Abstract
Editor's note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose. In this article, the authors propose an ingenious watermarking methodology inspired by HW Trojans for efficiently and effectively protecting the authenticity of HW IPs. - Axel Jantsch, KTH Royal Institute of Technology.
Original language | English (US) |
---|---|
Article number | 8764416 |
Pages (from-to) | 72-79 |
Number of pages | 8 |
Journal | IEEE Design and Test |
Volume | 36 |
Issue number | 6 |
DOIs | |
State | Published - Dec 2019 |
Keywords
- Hardware IP Protection
- Hardware Trojan
- Low-overhead
- Scan
- Stealthy
- Watermark
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Electrical and Electronic Engineering