TY - CHAP
T1 - Robustness analysis of watermark verification techniques for FPGA netlist cores
AU - Ziener, Daniel
AU - Schmid, Moritz
AU - Teich, Jürgen
PY - 2010
Y1 - 2010
N2 - In this paper we analyze the robustness of watermarking techniques for FPGA IP cores against attacks. Unlike most existing watermarking techniques, the focus of our techniques lies on ease of verification, even if the protected cores are embedded into a product. Moreover, we have concentrated on higher abstraction levels for embedding the watermark, particularly at the logic level, where IP cores are distributed as netlist cores. With the presented watermarking methods, it is possible to watermark IP cores at the logic level and identify them with a high likelihood and in a reproducible way in a purchased product from a company that is suspected to have committed IP fraud. For robustness analysis we enhanced a theoretical watermarking model, originally introduced for multimedia watermarking. Finally, two exemplary watermarking techniques for netlist cores using different verification strategies are described and the robustness against attacks is analyzed.
AB - In this paper we analyze the robustness of watermarking techniques for FPGA IP cores against attacks. Unlike most existing watermarking techniques, the focus of our techniques lies on ease of verification, even if the protected cores are embedded into a product. Moreover, we have concentrated on higher abstraction levels for embedding the watermark, particularly at the logic level, where IP cores are distributed as netlist cores. With the presented watermarking methods, it is possible to watermark IP cores at the logic level and identify them with a high likelihood and in a reproducible way in a purchased product from a company that is suspected to have committed IP fraud. For robustness analysis we enhanced a theoretical watermarking model, originally introduced for multimedia watermarking. Finally, two exemplary watermarking techniques for netlist cores using different verification strategies are described and the robustness against attacks is analyzed.
UR - http://www.scopus.com/inward/record.url?scp=79955089412&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-16767-6_6
DO - 10.1007/978-3-642-16767-6_6
M3 - Chapter
AN - SCOPUS:79955089412
SN - 9783642167669
VL - 78
T3 - Lecture Notes in Electrical Engineering
SP - 105
EP - 127
BT - Design Methodologies for Secure Embedded Systems
A2 - Biedermann, Alexander
A2 - Molter, H. Gregor
ER -