Digital Repository at the University of Maryland (DRUM) >
A. James Clark School of Engineering >
Electrical & Computer Engineering >
Electrical & Computer Engineering Research Works >
Please use this identifier to cite or link to this item:
|Title: ||VLSI CAD Tool Protection by Birthmarking Design Solutions|
|Authors: ||Yuan, Lin|
|Issue Date: ||Apr-2005|
|Citation: ||L. Yuan, G. Qu, and A. Srivastava. "VLSI CAD Tool Protection by Birthmarking Design Solutions," 15th IEEE /ACM Great Lakes Symposium on VLSI (GLSVLSI'05), pp. 341-344, April 2005.|
|Abstract: ||Many techniques have been proposed in the past for the protection
of VLSI design IPs (intellectual property). CAD tools and algorithms
are intensively used in all phases of modern VLSI designs;
however, little has been done to protect them. Basically, given
a problem P and a solution S, we want to be able to determine
whether S is obtained by a particular tool or algorithm.
We propose two techniques that intentionally leave some trace or
birthmark, which refers to certain easy detectable properties, in the
design solutions to facilitate CAD tool tracing and protection. The
pre-processing technique provides the ideal protection at the cost of
losing control of solution’s quality. The post-processing technique
balances the level of protection and design quality.
We conduct a case study on how to protect a timing-driven gate
duplication algorithm. Experimental results on a large set of MCNC
benchmarks confirm that the pre-processing technique results in
a significant reduction (about 48%) of the optimization power of
the tool, while the post-processing technique has almost no penalty
(less than 2%) on the tool’s performance.|
|Required Publisher Statement: ||Copyright © 2005 IEEE. Reprinted from 15th IEEE/ACM Great Lakes Symposium on VLSI.
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Maryland's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to email@example.com.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.|
|Appears in Collections:||Electrical & Computer Engineering Research Works|
All items in DRUM are protected by copyright, with all rights reserved.