期刊文献+

基于电磁辐射与深度学习的芯片指令分析

Chip instruction analysis based on electromagnetic radiation and deep learning
下载PDF
导出
摘要 针对传统的芯片指令分析的局限性以及指令恢复准确率低下等问题,文中结合旁路分析与深度学习算法实现芯片指令的逆向分析。由于芯片在工作时能够通过不同的方式泄露旁路信号,因此,首先对芯片特性进行分析,找出不同执行指令、操作数据、指令地址之间电磁旁路信号的差异形式;然后,利用深度神经网络构建指令逆向分析模型,在分析连续执行指令信号时,对多周期指令进行分割并提出分阶段识别的方法恢复指令;最后,在STC89C52RC芯片上进行实验并分析,验证该方案的可行性与有效性。 In allusion to the limitations of traditional chip instruction analysis and the low accuracy of instruction recovery,the reverse analysis of chip instruction is realized by combing with the side-channel analysis and deep learning algorithm.The chip characteristics are analyzed to find out the side-channel signals′different forms caused by different execution instructions,operating data and instruction addresses because the chip can leak side-channel signals in different ways when it is working.The deep neural network is used to construct the instruction reverse analysis model is constructed.When analyzing the continuous execution instructions signal,the multi-cycle instruction is segmented and the method of phased recognition is proposed to restore the instruction.The experiments and analyses were performed with the STC89C52RC chip to verify the feasibility and effectiveness of the scheme.
作者 李雄伟 刘俊延 张阳 陈开颜 刘林云 张帆 LI Xiongwei;LIU Junyan;ZHANG Yang;CHEN Kaiyan;LIU Linyun;ZHANG Fan(Shijiazhuang Campus,Army Engineering University,Shijiazhuang 050003,China;Ministry of Aerospace System,Beijing 100094,China)
出处 《现代电子技术》 2022年第14期29-34,共6页 Modern Electronics Technique
基金 国家自然科学基金青年基金资助项目(61602505)。
关键词 芯片指令分析 电磁辐射 深度学习 旁路分析 逆向分析 指令分割 指令恢复 chip instruction analysis electromagnetic radiation deep learning side-channel analysis reverse analysis instruction segmentation instruction recovery
  • 相关文献

参考文献5

二级参考文献31

  • 1Kocher P.Timing Attacks on Implementations of Diffie-Hellmann,RSA,DSS,and Other Systems[C]//Proc.of CRYPTO'96.[S.l.]:Springer-Verlag,1996.
  • 2Vermoen D.Reverse Engineering of Java Card Applets Using Power Analysis[D].Delft,the Netherlands:Delft University of Technology,2006.
  • 3Brier E,Clavier C,Olivier F.Correlation Power Analysis with a Leakage Model[C]//Proc.of CHES'04.[S.l.]:Springer-Verlag,2004.
  • 4Canovas C,Clediere J.What Do DES S-boxes Say in Differential Side Channel Attacks[EB/OL].(2005-03-11).http://eprint.i-acr.org/2005/311.pdf.
  • 5Chari S,Rao J R,Rohatgi P.Template Attacks[C]//Proc.of CHES'03.Cologne,Germany:Springer,2003.
  • 6MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 7KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. N Koblitz, editor, CRYPTO[C]. 1996,104-113.
  • 8MANGARD S, OSWALD E, POPP T. Power Analysis Attacks: Re- vealing the Secrets of Smart Cards[M]. Advances in Information S- curry. Springer, 2007.
  • 9MEYNARD O, GU1LLEY S, DANGER J L, et al. Far correla-tion-based EMA with a precharacterized leakage model[A]. Design, Automation & Test in Europe Conference & Exhibition (DATE) [C]. 2010. 977-980.
  • 10EISENBARTH T, KASPER T, MORADI A. et al. On the power of power analysis in the real world: a complete break of the keeloq code hopping scheme[A]. CRYPTO 2008[C]. 2008. 203-220.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部