Hardware Steganography for IP Core Protection of Fault Secured DSP Cores

A. Sengupta, Gargi Gupta, Harshit Jalan
{"title":"Hardware Steganography for IP Core Protection of Fault Secured DSP Cores","authors":"A. Sengupta, Gargi Gupta, Harshit Jalan","doi":"10.1109/ICCE-Berlin47944.2019.9127237","DOIUrl":null,"url":null,"abstract":"Security of transient fault secured IP cores against piracy, false claim of ownership can be achieved during high level synthesis, especially when handling DSP or multimedia cores. Though watermarking that involves implanting a vendor defined signature onto the design can be useful, however research has shown its limitations such as less designer control, high overhead due to extreme dependency on signature size, combination and encoding rule. This paper proposes an alternative paradigm called ‘hardware steganography’ where hidden additional designer’s constraints are implanted in a fault secured IP core using entropy thresholding. In proposed hardware steganography, concealed information in the form of additional edges having a specific entropy value is embedded in the colored interval graph (CIG). This is a signature free approach and ensures high designer control (more robustness and stronger proof of authorship) as well as lower overhead than watermarking schemes used for DSP based IP cores.","PeriodicalId":290753,"journal":{"name":"2019 IEEE 9th International Conference on Consumer Electronics (ICCE-Berlin)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 9th International Conference on Consumer Electronics (ICCE-Berlin)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-Berlin47944.2019.9127237","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Security of transient fault secured IP cores against piracy, false claim of ownership can be achieved during high level synthesis, especially when handling DSP or multimedia cores. Though watermarking that involves implanting a vendor defined signature onto the design can be useful, however research has shown its limitations such as less designer control, high overhead due to extreme dependency on signature size, combination and encoding rule. This paper proposes an alternative paradigm called ‘hardware steganography’ where hidden additional designer’s constraints are implanted in a fault secured IP core using entropy thresholding. In proposed hardware steganography, concealed information in the form of additional edges having a specific entropy value is embedded in the colored interval graph (CIG). This is a signature free approach and ensures high designer control (more robustness and stronger proof of authorship) as well as lower overhead than watermarking schemes used for DSP based IP cores.
故障安全DSP核IP核保护的硬件隐写
在高级合成过程中,特别是处理DSP或多媒体核时,可以实现瞬时故障保护IP核的安全性,防止盗版和虚假所有权声明。虽然将供应商定义的签名植入到设计中的水印是有用的,但是研究表明它的局限性,例如较少的设计人员控制,由于极度依赖签名大小,组合和编码规则而导致的高开销。本文提出了一种称为“硬件隐写术”的替代范例,其中使用熵阈值将隐藏的附加设计器约束植入故障安全IP核中。在提出的硬件隐写中,隐藏信息以具有特定熵值的附加边的形式嵌入到彩色间隔图(CIG)中。这是一种无签名的方法,确保了高设计控制(更健壮和更强的作者证明)以及比基于DSP的IP核使用的水印方案更低的开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信