Hardware trojans inspired IP watermarks

Mohammed Shayan, Kanad Basu, Ramesh Karri

Research output: Contribution to journalArticlepeer-review

Abstract

Editor's note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose. In this article, the authors propose an ingenious watermarking methodology inspired by HW Trojans for efficiently and effectively protecting the authenticity of HW IPs. - Axel Jantsch, KTH Royal Institute of Technology.

Original languageEnglish (US)
Article number8764416
Pages (from-to)72-79
Number of pages8
JournalIEEE Design and Test
Volume36
Issue number6
DOIs
StatePublished - Dec 2019

Keywords

  • Hardware IP Protection
  • Hardware Trojan
  • Low-overhead
  • Scan
  • Stealthy
  • Watermark

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Hardware trojans inspired IP watermarks'. Together they form a unique fingerprint.

Cite this