Intellectual Property Protection in VLSI Design : Theory and Practice
The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years.
Intellectual Property Protection in VLSI Designs: Theory and Practice provides an overview of the security problems in modern VLSI design with a detailed treatment of our newly developed constraint-based protection paradigm for the protection of VLSI design IPs from FPGA design to standard-cell placement, from high-level synthesis solutions to gate-level netlist place-and-rout, andfrom advanced CAD tools to physical design algorithms. The problem of VLSI design IP protection is much more challenging than the protection of multimedia contents or software, and our protection paradigm is also conceptually different from the state-of-the-art approaches in those domains.
The key idea in this newly developed IP protection paradigm is to superimpose additional constraints that correspond to an encrypted signature of the designer to design/software in such a way that quality of design is only nominally impacted, while strong proof of authorship is guaranteed. It consists of three integrated parts: constraint-based watermarking, fingerprinting, and copy detection. Its correctness relies on the presence of all these components. In short, watermarking aims to embed signatures for the identification of the IP owner without altering the IP's functionality; fingerprinting seeks to provide effective ways to distinguish each individual IP users to protect legal IP buyers; copy detection isthe method to trace improper use of the IP and demonstrate IP's ownership.
Intellectual Property Protection in VLSI Designs: Theory and Practice contains the mathematical foundations for the developed IP protection paradigm, detailed pseudo-code and descriptions of its many techniques, numerous examples and experimental validation on well-known benchmarks, and clear explanations and comparisons of the many protection methods.