Table 1 Typical IP piracy attack scenario in global design supply chain cycle.

From: Bio-mimicking DNA fingerprint profiling for HLS watermarking to counter hardware IP piracy

Protector and threat actors

IP vendor

SoC design house/integrator

Foundry

Threat scenario and solution

Defender

Attacker

Attacker

Hardware watermarking

IP piracy and fraud IP ownership claim

IP piracy and fraud IP ownership claim