期刊文献+

安全芯片错误诱导攻击防护方案 被引量:2

Protection Scheme of Error Inject Attack for Secure Chip
下载PDF
导出
摘要 针对安全芯片容易遭受错误诱导攻击的情况,提出一种安全芯片错误诱导攻击防护方案。在分析诱导错误产生原因的基础上,设计存储区安全管理逻辑、硬件篡改防护机制和内外数据交互协议,从而增强芯片对错误诱导攻击的防御能力,提高芯片自身的安全性与运行的稳定性。 Aiming at the status that it is easier for secure chip to be attacked by error inject attack, this paper proposes a protection scheme of error inject attack for secure chip. By analyzing the reasons error inject attack occurs, it designs memory secure manage logic, hardware protection mechanism and data interactive protocol to enhance the chip's protection ability and improve the chip's security and stability.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第17期135-137,共3页 Computer Engineering
基金 现代通信国家重点实验室基金资助项目(9140C1106030806)
关键词 安全芯片 错误诱导攻击 信息防护 secure chip error inject attack information protection
  • 相关文献

参考文献3

  • 1Agrawal D, Rao Josyula, Rohatgi P. Multi-channel Attacks[C]//Proc. of Conf. on Cryptographic Hardware and Embedded Systems. [S.l.]: Springer-Verlag, 2003.
  • 2Smith S W. Trusted Computing Platforms: Design and Applications[M]. [S. l.]: Springer Norwell, 2005:21-25.
  • 3Altera Corporation. Cyclone Device Handbook[Z]. [2008-10-08]. http://www.altera.com.

同被引文献8

  • 1易青松,戴紫彬.SoC安全芯片物理级攻击方法及安全防护探析[J].国外电子元器件,2007(5):23-26. 被引量:6
  • 2POZZOBON O, WULLEMS C, DETRATFI M. Security Considerations in the Design of Tamper Resistant GNSS Receivers [ C ]//Proceedings of 2010 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Proceeding (NAVITEC). Noordwijk : IEEE, 2010.
  • 3SKOROBOGATOV S P. Semi-invasive Attacks: A New Approach to Hardware Security Analysis [ D ]. Cam- bridge: University of Cambridge, 2005.
  • 4KOCHER P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems ~ C ]// KOBLITZ N. Advances in Cryptology-CRYPTO'96.Berlin Heidelberg : Springer-Verlag, 1996 : 104-113.
  • 5DHEM J F, KOEUNE F, LEROUX P A, et al. A Prac- tical Implementation of the Timing Attack [ C ] // QUISQUATER J J, SCHNEIER B. Smart Card Research and Applications. Berlin Heidelberg: Springer, 1998: 167-182.
  • 6国家密码管理局.安全芯片密码检测准则:GM/T0008.2012[S].北京:中国标准出版社,2012.
  • 7邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16
  • 8王红胜,宋凯,张阳,陈开颜.针对高级加密标准算法的光故障注入攻击[J].计算机工程,2011,37(21):97-99. 被引量:4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部