B.</creatorcontrib><creatorcontrib>Lach, J.</creatorcontrib><creatorcontrib>Mangione-Smith, W.H.</creatorcontrib><creatorcontrib>Mantik, S.</creatorcontrib><creatorcontrib>Markov, I.L.</creatorcontrib><creatorcontrib>Potkonjak, M.</creatorcontrib><creatorcontrib>Tucker, P.</creatorcontrib><creatorcontrib>Wang, H.</creatorcontrib><creatorcontrib>Wolfe, G.</creatorcontrib><title>Constraint-based watermarking techniques for design IP protection</title><title>IEEE transactions on computer-aided design of integrated circuits and systems</title><addtitle>TCAD</addtitle><description>Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is: (1) nearly invisible to human and machine inspection; (2) difficult to remove; and (3) permanently embedded as an integral part of the design. Watermarking addresses IP protection by tracing unauthorized reuse and making untraceable unauthorized reuse as difficult as recreating given pieces of IP from scratch. We survey related work in cryptography and design methodology, then develop desiderata, metrics, and concrete protocols for constraint-based watermarking at various stages of the very large scale integration (VLSI) design process. In particular, we propose a new preprocessing approach that embeds watermarks as constraints into the input of a black-box design tool and a new postprocessing approach that embeds watermarks as constraints into the output of a black-box design tool. To demonstrate that our protocols can be transparently integrated into existing design flows, we use a testbed of commercial tools for VLSI physical design and embed watermarks into real-world industrial designs. We show that the implementation overhead is low-both in terms of central processing unit time and such standard physical design metrics as wirelength, layout area, number of vias, and routing congestion. We empirically show that the placement and routing applications considered in our methods achieve strong proofs of authorship and are resistant to tampering and do not adversely influence timing.</description><subject>Design engineering</subject><subject>Design methodology</subject><subject>Digital systems</subject><subject>Hardware design languages</subject><subject>Humans</subject><subject>Inspection</subject><subject>Integrated circuits</subject><subject>Intellectual property</subject><subject>IP (Internet Protocol)</subject><subject>Product design</subject><subject>Protection</subject><subject>Reuse</subject><subject>Studies</subject><subject>Unauthorized</subject><subject>Very large scale integration</subject><subject>Watermarking</subject><issn>0278-0070</issn><issn>1937-4151</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2001</creationdate><recordtype>article</recordtype><recordid>eNqF0btLAzEYAPAgCtbq4Op0OCgOV_NObizFR6Ggg84hl0dNbXM1uSL-96a0ODjo9A3fj-8JwDmCI4Rgc0vJqGFYUHgABqghoqaIoUMwgFjIGkIBj8FJzgsIEWW4GYDxpIu5TzrEvm51drb61L1LK53eQ5xXvTNvMXxsXK58lyrrcpjHavpcrVNXcn3o4ik48nqZ3dk-DsHr_d3L5LGePT1MJ-NZbSjEfa0JIt4zxlptLeUcayM0JK0gjfWy0V620kjbmgY7R4ll0CPDtEWSCyGRJUNwvatbWm8H6tUqZOOWSx1dt8mqQaUqJ4QVefWnxBIJygn9H3IupKCkwMtfcNFtUizrKimpQIhjXNDNDpnU5ZycV-sUyiG_FIJq-xxFido9p9iLnQ3OuR-3T34DZwaI3Q</recordid><startdate>20011001</startdate><enddate>20011001</enddate><creator>Kahng, A.B.</creator><creator>Lach, J.</creator><creator>Mangione-Smith, W.H.</creator><creator>Mantik, S.</creator><creator>Markov, I.L.</creator><creator>Potkonjak, M.</creator><creator>Tucker, P.</creator><creator>Wang, H.</creator><creator>Wolfe, G.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7U5</scope><scope>7TB</scope><scope>FR3</scope><scope>F28</scope></search><sort><creationdate>20011001</creationdate><title>Constraint-based watermarking techniques for design IP protection</title><author>Kahng, A.B. ; Lach, J. ; Mangione-Smith, W.H. ; Mantik, S. ; Markov, I.L. ; Potkonjak, M. ; Tucker, P. ; Wang, H. ; Wolfe, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c402t-a313ff555badd4662ac7a03b739df89af8b8c8dbc92ee43d50f1c5ad1867781d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Design engineering</topic><topic>Design methodology</topic><topic>Digital systems</topic><topic>Hardware design languages</topic><topic>Humans</topic><topic>Inspection</topic><topic>Integrated circuits</topic><topic>Intellectual property</topic><topic>IP (Internet Protocol)</topic><topic>Product design</topic><topic>Protection</topic><topic>Reuse</topic><topic>Studies</topic><topic>Unauthorized</topic><topic>Very large scale integration</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kahng, A.B.