Hardware Trojans Inspired Hardware IP Watermarks

Mohammed Shayan, Kanad Basu, Ramesh Karri

Research output: Contribution to journalArticle

Abstract

Watermarking protects the rights of intellectual property (IP) vendors. Existing watermarking techniques have drawbacks including susceptibility to removal attacks and unpredictable design overhead. We propose a Hardware Trojan (HT) inspired watermarking methodology that overcomes these challenges. HT is a low-overhead design modification that is stealthily embedded in the design and is difficult to detect through conventional hardware testing and verification. The objective here is to use these qualities of HT to introduce watermark in the design. We demonstrate using experimental results and security analysis that HT-inspired watermark offers a strong proof of ownership which has a low-overhead, and resilience to removal attacks.

Original languageEnglish (US)
JournalIEEE Design and Test
DOIs
StateAccepted/In press - Jan 1 2019

Fingerprint

Intellectual property
Watermarking
Hardware
Hardware security
Testing

Keywords

  • Hardware
  • Hardware IP Protection
  • Hardware Trojan
  • IP networks
  • Low-overhead
  • Payloads
  • Scan
  • Stealthy
  • Timing
  • Trojan horses
  • Watermark
  • Watermarking

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this

Hardware Trojans Inspired Hardware IP Watermarks. / Shayan, Mohammed; Basu, Kanad; Karri, Ramesh.

In: IEEE Design and Test, 01.01.2019.

Research output: Contribution to journalArticle

@article{45874a0523484aa69f1beae792dde950,
title = "Hardware Trojans Inspired Hardware IP Watermarks",
abstract = "Watermarking protects the rights of intellectual property (IP) vendors. Existing watermarking techniques have drawbacks including susceptibility to removal attacks and unpredictable design overhead. We propose a Hardware Trojan (HT) inspired watermarking methodology that overcomes these challenges. HT is a low-overhead design modification that is stealthily embedded in the design and is difficult to detect through conventional hardware testing and verification. The objective here is to use these qualities of HT to introduce watermark in the design. We demonstrate using experimental results and security analysis that HT-inspired watermark offers a strong proof of ownership which has a low-overhead, and resilience to removal attacks.",
keywords = "Hardware, Hardware IP Protection, Hardware Trojan, IP networks, Low-overhead, Payloads, Scan, Stealthy, Timing, Trojan horses, Watermark, Watermarking",
author = "Mohammed Shayan and Kanad Basu and Ramesh Karri",
year = "2019",
month = "1",
day = "1",
doi = "10.1109/MDAT.2019.2929116",
language = "English (US)",
journal = "IEEE Design and Test",
issn = "2168-2356",
publisher = "IEEE Computer Society",

}

TY - JOUR

T1 - Hardware Trojans Inspired Hardware IP Watermarks

AU - Shayan, Mohammed

AU - Basu, Kanad

AU - Karri, Ramesh

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Watermarking protects the rights of intellectual property (IP) vendors. Existing watermarking techniques have drawbacks including susceptibility to removal attacks and unpredictable design overhead. We propose a Hardware Trojan (HT) inspired watermarking methodology that overcomes these challenges. HT is a low-overhead design modification that is stealthily embedded in the design and is difficult to detect through conventional hardware testing and verification. The objective here is to use these qualities of HT to introduce watermark in the design. We demonstrate using experimental results and security analysis that HT-inspired watermark offers a strong proof of ownership which has a low-overhead, and resilience to removal attacks.

AB - Watermarking protects the rights of intellectual property (IP) vendors. Existing watermarking techniques have drawbacks including susceptibility to removal attacks and unpredictable design overhead. We propose a Hardware Trojan (HT) inspired watermarking methodology that overcomes these challenges. HT is a low-overhead design modification that is stealthily embedded in the design and is difficult to detect through conventional hardware testing and verification. The objective here is to use these qualities of HT to introduce watermark in the design. We demonstrate using experimental results and security analysis that HT-inspired watermark offers a strong proof of ownership which has a low-overhead, and resilience to removal attacks.

KW - Hardware

KW - Hardware IP Protection

KW - Hardware Trojan

KW - IP networks

KW - Low-overhead

KW - Payloads

KW - Scan

KW - Stealthy

KW - Timing

KW - Trojan horses

KW - Watermark

KW - Watermarking

UR - http://www.scopus.com/inward/record.url?scp=85069919282&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85069919282&partnerID=8YFLogxK

U2 - 10.1109/MDAT.2019.2929116

DO - 10.1109/MDAT.2019.2929116

M3 - Article

AN - SCOPUS:85069919282

JO - IEEE Design and Test

JF - IEEE Design and Test

SN - 2168-2356

ER -