期刊文献+

基于HMM的微控制器旁路模板指令序列恢复

Retrieve Instruction Sequences with Side Channel Template Based on Hidden Markov Model in Microcontroller
下载PDF
导出
摘要 针对微控制器代码旁路逆向恢复的问题,采用逆向工程思想与旁路攻击方法,依据不同的指令在芯片内执行时,会产生不同的功耗旁路泄漏信号这一特点,在已实现的单条指令旁路模板恢复的基础上,综合考虑程序的"上下文"信息,运用隐马尔可夫模型(HMM)对该问题进行建模描述与求解.对AT89C52微控制器中运行的数据加密标准(DES)加密算法的部分指令序列的恢复实验表明,该方法能够有效的恢复出微控制器芯片中运行的指令序列. In order to exploit prior knowledge about the program code, a math model, Hidden Markov Model (HMM), is applied to describe and resolve a problem of recovering the program code of a mierocontroller. With the idea of reverse engineering and the method of Side-Channel Attacks (SCA), and according to the property that different power consumption leakage characters for different instructions executed in chips, a practical experiment based on previous side channel templates built by making use of power consumption leakages for each instruction has shown that instruction sequences executed in a Data Encryption Standard (DES) microcontroller (AT89C52) cipher chip circuit can be reconstructed and has confirmed the effectiveness of method mentioned above.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第8期42-46,共5页 Microelectronics & Computer
基金 国家自然科学基金(60940019) 军械工程学院原始创新基金(YSCX0903)
关键词 旁路模板 隐马尔可夫模型 微控制器 指令序列恢复 side channel templates HMM microcontrollers~ instruction sequences reconstructed
  • 相关文献

参考文献7

  • 1Chari S, Rao J R, Rohatgi P. Template attacks[C]// Proceeding of the workshop on cryptographic hardware and embedded systems (CHES03). Cologne, Germa- ny, Springer, 2003.. 13-28.
  • 2Roman Novak. Side-channel based reverse engineering of secret algorithms[-C]//ERK 2003. Germany, 2003. 445-448.
  • 3Martin Goldack. Side-channel based reverse engineer- ing for microcontrollers [D. Germany, Bochum, Ruhr-University, 2008.
  • 4Dennis Vermoen. Reverse engineering of Java Card ap- plets using power analysis[D]. Netherlands, Master's thesis, Delft University of Technology, 2006.
  • 5邓高明,吴恒旭,张鹏,邹程,陈开颜.旁路模板在密码芯片指令分析中的应用[J].微电子学与计算机,2011,28(2):140-144. 被引量:4
  • 6吴恒旭,陈开颜,邓高明,等.基于主成分分析的指令旁路模板分析研究[J].微电子学与计算机,2010,27(10):156-158.
  • 7Forney G D. The viterbi algorithmEJ, the IEEE, 1973, 61(a).- 268-278.

二级参考文献8

  • 1Paul Koeher. Timing attacks on implementations of dif- fie-bellman, RSA, DSS, and other systems[C]//Pro- ceedings Crypto '96, LCNS. New York:Springer-Ver- lag, 1996:104-113.
  • 2Martin Goldack. Side-channel based reverse engineer- ing for microcontrollers [D]. Bochum: Ruhr- Universi- ty, 2008.
  • 3Dennis Vermoen. Reverse engineering of Java card ap- plets using power analysis [D]. Netherlands: TU Delft, 2007.
  • 4Jan M Rabaey, Anantha Chandrakasan, Borivoje Nikoli.数字集成电路-电路、系统与设计[M].2版.周润德,译.北京:电子工业出版社,2004:141-166.
  • 5SungMo Kang,Yusuf Leblebiei.CMOS数字集成电路-分析与设计[M].3版.王志功,窦建华,译.北京:电子工业出版社,2005:97-98.
  • 6褚杰,赵强,丁国良,邓高明.密码系统差分功耗分析攻击及功耗模型[J].华中科技大学学报(自然科学版),2008,36(6):18-21. 被引量:8
  • 7邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16
  • 8邓高明,张鹏,赵强,陈开颜.针对密码芯片的电磁模板分析攻击[J].微电子学与计算机,2010,27(1):1-4. 被引量:7

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部