</creatorcontrib><creatorcontrib>Lach, J.</creatorcontrib><creatorcontrib>Mangione-Smith, W.H.</creatorcontrib><creatorcontrib>Mantik, S.</creatorcontrib><creatorcontrib>Markov, I.L.</creatorcontrib><creatorcontrib>Potkonjak, M.</creatorcontrib><creatorcontrib>Tucker, P.</creatorcontrib><creatorcontrib>Wang, H.</creatorcontrib><creatorcontrib>Wolfe, G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Engineering Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kahng, A.B.</au><au>Lach, J.</au><au>Mangione-Smith, W.H.</au><au>Mantik, S.</au><au>Markov, I.L.</au><au>Potkonjak, M.</au><au>Tucker, P.</au><au>Wang, H.</au><au>Wolfe, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Constraint-based watermarking techniques for design IP protection</atitle><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle><stitle>TCAD</stitle><date>2001-10-01</date><risdate>2001</risdate><volume>20</volume><issue>10</issue><spage>1236</spage><epage>1252</epage><pages>1236-1252</pages><issn>0278-0070</issn><eissn>1937-4151</eissn><coden>ITCSDI</coden><abstract>Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is: (1) nearly invisible to human and machine inspection; (2) difficult to remove; and (3) permanently embedded as an integral part of the design. Watermarking addresses IP protection by tracing unauthorized reuse and making untraceable unauthorized reuse as difficult as recreating given pieces of IP from scratch. We survey related work in cryptography and design methodology, then develop desiderata, metrics, and concrete protocols for constraint-based watermarking at various stages of the very large scale integration (VLSI) design process. In particular, we propose a new preprocessing approach that embeds watermarks as constraints into the input of a black-box design tool and a new postprocessing approach that embeds watermarks as constraints into the output of a black-box design tool. To demonstrate that our protocols can be transparently integrated into existing design flows, we use a testbed of commercial tools for VLSI physical design and embed watermarks into real-world industrial designs. We show that the implementation overhead is low-both in terms of central processing unit time and such standard physical design metrics as wirelength, layout area, number of vias, and routing congestion. We empirically show that the placement and routing applications considered in our methods achieve strong proofs of authorship and are resistant to tampering and do not adversely influence timing.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/43.952740</doi><tpages>17</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0278-0070
ispartof IEEE transactions on computer-aided design of integrated circuits and systems, 2001-10, Vol.20 (10), p.1236-1252
issn 0278-0070
1937-4151
language eng
recordid cdi_proquest_miscellaneous_914666335
source IEEE Xplore (Online service)
subjects Design engineering
Design methodology
Digital systems
Hardware design languages
Humans
Inspection
Integrated circuits
Intellectual property
IP (Internet Protocol)
Product design
Protection
Reuse
Studies
Unauthorized
Very large scale integration
Watermarking
title Constraint-based watermarking techniques for design IP protection
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T12%3A31%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Constraint-based%20watermarking%20techniques%20for%20design%20IP%20protection&rft.jtitle=IEEE%20transactions%20on%20computer-aided%20design%20of%20integrated%20circuits%20and%20systems&rft.au=Kahng,%20A.B.&rft.date=2001-10-01&rft.volume=20&rft.issue=10&rft.spage=1236&rft.epage=1252&rft.pages=1236-1252&rft.issn=0278-0070&rft.eissn=1937-4151&rft.coden=ITCSDI&rft_id=info:doi/10.1109/43.952740&rft_dat=%3Cproquest_ieee_%3E26678743%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c402t-a313ff555badd4662ac7a03b739df89af8b8c8dbc92ee43d50f1c5ad1867781d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=884711622&rft_id=info:pmid/&rft_ieee_id=952740&rfr_iscdi=true