跳到主要內容

臺灣博碩士論文加值系統

(100.24.118.144) 您好!臺灣時間:2022/12/06 04:42
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林琮棠
研究生(外文):Tsung-Tang Lin
論文名稱:利用空閒功能單元以最大化浮水印數量之方法研究
論文名稱(外文):Utilizing Idle Functional Units for Maximizng The Number of IP Watermarks
指導教授:黃世旭黃世旭引用關係
指導教授(外文):Shih-Hsu Huang
學位類別:碩士
校院名稱:中原大學
系所名稱:電子工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
語文別:中文
論文頁數:47
中文關鍵詞:高階合成浮水印最大化矽智財保護空閒功能單元
外文關鍵詞:High-Level SynthesisIP WatermarksIP ProtectionIdle Functional Units
相關次數:
  • 被引用被引用:0
  • 點閱點閱:66
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著晶片系統設計變的龐大,設計負責特定功能且可重用的矽智財(Intellectual Property Cores)產品來加速晶片設計的生意逐漸增加,但伴隨矽智財的商機增長,盜取矽智財的案例也逐漸上升,因此在矽智財保護的設計研究中使用浮水印(watermarks)阻止矽智財被竊取是一件很重要的問題。先前的研究顯示,增加浮水印的個數可以使矽智財保護的安全性以及差異性提高。且在高階合成階段利用矽智財輸出端暫時關閉的時間(Temporally Free)設計浮水印已經被提出作為有效且低額外設計消耗的方法,透過研究此設計方法的過程中,我們發現可以利用高階合成中的空閒功能單元(Idle Functional Units)進一步的增加浮水印的個數。在本篇文章中,我們提出在高階合成階段利用空閒功能單元最大化浮水印數量的設計方法,我們的方法是以啟發式(Heuristic)演算法方法在額外資源的設計條件考量下,利用空閒功能單元將浮水印的數量最大化,比起既有的浮水印設計研究,我們可以達到更多的浮水印數量,並且不會產生過多的額外資源負擔。

To cope with the increasing design complexity, the companies reuse more and more intellectual property cores to accelerate integrated circuit design. As the number of intellectual properties core is growing, the cases of intellectual property core theft are also on the rise. The protection of intellectual property core by inserting watermarks during the integrated circuit design is a very important issue.
Previous works have shown that more number of intellectual property watermarks can let intellectual property cores to achieve high security and difference. In the high-level synthesis process, to utilize the temporally free output slots (in the operating stage) to produce watermarks is recognized as a useful technique for protecting intellectual property cores. In this thesis, we point out that the utilization of the idle functional units can increase the number of watermarks. Based on this observation, we propose an effective approach to increase the number of watermarking technique based on the utilization of idle functional units in the high level synthesis process. Our objective is to maximize the number of watermarks under the overhead constraint. Experimental results show that our approach achieves very good results.

目錄
中文摘要 I
Abstract II
致謝 III
目錄 IV
圖目錄 VI
表目錄 VIII
第一章 緒論 1
1.1 研究背景 2
1.2 研究目的 5
1.3 全文架構 6
第二章 基本概念 7
2.1 高階合成階段的設計概念 7
2.2 高階合成的資料路徑圖 11
2.3 高階合成階段的浮水印設計研究 14
第三章 研究動機 18
3.1 空閒功能單元的介紹 18
3.2 以空閒功能單元增加浮水印個數的方法 19
第四章 利用空閒功能單元最大化浮水印數量演算法 22
4.1 整體的浮水印設計流程 22
4.2 空閒功能單元分析與資料路徑圖的建造 23
4.3在增加額外設計架構限制下進行空閒功能單元挑選 27
4.4演算法複雜度分析 28
第五章 實驗結果與分析 29
5.1 實驗硬體與軟體平台 29
5.2 測試電路 29
5.3 實驗流程與方法 30
5.4 實驗結果與分析 32
第六章 結論 34
參考文獻 35
附錄一 口試委員問答 39

