Clock-modulation based watermark for protection of embedded processors
Clock-modulation based watermark for protection of embedded processors
This paper presents a novel watermark generation technique for the protection of embedded processors. In previous work, a load circuit is used to generate detectable watermark patterns in the ASIC power supply. This approach leads to hardware area overheads. We propose removing the dedicated load circuit entirely, instead to compensate the reduced power consumption the watermark power pattern is emulated by reusing existing clock gated sequential logic as a zero-overhead load circuit and modulating the clock-gating enable signal with the watermark sequence. The proposed technique has been validated through experiments using two ASICs in 65nm CMOS, one with an ARM Cortex-M0 microcontroller and one with a Cortex-A5 microprocessor. Silicon measurement results verify the viability of the technique for embedded processors. Furthermore, the proposed clock modulation technique demonstrates a significant area reduction, without compromising the detection performance. In our experiments an area overhead reduction of 98\% was achieved. Through reuse of existing logic and reduction of watermark hardware implementation costs, the proposed clock modulation technique offers an improved robustness against removal attacks
Kufel, Jedrzej
3773135d-b647-4925-a12a-9c6f3eb38a23
Wilson, Peter
8a65c092-c197-4f43-b8fc-e12977783cb3
Hill, Stephen
0f32be21-7776-4c8d-9cbc-57471f6f64ae
Al-Hashimi, Bashir
0b29c671-a6d2-459c-af68-c4614dce3b5d
Whatmough, Paul N.
865aa424-28ca-4604-9090-84cc124d0d12
Myers, James
b541d1fd-a24a-4771-91b3-84e1ac8c7fe5
2014
Kufel, Jedrzej
3773135d-b647-4925-a12a-9c6f3eb38a23
Wilson, Peter
8a65c092-c197-4f43-b8fc-e12977783cb3
Hill, Stephen
0f32be21-7776-4c8d-9cbc-57471f6f64ae
Al-Hashimi, Bashir
0b29c671-a6d2-459c-af68-c4614dce3b5d
Whatmough, Paul N.
865aa424-28ca-4604-9090-84cc124d0d12
Myers, James
b541d1fd-a24a-4771-91b3-84e1ac8c7fe5
Kufel, Jedrzej, Wilson, Peter, Hill, Stephen, Al-Hashimi, Bashir, Whatmough, Paul N. and Myers, James
(2014)
Clock-modulation based watermark for protection of embedded processors.
Design, Automation and Test in Europe, Dresden, Germany.
24 - 28 Mar 2014.
6 pp
.
Record type:
Conference or Workshop Item
(Paper)
Abstract
This paper presents a novel watermark generation technique for the protection of embedded processors. In previous work, a load circuit is used to generate detectable watermark patterns in the ASIC power supply. This approach leads to hardware area overheads. We propose removing the dedicated load circuit entirely, instead to compensate the reduced power consumption the watermark power pattern is emulated by reusing existing clock gated sequential logic as a zero-overhead load circuit and modulating the clock-gating enable signal with the watermark sequence. The proposed technique has been validated through experiments using two ASICs in 65nm CMOS, one with an ARM Cortex-M0 microcontroller and one with a Cortex-A5 microprocessor. Silicon measurement results verify the viability of the technique for embedded processors. Furthermore, the proposed clock modulation technique demonstrates a significant area reduction, without compromising the detection performance. In our experiments an area overhead reduction of 98\% was achieved. Through reuse of existing logic and reduction of watermark hardware implementation costs, the proposed clock modulation technique offers an improved robustness against removal attacks
Text
Clock-Modulation Based Watermark for Protection of Embedded Processors.pdf
- Author's Original
More information
Published date: 2014
Venue - Dates:
Design, Automation and Test in Europe, Dresden, Germany, 2014-03-24 - 2014-03-28
Organisations:
EEE
Identifiers
Local EPrints ID: 361488
URI: http://eprints.soton.ac.uk/id/eprint/361488
PURE UUID: 72becaab-aca3-480f-b7aa-60415392cfef
Catalogue record
Date deposited: 24 Jan 2014 11:49
Last modified: 14 Mar 2024 15:51
Export record
Contributors
Author:
Jedrzej Kufel
Author:
Peter Wilson
Author:
Stephen Hill
Author:
Bashir Al-Hashimi
Author:
Paul N. Whatmough
Author:
James Myers
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics