Table 1 Typical IP piracy attack scenario in global design supply chain cycle.
From: Bio-mimicking DNA fingerprint profiling for HLS watermarking to counter hardware IP piracy
Protector and threat actors | IP vendor | SoC design house/integrator | Foundry |
|---|---|---|---|
Threat scenario and solution | Defender | Attacker | Attacker |
Hardware watermarking | IP piracy and fraud IP ownership claim | IP piracy and fraud IP ownership claim |