圖目錄
圖1.1 以合成階段區分下的三種浮水印設計方案 3
圖2.1.1 資料流程圖1 8
圖2.1.2 兩種不同限制要求下的資料流程圖 10
圖2.2.1 加入內部運算過程資料與功能單元元件資訊的資料流程圖 11
圖2.2.2 四個暫存器資源限制下的資料路徑與資料儲存狀態圖 13
圖2.2.3 三個暫存器資源限制下的資料路徑與資料儲存狀態圖 13
圖2.3.1 資料流程圖2 14
圖2.3.2 兩個輸出端的輸出情形 15
圖2.3.3 資料路徑與資料儲存狀態圖 15
圖2.3.4 加入浮水印設計的資料路徑圖 16
圖2.3.4 加入浮水印設計後的兩個輸出端的輸出情形 16
圖3.1.1 資料流程圖與功能單元使用情況 18
圖3.2.1 加入空閒功能單元產生更多的子浮水印印記 19
圖3.2.2 加入空閒功能單元應用下的資料路徑與資料儲存狀態圖 20
圖4.1.1 整體設計流程圖 22
圖4.2.1 整體分析空閒功能單元與資料路徑圖虛擬碼 23
圖4.2.2 分析功能單元的可進行額外利用的操作步驟 25
圖4.2.3 分析暫存器資料可取代的操作步驟 25
圖4.2.4 分析暫存器與功能單元的資料路徑關係 26
圖4.2.5 分析功能單元與輸出、輸入端的資料路徑關係 26
圖4.3.1 在增加額外設計架構限制下進行空閒功能單元挑選 27
圖5.3.1 實驗流程圖 31

表目錄
表2.3.1 計算浮水印可能性個數公式中使用的變數 17
表5.2.1 測試電路之電路特性 30
表5.3.1 各測試電路的資源分配 31
表5.4.1 在不增加額外設計架構下浮水印個數比較實驗結果 33

