This book presents advanced forensic detective control and obfuscation
techniques for securing hardware IP cores by exploring beyond
conventional technologies. The theme is important to researchers in
various areas of specialization, because it encompasses the overlapping
topics of EDA-CAD, hardware design security, VLSI design, IP core
protection, optimization using evolutionary computing, system-on-chip
design and finally application specific processor/hardware accelerator
design for consumer electronics applications.
The book begins by introducing forensic detective control and
obfuscation mechanisms for hardware and IP core security. Further
chapters cover hardware stenography, digital signature driven hardware
authentication, fault-secured IP cores using digital signature-based
watermarks, multi-level watermarking, cryptosystem-based multi-variable
fingerprinting, multi-phase and hologram-based obfuscation, and security
of functionally obfuscated DSP cores.