首页 | 本学科首页   官方微博 | 高级检索  
     

基于功耗泄漏的密码芯片指令分析
引用本文:吴恒旭,陈开颜,邓高明,邹程.基于功耗泄漏的密码芯片指令分析[J].计算机工程,2011,37(7):130-132,135.
作者姓名:吴恒旭  陈开颜  邓高明  邹程
作者单位:军械工程学院计算机工程系,石家庄,050003
基金项目:国家自然科学基金资助项目,军械工程学院原始创新基金资助项
摘    要:结合逆向工程思想和旁路攻击原理,利用密码芯片的旁路功耗泄漏信号对芯片指令进行建模攻击,选取指令功耗轨迹上的有效点建立指令旁路模板,并提出指令类划分方法.通过对AT89C52单片机上运行的单周期单字节指令进行分析,验证了旁路模板指令恢复的可行性.

关 键 词:旁路攻击  模板攻击  逆向工程

Instruction Analysis for Crypto Chip Based on Power Consumption Leakage
WU Heng-xu,CHEN Kai-yan,DENG Gao-ming,ZOU Cheng.Instruction Analysis for Crypto Chip Based on Power Consumption Leakage[J].Computer Engineering,2011,37(7):130-132,135.
Authors:WU Heng-xu  CHEN Kai-yan  DENG Gao-ming  ZOU Cheng
Affiliation:(Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang 050003,China)
Abstract:This paper goes on modeling attack to chips by using power consumption side channel leak signal with the idea of reverse engineering and the method of Side Channel Attack(SCA),selects the effective instruction power consumption path to establish side channel template for instructions,and proposes partitioning method for instruction class.The single cycle and single-byte side channel template analysis against the instructions executed in a microcontroller AT89C52 validates the effective of the instructions reversing.
Keywords:Side Channel Attack(SCA)  template attack  reverse engineering
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号