期刊文献+

基于旁路泄漏的微控制器指令分析研究

Instructions Analysis for Crypto Chip Based on Power Consumption Leakage
在线阅读 下载PDF
导出
摘要 微控制器芯片所有活动都会在其旁路泄漏信号上留下"指纹"信息,将逆向工程思想与旁路攻击方法结合,对芯片旁路"指纹"信息进行分析,判断微控制器所执行的未知指令.针对微控制器(AT89C52)指令集构建对应不同指令的旁路模板库,对未知指令进行模板分析,通过实验验证了指令恢复的可行性,扩展了旁路攻击的研究领域. There are different power consumption leakage characters for different instructions executed in chips,and the power consumption characters can be considered as the "finger printing" of each instruction.Taking the idea of reverse engineering,the power traces obtained from microcontroller where instructions were executed are analyzed with Side-Channel Attacks(SCA),power consumption template(finger printing) for each instruction were constructed.Then power traces obtained from an unknown microcontroller would be recognized with these side channel templates.The side channel template analysis against the instructions executed in a microcontroller(AT89C52) validated the effective of the instructions reversing.This research exploits a new application approach of SCA.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第6期1245-1248,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60940019)资助 军械工程学院原始创新基金项目(YSCX0903)资助
关键词 旁路攻击 模板攻击 逆向工程 指令识别 SCA TA reverse engineering instructions identifying
  • 相关文献

参考文献2

二级参考文献18

  • 1韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 2陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 3韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 4Quisquater J J, Samyde D. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards// Proceedings of the Smart Cards Programming and Security (e-Smart 2001). Cannes, France, 2001: 200-210
  • 5Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Concrete results//Proceedings of the Workshop on Crypto graphic Hardware and Embedded Systems (CHES'01). Paris, France, 2001:251-261
  • 6Agrawal D, Archambeault B, Rao J R, Rohatgi P. The EM side channel(s): Attacks and assessment methodologies// Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02). Redwood Shores, CA, USA, 2002:29-45
  • 7Chari S, Rao J R, Rohatgi P. Template attacks//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 03). Cologne, Germany, 2003 13-28
  • 8Agrawal D, Rao J R, Rohatgi P, Schramm K. Templates as master keys//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 05). Edinburgh, UK, 2005: 15-29
  • 9Archambeau C, Peeters E, Standaert F X, Quisquater J J. Template attacks in principal subspaces//Proeeedings of the Workshop on Cryptographie Hardware and Embedded Systems (CHES'06). Yokohama, Japan, 2006, 1-14
  • 10Gierlichs B, Lemke-Rust K, Paar C. Templates vs. Stochastic Methods//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'06). Yokohama, Japan, 2006: 15-29

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部