Robustness analysis of watermark verification techniques for FPGA netlist cores

Daniel Ziener*, Moritz Schmid, Jürgen Teich

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Abstract

In this paper we analyze the robustness of watermarking techniques for FPGA IP cores against attacks. Unlike most existing watermarking techniques, the focus of our techniques lies on ease of verification, even if the protected cores are embedded into a product. Moreover, we have concentrated on higher abstraction levels for embedding the watermark, particularly at the logic level, where IP cores are distributed as netlist cores. With the presented watermarking methods, it is possible to watermark IP cores at the logic level and identify them with a high likelihood and in a reproducible way in a purchased product from a company that is suspected to have committed IP fraud. For robustness analysis we enhanced a theoretical watermarking model, originally introduced for multimedia watermarking. Finally, two exemplary watermarking techniques for netlist cores using different verification strategies are described and the robustness against attacks is analyzed.

Original languageEnglish
Title of host publicationDesign Methodologies for Secure Embedded Systems
Subtitle of host publicationFestschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
EditorsAlexander Biedermann, H. Gregor Molter
Pages105-127
Number of pages23
Volume78
DOIs
Publication statusPublished - 2010
Externally publishedYes

Publication series

NameLecture Notes in Electrical Engineering
Volume78
ISSN (Print)18761100
ISSN (Electronic)18761119

Fingerprint Dive into the research topics of 'Robustness analysis of watermark verification techniques for FPGA netlist cores'. Together they form a unique fingerprint.

  • Cite this

    Ziener, D., Schmid, M., & Teich, J. (2010). Robustness analysis of watermark verification techniques for FPGA netlist cores. In A. Biedermann, & H. G. Molter (Eds.), Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss (Vol. 78, pp. 105-127). (Lecture Notes in Electrical Engineering; Vol. 78). https://doi.org/10.1007/978-3-642-16767-6_6