Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/277044.277241acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
Article
Free access

Robust IP watermarking methodologies for physical design

Published: 01 May 1998 Publication History
  • Get Citation Alerts
  • Abstract

    Increasingly popular reuse-based design paradigms create a pressing need for authorship enforcement techniques that protect the intellectual property rights of designers. We develop the first intellectual property protection protocols for embedding design watermarks at the physical design level. We demonstrate that these protocols are tarnsparent with respect to existing industrial tools and design flows, and that they can embed watermarks into real-world industrial designs with very low implementation overhead (as measured by such standard metrics as wirelength, layout area, number of vias, routing congestion and CPU time). On several industrial test cases, we obtain extremely strong, tamper-resistant proofs of authorship for placement and routing solutions.

    References

    [1]
    C. J. Alpert, T. Chan, D. J. Huang, A. B. Kahng, I. Markov, P. Mulet and K. Yan, "Faster Minimization of Linear Wirelength for Global Placement", in Proc. ACM/IEEE Intl. Symp. on Physical Design, Napa, April 1997, pp. 4-11.
    [2]
    C. J. Alpert and A. B. Kahng, "Recent Directions in Netlist Partitioning: A Survey", Integration: The VLSI Journal 19 (1995), pp. 1-81.
    [3]
    K. D. Boese, A. B. Kahng and S. Muddu, "New Adaptive Multistart Techniques for Combinatorial Global Optimizations", Operations Research Letters 16(2) (1994), pp. 101-113.
    [4]
    D. C.-M. Chi, Improving Upon Local Search Heuristics for VLSI Standard Cell Placement, M.S. Thesis, UCLA Computer Science Department, 1995.
    [5]
    A. B. Kahng, J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang and G. Wolfe, "Watermarking Techniques for Intellectual Property Protection", Proc. ACM/IEEE Design Automation Conf., 1998.
    [6]
    S. A. Kauffman, At Home in the Universe: The Search for Laws of Self- Organization and Complexity, New York, Oxford University Press, 1995.
    [7]
    A. J. Menezes, P. C. van Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, Boca Raton, CRC Press, 1997.
    [8]
    B. Schneier, Applied Cryptography : Protocols, Algorithms, and Source Code in C, 2nd ed., New York, Wiley, 1996.
    [9]
    Semiconductor Industry Association, The National Technology Roadmap for Semiconductors: Technology Needs, December 1997.
    [10]
    W. Swartz and C. Sechen, "Timing Driven Placement for Large Standard Cell Circuits", Proc. ACM/IEEE Design Automation Conf., June 1995, pp. 211-215.
    [11]
    G. E. Tellez, D. A. Knol and M. Sarrafzadeh, "A Performance-Driven Placement Technique Based on a New Budgeting Criterion", Proc. IEEE Intl. Symp. on Circuits and Systems, May 1996, vol. 4, pp. 504-507.
    [12]
    VSI Alliance, Fall Worldwide Member Meeting: A Year Of Achievement (guidelines proposed by VSIA development working group on intellectual property protection), Santa Clara, Oct. 1997.

    Cited By

    View all
    • (2023)Logic locking for IP securityComputers and Security10.1016/j.cose.2023.103196129:COnline publication date: 1-Jun-2023
    • (2022)Using Pattern of On-Off Routers and Links and Router Delays to Protect Network-on-Chip Intellectual PropertyACM Transactions on Computer Systems10.1145/354868040:1-4(1-19)Online publication date: 24-Nov-2022
    • (2022)Efficient-Grad: Efficient Training Deep Convolutional Neural Networks on Edge Devices with Gradient OptimizationsACM Transactions on Embedded Computing Systems10.1145/350403421:2(1-24)Online publication date: 8-Feb-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DAC '98: Proceedings of the 35th annual Design Automation Conference
    May 1998
    820 pages
    ISBN:0897919645
    DOI:10.1145/277044
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 May 1998

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. intellectual property test
    2. system-on-chip test
    3. testing embedded core

    Qualifiers

    • Article

    Conference

    DAC98
    Sponsor:
    DAC98: The 35th ACM/IEEE-CAS/EDAC Design Automation Conference
    June 15 - 19, 1998
    California, San Francisco, USA

    Acceptance Rates

    Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

    Upcoming Conference

    DAC '25
    62nd ACM/IEEE Design Automation Conference
    June 22 - 26, 2025
    San Francisco , CA , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)74
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Logic locking for IP securityComputers and Security10.1016/j.cose.2023.103196129:COnline publication date: 1-Jun-2023
    • (2022)Using Pattern of On-Off Routers and Links and Router Delays to Protect Network-on-Chip Intellectual PropertyACM Transactions on Computer Systems10.1145/354868040:1-4(1-19)Online publication date: 24-Nov-2022
    • (2022)Efficient-Grad: Efficient Training Deep Convolutional Neural Networks on Edge Devices with Gradient OptimizationsACM Transactions on Embedded Computing Systems10.1145/350403421:2(1-24)Online publication date: 8-Feb-2022
    • (2022)Protecting Network-on-Chip Intellectual Property Using Timing Channel FingerprintingACM Transactions on Embedded Computing Systems10.1145/349556521:2(1-21)Online publication date: 8-Feb-2022
    • (2022)EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2ACM Transactions on Embedded Computing Systems10.1145/349273421:2(1-25)Online publication date: 8-Feb-2022
    • (2022)Probabilistic Risk-Aware Scheduling with Deadline Constraint for Heterogeneous SoCsACM Transactions on Embedded Computing Systems10.1145/348940921:2(1-27)Online publication date: 8-Feb-2022
    • (2021)Protecting Hardware IP Cores During High-Level SynthesisBehavioral Synthesis for Hardware Security10.1007/978-3-030-78841-4_6(95-115)Online publication date: 28-May-2021
    • (2020)Network-on-Chip Intellectual Property Protection Using Circular Path--based FingerprintingACM Journal on Emerging Technologies in Computing Systems10.1145/341002417:1(1-22)Online publication date: 17-Sep-2020
    • (2020)Tracking Cloned Electronic Components using a Consortium-based Blockchain Infrastructure2020 IEEE Physical Assurance and Inspection of Electronics (PAINE)10.1109/PAINE49178.2020.9337735(1-6)Online publication date: 15-Dec-2020
    • (2019)Characterization of Locked Combinational Circuits via ATPG2019 IEEE International Test Conference (ITC)10.1109/ITC44170.2019.9000130(1-10)Online publication date: Nov-2019
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media