摘要
微控制器芯片所有活动都会在其旁路泄漏信号上留下"指纹"信息,将逆向工程思想与旁路攻击方法结合,对芯片旁路"指纹"信息进行分析,判断微控制器所执行的未知指令.针对微控制器(AT89C52)指令集构建对应不同指令的旁路模板库,对未知指令进行模板分析,通过实验验证了指令恢复的可行性,扩展了旁路攻击的研究领域.
There are different power consumption leakage characters for different instructions executed in chips,and the power consumption characters can be considered as the "finger printing" of each instruction.Taking the idea of reverse engineering,the power traces obtained from microcontroller where instructions were executed are analyzed with Side-Channel Attacks(SCA),power consumption template(finger printing) for each instruction were constructed.Then power traces obtained from an unknown microcontroller would be recognized with these side channel templates.The side channel template analysis against the instructions executed in a microcontroller(AT89C52) validated the effective of the instructions reversing.This research exploits a new application approach of SCA.
出处
《小型微型计算机系统》
CSCD
北大核心
2011年第6期1245-1248,共4页
Journal of Chinese Computer Systems
基金
国家自然科学基金项目(60940019)资助
军械工程学院原始创新基金项目(YSCX0903)资助