期刊文献+

基于旁路分析的集成电路芯片硬件木马检测 被引量:3

Detecting Hardware Trojans in IC Chips with Side Channel Analysis
下载PDF
导出
摘要 针对密码芯片中硬件木马电路检测的困难性,介绍了根据芯片旁路信息进行硬件木马检测的思想.在形式化定义基于旁路分析的硬件木马检测问题的基础上,分析了含硬件木马与不含硬件木马的密码芯片对应旁路信号在主成份分析结果上的差异,并以此对FPGA实现的含硬件木马的DES密码原型芯片进行了检测实验,实验结果表明了基于旁路信号主成份分析在密码芯片硬件木马检测中的效果. Aimed at the difficulty in detecting hardware Trojans inside IC chips, a novel idea about detecting Troian circuits with side channel analysis is introduced. After formally defining the problem of detecting hardware Trojans in IC chips with side channel analysis, the differences between principle components analysis on side channel signals acquired from chips with Trojan circuits and without Trojan circuits were analyzed. Detection experiments with principle components analysis were taken out on a DES cipher chip implemented on a FPGA board. The results of experiments verified the effect of Hardware Trojans detection with principle components analysis on side channel signal.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第11期5-9,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(60940019) 军械工程学院原始创新基金(YSCX0903)
关键词 密码芯片 硬件木马 旁路分析 主成份分析 cipher chips hardware Trojan side channel analysis PCA
  • 相关文献

参考文献7

  • 1King S T, Tucek J, Cozzie A, et al. Designing and im- plementing malicious hardware[C]//Proceedings of the 1 st USENIX Workshop on Large--Scale Exploits and E- mergent Threats (LEET). San Francisco, 2008:1-8.
  • 2Soden J, Anderson R, Henderson C. IC failure analysis tools and techniques- magic, mystery, and science [C]// International Test Conference, Lecture Series II, Practical Aspects of IC Diagnosis and Failure Analysis:A Walk through the Process. Washington, 1996.1-11.
  • 3Wang X, Tehranipoor M, Plusquellic J. Detecting mali- cious inclusions in secure hardware: challenges and solu- tions[C]// 1st IEEE International Workshop on Hard- ware--Oriented Security and Trust (HOST). USA: California, 2008 : 15- 19.
  • 4邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16
  • 5张鹏,邓高明,赵强,陈开颜.基于Cache行为的旁路攻击[J].计算机工程,2008,34(21):20-22. 被引量:4
  • 6邓高明,赵强,张鹏,陈开颜.基于AES算法的Cache Hit旁路攻击[J].计算机工程,2008,34(13):113-114. 被引量:8
  • 7Alex Clark Baumgarten. Preventing integrated circuit pi- racy using reconfigurable logic barriers[D]. Ames, Io- wa, Iowa State University, 2009.

二级参考文献26

  • 1韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 2韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 3Kelsey J, Schneier B, Wagner D, et al. Side Channel Cryptanalysis of Product Ciphers[C]//Proc. of the 5th European Symposium on Research in Computer Security. Louvain-la-Neuve, Belgium, Berlin Springer-Verlag, 1998: 97-110.
  • 4Yukiyasu T, Teruo S, Tomoyasu S, et al. Cryptanalysis of DES Implemented on Computers with Cache[C]//Proc. of the 5th International Workshop on Cryptographic Hardware and Embedded Systems. [S. l.]: Springer-Verlag, 2003: 62-76.
  • 5Bonneau J, Mironov I. Cache-collision Timing Attacks Against AES[C]//Proc. of Cryptographic Hardware and Embedded Systems. [S. l.]: Springer-Verlag, 2006:201-215.
  • 6Page D. Theoretical Use of Cache Memory as a Cryptanalytic Side-channel[R]. Department of Computer Science, University of Bristol, Tech. Rep.: CSTR-02-003, 2002.
  • 7Bernstein D J. Cache-timing Attacks on AES[EB/OL]. (2005-04-14). http://cr.yp.to/antiforgery/cachetiming-20050414.pdf.
  • 8Quisquater J J, Samyde D. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards// Proceedings of the Smart Cards Programming and Security (e-Smart 2001). Cannes, France, 2001: 200-210
  • 9Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Concrete results//Proceedings of the Workshop on Crypto graphic Hardware and Embedded Systems (CHES'01). Paris, France, 2001:251-261
  • 10Agrawal D, Archambeault B, Rao J R, Rohatgi P. The EM side channel(s): Attacks and assessment methodologies// Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02). Redwood Shores, CA, USA, 2002:29-45

共引文献25

同被引文献8

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部