2002
DOI: 10.1049/el:20020143
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking ICs for IP protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2003
2003
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Signature embedding by means of time constrains 8 consists of specifying timing constraints in paths different from the "critical path". All of these techniques, as well as those proposed in 4,9,10 , embed watermarks at the physical level.…”
Section: Protection Using Watermarking Strategiesmentioning
confidence: 99%
“…Signature embedding by means of time constrains 8 consists of specifying timing constraints in paths different from the "critical path". All of these techniques, as well as those proposed in 4,9,10 , embed watermarks at the physical level.…”
Section: Protection Using Watermarking Strategiesmentioning
confidence: 99%
“…This last watermarking technique is used in combination with "tiling" algorithms [12][13] , to divide the design into a set of tiles with different logic block configurations. All of these techniques, as well as those proposed in [14][15] , embed watermarks at the physical level. Physical level watermarks should not be an exclusive domain for IPP, since in that case only the solution to the physical design is protected.…”
Section: Classification Of the Watermarking Techniques: State Of The Artmentioning
confidence: 99%
“…This watermarking technique consists on spreading all the possible bits of a digital signature through both, used or non used cells of memory structures included in the HDL description of the design. As the signature spreading is performed at the high-level design description stage, this method is more secure than other IPP techniques [14][15] because the signature propagates through the whole design flow down to the physical implementation. In addition, the fact that in the proposed watermarking technique the signature is spread in memory structures that are part of the design, with the signature bits being interlaced with the data required by the circuit to operate, makes extremely difficult the possibility of an attacker finding and removing these signature bits.…”
Section: Hdl-level Watermarking Strategiesmentioning
confidence: 99%
“…Signature embedding by means of time constraints [8] consists of specifying timing constraints in paths different from the "critical path". All of these techniques, as well as those proposed in [3,[9][10], embed watermarks at the physical level. Physical level watermarks should not be an exclusive domain for IPP, since in that case only the solution to the physical design is protected.…”
Section: Ip Core Protectionmentioning
confidence: 99%