Intellectual Property Protection (IPP) using Obfuscation in C, VHDL, and Verilog Coding

被引:2
|
作者
Meyer-Baese, Uwe [1 ]
Castillo, Encarni [2 ]
Botella, Guillermo [1 ]
Parrilla, L. [2 ]
Garcia, Antonio [2 ]
机构
[1] Florida State Univ, Dept E&C Eng, Tallahassee, FL 32310 USA
[2] Univ Granada, Dpto Elect Technol Computadores, E-18071 Granada, Spain
关键词
FPGA; IPP; Obfuscation; VHDL; Verilog; ANSI-C;
D O I
10.1117/12.884142
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the big challenges in the design of embedded systems today is how to combine design reuse and intellectual property protection (IPP). Strong IP schemes such as hardware dongle or layout watermarking usually have a very limited design reuse for different FPGA/ASIC design platforms. Some techniques also do not fit well with protection of software in embedded microprocessors. Another approach to IPP that allows an easy design reuse and has low costs but a somehow reduced security is code "obfuscation." Obfuscation is a method to hide the design concept, or program algorithm included in the C or HDL source by using one or more transformations of the original code. Obfuscation methods include, for instance, renaming identifiers, removing comments or formatting of the code. More sophisticated obfuscation methods include data splitting or merging, and control flow changes. This paper shows strength and weakness of method obfuscating C, VHDL and Verilog code.
引用
收藏
页数:12
相关论文
共 31 条
  • [21] Intellectual Property Protection System for a Workstation using Policy based Watermarking Scheme
    Son, Yuseung
    Yong, Seunglim
    Fernandes, Miguel
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (08): : 201 - 206
  • [22] An intellectual property right protection scheme for digital images using Support Vector Machines
    Chang, CC
    Liao, CT
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2002, 2 : 288 - 295
  • [23] Network-on-Chip Intellectual Property Protection Using Circular Path-based Fingerprinting
    Biswas, Arnab Kumar
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (01)
  • [24] Product decomposition using design structure matrix for intellectual property protection in supply chain outsourcing
    Deng, Xiaoguang
    Huet, Greg
    Tan, Suo
    Fortin, Clement
    COMPUTERS IN INDUSTRY, 2012, 63 (06) : 632 - 641
  • [25] Watermark embedding mechanism using modulus-based for intellectual property protection on image data
    Wang, SJ
    Yang, KS
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2002, 2455 : 333 - 342
  • [26] Intellectual property right protection of image data using DCT and spread spectrum-based watermarking
    Singh, Harsh Vikram
    Yadav, Suman
    Mohan, Anand
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 218 - 228
  • [27] An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
    Chang, CC
    Chuang, JC
    PATTERN RECOGNITION LETTERS, 2002, 23 (08) : 931 - 941
  • [28] Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing
    Gaurav Sharma
    Shailender Gupta
    Sangeeta Dhall
    C. K. Nagpal
    Multimedia Tools and Applications, 2018, 77 : 31737 - 31762
  • [29] Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing
    Sharma, Gaurav
    Gupta, Shailender
    Dhall, Sangeeta
    Nagpal, C. K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (24) : 31737 - 31762
  • [30] VLSI design exchange with intellectual property protection in FPGA environment using both secret and public-key cryptography
    Adi, Wael
    Ernst, Rolf
    Soudan, Bassel
    Hanoun, Abdulrahman
    IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: EMERGING VLSI TECHNOLOGIES AND ARCHITECTURES, 2006, : 24 - +