2011
DOI: 10.1117/12.884142
|View full text |Cite
|
Sign up to set email alerts
|

Intellectual property protection (IPP) using obfuscation in C, VHDL, and Verilog coding

Abstract: One of the big challenges in the design of embedded systems today is how to combine design reuse and intellectual property protection (IPP). Strong IP schemes such as hardware dongle or layout watermarking usually have a very limited design reuse for different FPGA/ASIC design platforms. Some techniques also do not fit well with protection of software in embedded microprocessors. Another approach to IPP that allows an easy design reuse and has low costs but a somehow reduced security is code "obfuscation." Obf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 41 publications
0
7
0
Order By: Relevance
“…To secure the HDL code describing the watermarked design that will be delivered to a customer, encryption or obfuscation tools [ 22 ] may be used after IPP@HDL application. Recently, a set of open source obfuscation tools has been developed, which allows very long, hard to read identifiers to be used [ 21 ]. Comment methods that allow adding copyright and limited warranty information are also implemented.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…To secure the HDL code describing the watermarked design that will be delivered to a customer, encryption or obfuscation tools [ 22 ] may be used after IPP@HDL application. Recently, a set of open source obfuscation tools has been developed, which allows very long, hard to read identifiers to be used [ 21 ]. Comment methods that allow adding copyright and limited warranty information are also implemented.…”
Section: Methodsmentioning
confidence: 99%
“…The embedding of a watermark at this design level is highly tamper-resistant, since the signature is embedded in preliminary stages and is therefore dragged through the whole design flow. To prevent reverse engineering on the distribution of the protected high-level design, encryption and obfuscation techniques can be applied [ 21 , 22 ]. Obfuscation techniques consist in hiding the design concept or program algorithm included in the source by using one or more transformations of the original code.…”
Section: Introductionmentioning
confidence: 99%
“…Classical Collbergs approaches were implemented for VHDL and Verilog in [15]. Almost all of them are not survived synthesis.…”
Section: Related Workmentioning
confidence: 99%
“…There were only a few studies thereafter on the application of these obfuscation transformations for HDLs. Classical Collberg's approaches were implemented for VHDL and Verilog in [3]. Almost all of them have no effect on the synthesized circuit.…”
Section: Introductionmentioning
confidence: 99%