[1] C. Gorman, “Counterfeit Chips on the Rise,” IEEE Spectrum, vol. 49, no. 6, pp. 16-17, 2012.
[2] M. Pecht and S. Tiku, “Bogus! Electronic manufacturing and consumers confront a rising tide of counterfeit electronics,” IEEE Spectr, vol. 43, no. 5, pp. 37-46, 2006.
[3] R. Chapman and T.S. Durrani, “IP protection of DSP algorithms for system on chip implementation,” IEEE Transactions on Signal Processing, vol. 48, no. 3, pp. 854-861, 2000.
[4] A. Rashid, J. Asher, W.H. Mangione-Smith and M. Potkonjak, “Hierarchical watermarking for protection of DSP filter cores,” Proc. of the IEEE Custom Integrated Circuits, pp. 39-42, 1991
[5] A.L. Oliveira, “Techniques for the creation of digital watermarks in sequential circuit designs,” IEEE transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 20, no. 9, pp. 1101-1117, 2001.
[6] I. Torunoglu and E. Charbon, “Watermarking-based copyright protection of sequential functions,” Proc. of the IEEE Custom Integrated Circuits, pp. 35-38, 1999.
[7] A.T. Abdel-Hamid, S. Tahar and E.M. Aboulharmid, “A public-key watermarking technique for IP designs,” Proc. of the Design, Automation and Test in Europe, vol. 1, pp. 330-335, 2005.
[8] A. Cui, C.H. Chang, S. Tahar and A.T. Abdel-Hamid, “A Robust FSM Watermarking Scheme for IP Protection of Sequential Circuit Design,” IEEE Transactions on Computer-Aided Design of Integrated Circuit and Systems, vol. 30, no. 5, pp. 678-690, 2011.
[9] C.H. Chang and L. Zhang, “A Blind Dynamic Fingerprinting Technique for Sequential Circuit Intellectual Property Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33, no. 1, pp. 76-89, 2014.
[10] D. Kirovski, Y.Y. Hwang, M. Potkonjak and J. Cong, “Intellectual property protection by watermarking combinational logic synthesis solutions,” IEEE/ACM International Conference on Computer-Aided Design, pp. 194-198, 1998.
[11] I. Hong and M. Potkonjak, “Behavioral synthesis techniques for intellectual property protection,” Proc. of the Design Automation Conference, pp. 849-854, 1999.
[12] B. Le Gal and L. Bossuet, “Automatic HLS based low-cost IP watermarking,” IEEE 9th International New Circuits and Systems Conference, pp. 490-493, 2011.
[13] B. Le Gal, L. Bossuet and D. Dallet, “Mathematical functions based watermarking for IPP,” IEEE International Conference on Electronics, Circuits and Systems, pp. 310-313, 2007.
[14] B. Le Gal and L. Bossuet, “Automatic low-cost IP watermarking technique based on output mark insertions,” Design Automation for Embedded Systems, vol. 16, no. 2, pp. 71-92, 2012.
[15] J. Kach, W.H. Mangione-Smith and M. Potkonjak, “Robust FPGA intellectual property protection through multiple small watermarks,” Proc. of the Design Automation Conference, pp. 831-836, 1999.
[16] K.J. Adarsh, Y. Lin, R.P. Pushkin and Q. Gang, “Zero overhead watermarking technique for FPGA designs,” Proc. of the 13th ACM Great Lakes Symposium on VLSI, pp. 147-152, 2003.
[17] S. GuangYu, G. Zhiqiang and X. Yi, “A watermarking system for IP protection by buffer insertion technique,” Porc. of the 7th International Symposium on Quality Electronic Design, pp. 671-675, 2006.
[18] Y.C. Fan and H.W. Tsao, “Watermarking for intellectual property protection,” vol. 39, no. 18, pp. 1316-1318, 2003.
[19] R. Jain, A. Mujumdar, A. Sharma and H. Wang, “Empirical evaluation of some high-level synthesis scheduling heuristics,” Proc. of the 28th ACM/IEEE Design Automation Conference, pp. 686-689, 1991.
[20] R.A. Walker and S. Chaudhuri, “Introduction to the scheduling problem,” IEEE Design and Test of Computers, vol. 12, no. 2, pp. 60-69, 1995.
[21] P. Faraboschi, J. Fisher and C. Young, “Instruction scheduling for instruction level parallel processors,” Proc. of the IEEE, vol. 89, no. 11, pp. 1638-1659, 2001.
[22] F. Mintzer and G.W. Braudaway, “If one watermark is good, are more better?,” Proc. of the IEEE International Conference Acoustics, Speech, and Signal Processing, vol. 4, pp. 2067-2069, 1999.
[23] S.O. Memik, A. Srivastava, E. Kursun and M, Sarrafzadeh, “Algorithmic aspects of uncertainty driven scheduling,” IEEE International Symposium on Circuit and Systems, vol. 3, pp. 763-766, 2002.
[24] J. Ramanujam, S. Deshpande, J. Hong, M. Kandemir, “A heuristic for clock selection in high-level synthesis,” Proc. of 7th Asia and South Pacific Design Automation Conference, pp. 414-419, 2002.
[25] C.A. Papachristou and H. KonuK, “A linear program driven scheduling and allocation method followed by an interconnect optimization algorithm,” Porc. of the 27th ACM/IEEE Design Automation Conference, pp. 77-83, 1990.
[26] P.G. Paulin and J.P. Knight, “Force-directed scheduling for the behavioral synthesis of ASICs,” IEEE Transactions on Computer-Aided Design of Integrated Circuit and Systems, vol. 8, no. 6, pp. 661-679, 1989.
[27] S.S. Huang, C.T. Hwang, Y.C. Hsu and Y.J. Oyang, “A New Approach to Schedule Operations Across Nested-ifs And Nested-loops,” Proc. of the 25th Annual International Symposium on Microarchitecture, pp. 268-271, 1992.
[28] C. Lee, M. Potkonjak, and W.H. Maggione-Smith, “MediaBench: A Tool for Evaluating and Synthesizing Multimedia and Communications Systems,” Proc. of IEEE International Symposium on Microarchitecture, pp. 330-335, 1997.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top