Secure Hardware IPs by Digital Watermark Azadeh Mokhtarpour Sara Shakeri Sharif University of...
-
Upload
alaina-brooke-simpson -
Category
Documents
-
view
222 -
download
0
Transcript of Secure Hardware IPs by Digital Watermark Azadeh Mokhtarpour Sara Shakeri Sharif University of...
PowerPoint Presentation
Secure Hardware IPs by Digital WatermarkAzadeh MokhtarpourSara ShakeriSharif University of TechnologyMay201411Introduction and MotivationDesign productivity gap
Design reuseInclusion of previously designed components (blocks of logic or data)
Example:a component used as part of a central processing unit ( CPU ) for a PC could be reused in a handheld device
IP coresComponents in design reuse
2IP LevelsThree main level for IP blocksSoft IPs HDL codesFirm IPsRTL sub blocksHard IPsFully placed netlistPhysical layoutTest lists
3Security riskThree main approach to secure IPsDeterrentCopy rightProtectionEncryptionDetectionDigital Watermark
4Watermarking in Multimedia vs. in Hardware
Multimedia:In text , audio, videoLimitation of human visual
Hardware:The Value of design IP relies on functionality
5Typical watermarking flow
6Watermarking procedures can be categorized into two groups of methods:
Additive methodsHDL, Bit files
Constraint-based methodsHDL, Netlist, Layout cores
Additional placement Time constraints
7Constraint based watermarkingrequirements for the IP serve as main constraintsCreating another set of constraints using secret keyThese constraints doesnt have any conflict
More constraints higher probability of authorship
8Constraint based methodOriginal problem spaceStego-problem space we need intersection of these two regions
9Probabilistic proof of the authorshipLet N and n be the number of solutions Probability of finding any solution is equalProbability of solving original problem is 1/NProbability of solving stego-problem is 1/n
Solution carry the designers signaturePc =n/NN>>n thus 1/N