IP Watermark Verification Based on Power Consumption Analysis

被引:0
|
作者
Marchand, Cedric [1 ]
Bossuet, Lilian [1 ]
Jung, Edward [2 ]
机构
[1] Univ Lyon, UMR CNRS 5516, Lab Hubert Curien, St Etienne, France
[2] Southern Polytech State Univ, Sch Comp & Software Engn, Marietta, GA USA
关键词
Hardware Security; salutary hardware; IP protection; IC counterfeiting; IP watermarking; side channel analysis; power consumption analysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing production costs of electronic devices and changes in the design methods of integrated circuits (ICs) has led to emerging threats in the microelectronics industry. Today, high value chips are the target of counterfeiting, theft and malicious hardware insertion (such as hardware trojans). Intellectual property (IP) protection has become a major concern and we propose to fight counterfeiting and theft by designing salutary hardware (salware). Instead of insert malicious effects inside an IP like a malware (e.g. a hardware trojan), a salware uses the same techniques, strategies and means for IP protection. One of the most studied salware is IP watermarking. Many works propose to target the finite state machine of digital IP to perform the watermarking. But, most of the time, the verification of the watermark is not clearly described. This conduces to a lack of credibility of these works. This paper proposes a watermark verification scheme using a correlation analysis based on the measurement of the IC power consumption. This article presents this process of verification and also discusses the selection of its parameters according to experimental results.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 50 条
  • [1] Designing a TCP/IP core for power consumption analysis
    Tanamachi, K
    Inoue, K
    Moshnyaga, VG
    [J]. PROCEEDINGS OF 2004 IEEE ASIA-PACIFIC CONFERENCE ON ADVANCED SYSTEM INTEGRATED CIRCUITS, 2004, : 412 - 413
  • [2] PSC-Watermark: Power Side Channel Based IP Watermarking Using Clock Gates
    Das, Upoma
    Rahman, M. Sazadur
    Anandakumar, N. Nalla
    Azar, Kimia Zamiri
    Rahman, Fahim
    Tehranipoor, Mark
    Farahmandi, Farimah
    [J]. 2023 IEEE EUROPEAN TEST SYMPOSIUM, ETS, 2023,
  • [3] Minimization of Power Consumption in IP Networks
    Jo, Seng-Kyoun
    Kim, Young-Min
    Lee, Namkyung
    Kangasharju, Jussi
    Muehlhaeuser, Max
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 826 - 830
  • [4] Using Combinational Logic Function to Watermark IP Based on FPGA
    MIAO Sheng
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1679 - 1682
  • [5] Spatial watermark for image verification
    Queluz, MP
    Lamy, P
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 120 - 130
  • [6] Secure watermark verification scheme
    Liu, YL
    Wen, G
    Yao, HX
    Song, YX
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 477 - 484
  • [7] Secure watermark verification scheme
    Liu, YL
    Gao, W
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 923 - 926
  • [8] Designated verification of digital watermark for network based image distribution
    Lee, HW
    Lee, IY
    [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1069 - 1078
  • [9] JND-Based Watermark Embedding and GA-Based Watermark Extraction with Fuzzy Inference System for Image Verification
    Tsai, Hung-Hsu
    Lo, Shih-Che
    [J]. INFORMATICA, 2014, 25 (01) : 113 - 137
  • [10] Pattern-based IP block detection, verification and variability analysis
    Ibrahim, Muhamad Asraf Bin Ahmad
    Bin Muhsain, Mohamad Fahmi
    Baharin, Ezni Aznida Binti Kamal
    Sweis, Jason
    Lai, Ya-Chieh
    Hurat, Philippe
    [J]. DESIGN-PROCESS-TECHNOLOGY CO-OPTIMIZATION FOR MANUFACTURABILITY XII, 2018, 10588