Hardware trojans inspired IP watermarks

Mohammed Shayan, Kanad Basu, Ramesh Karri

Research output: Contribution to journalArticlepeer-review


Editor's note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose. In this article, the authors propose an ingenious watermarking methodology inspired by HW Trojans for efficiently and effectively protecting the authenticity of HW IPs. - Axel Jantsch, KTH Royal Institute of Technology.

Original languageEnglish (US)
Article number8764416
Pages (from-to)72-79
Number of pages8
JournalIEEE Design and Test
Issue number6
StatePublished - Dec 2019


  • Hardware IP Protection
  • Hardware Trojan
  • Low-overhead
  • Scan
  • Stealthy
  • Watermark

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering


Dive into the research topics of 'Hardware trojans inspired IP watermarks'. Together they form a unique fingerprint.

Cite this