Secure Hardware IPs by Digital Watermark Azadeh Mokhtarpour Sara Shakeri Sharif University of...

45
Secure Hardware IPs by Digital Watermark Azadeh Mokhtarpour Sara Shakeri Sharif University of Technology May2014 1

Transcript of Secure Hardware IPs by Digital Watermark Azadeh Mokhtarpour Sara Shakeri Sharif University of...

PowerPoint Presentation

Secure Hardware IPs by Digital WatermarkAzadeh MokhtarpourSara ShakeriSharif University of TechnologyMay201411Introduction and MotivationDesign productivity gap

Design reuseInclusion of previously designed components (blocks of logic or data)

Example:a component used as part of a central processing unit ( CPU ) for a PC could be reused in a handheld device

IP coresComponents in design reuse

2IP LevelsThree main level for IP blocksSoft IPs HDL codesFirm IPsRTL sub blocksHard IPsFully placed netlistPhysical layoutTest lists

3Security riskThree main approach to secure IPsDeterrentCopy rightProtectionEncryptionDetectionDigital Watermark

4Watermarking in Multimedia vs. in Hardware

Multimedia:In text , audio, videoLimitation of human visual

Hardware:The Value of design IP relies on functionality

5Typical watermarking flow

6Watermarking procedures can be categorized into two groups of methods:

Additive methodsHDL, Bit files

Constraint-based methodsHDL, Netlist, Layout cores

Additional placement Time constraints

7Constraint based watermarkingrequirements for the IP serve as main constraintsCreating another set of constraints using secret keyThese constraints doesnt have any conflict

More constraints higher probability of authorship

8Constraint based methodOriginal problem spaceStego-problem space we need intersection of these two regions

9Probabilistic proof of the authorshipLet N and n be the number of solutions Probability of finding any solution is equalProbability of solving original problem is 1/NProbability of solving stego-problem is 1/n

Solution carry the designers signaturePc =n/NN>>n thus 1/N