Forensic detective control using a digital signature-based watermark for IP core protection

Forensic detective control using a digital signature-based watermark for IP core protection

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter discusses forensic detective control using a digital signature-based watermark for intellectual property (IP) cores or integrated circuits (ICs). The chapter provides detailed insight on digital-signature generation and the embedding process that includes a discussion on signature-generation rules and algorithms, IP core protection using forensic detective control, methodology of implanting digital signature -based watermark constraints covertly into an IP core design and its respective design process.

Chapter Contents:

  • 3.1 Introduction
  • 3.2 Threat models of an IP core
  • 3.3 Selected contemporary approaches
  • 3.3.1 Prior work on IP core protection using watermarking
  • 3.3.2 Limitations of contemporary hardware watermarking approaches and advantages of digital signature-based watermarking
  • 3.4 Security modules employed in digital signature-based watermarks
  • 3.4.1 Crypto-hash function-SHA-512
  • 3.4.2 Crypto-encryption function - RSA
  • 3.5 Forensic detective control using a digital signature-based watermark
  • 3.5.1 Digital signature framework
  • Equivalent bitstream generation of an IP core
  • Hash-digest generation
  • Conversion of hash digest into RSA compatible input
  • RSA encryption of hash-bitstream
  • Formation of digital signature representing a vendor watermark
  • Digital signature encoding
  • Digital signature embedding process
  • 3.5.2 Detection process of digital signature-based watermarks
  • Signature-constraints' generation and mapping of storage variables to a register
  • Signature inspection
  • Signature verification
  • 3.6 Case study on 8-point DCT used in image compression
  • 3.6.1 Digital signature generation corresponding to an 8-point DCT core
  • 3.6.2 Embedding of digital signature as watermark into the 8-point DCT core
  • 3.7 Desirable properties of a digital signature-based watermark
  • 3.7.1 High resiliency
  • 3.7.2 Strong tamper tolerance
  • 3.7.3 Low design overheads
  • 3.7.4 Correct functionality
  • 3.7.5 Low-signature embedding and detection time
  • 3.8 Threat scenarios and their countermeasures using digital signature-based watermarks
  • 3.8.1 Unauthorized signature-constraints insertion
  • 3.8.2 Original signature tampering
  • 3.8.3 Unintended signature-constraints extraction
  • 3.9 Analysis based on case studies
  • 3.9.1 Security analysis
  • 3.9.2 Design cost analysis
  • 3.10 Conclusion
  • 3.11 Questions and exercises
  • References

Inspec keywords: digital signatures; watermarking; industrial property; digital forensics; microprocessor chips

Other keywords: IP core design; integrated circuits; IP core protection; intellectual property cores; forensic detective control; embedding process; digital-signature generation; respective design process; digital signature-based watermark

Subjects: Microprocessors and microcomputers; Microprocessor chips; Cryptography

Preview this chapter:
Zoom in

Forensic detective control using a digital signature-based watermark for IP core protection, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch3-1.gif /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch3-2.gif

Related content

This is a required field
Please enter a valid email address