Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/13653
Title: Watermarking Hardware IPs using Design Parameter Driven Encrypted Dispersion Matrix with Eigen Decomposition Based Security Framework
Authors: Sengupta, Anirban
Anshul, Aditya
Keywords: Cryptography;Dispersion;Dispersion matrix;Eigen decomposition;Eigenvalues and eigenfunctions;Encryption;Entropy;Hardware security;Hardware security;IP networks;IP piracy;Matrix decomposition;Privacy;Security;Supply chains;Watermarking;Watermarking
Issue Date: 2024
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Sengupta, A., & Anshul, A. (2024). Watermarking Hardware IPs using Design Parameter Driven Encrypted Dispersion Matrix with Eigen Decomposition Based Security Framework. IEEE Access. Scopus. https://doi.org/10.1109/ACCESS.2024.3382202
Abstract: In the present era of the global design supply chain, several untrustworthy entities can be involved. From an intellectual property (IP) vendor&amp
#x2019
s perspective, an attacker in the system-on-chip (SoC) integration house may pirate the design IP and/or claim ownership. This paper introduces a novel watermarking methodology using design parameter driven encrypted dispersion matrix with an eigen decomposition-based security framework as a detective countermeasure against the aforementioned threat. Our work considers the IP vendor as the defender and the SoC integration house as the attacker. The proposed approach presents a security framework that extracts the characteristics of the IP vendor selected design space parameters and the design space&amp
#x2019
s characteristics in terms of IP vendor chosen resource configurations and exploits them as unique features to embed them as digital evidence for protecting IP design. In the presented approach, secret security constraints are extracted for embedding into the IP design using a number of components such as dispersion matrix generation block, eigen decomposition block, AES encryption block, and high level synthesis (HLS) register allocation block. The results of the proposed approach, in comparison with prior works, offer an improvement in the probability of coincidence upto ~107, tamper tolerance upto ~10231, and entropy upto ~10545 at negligible design overhead. Authors
URI: https://doi.org/10.1109/ACCESS.2024.3382202
https://dspace.iiti.ac.in/handle/123456789/13653
ISSN: 2169-3536
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: