期刊文献+
共找到72篇文章
< 1 2 4 >
每页显示 20 50 100
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
1
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel attackS information LEAKAGE virtual machine migration GENETIC algorithm
下载PDF
Side-channel attack-resistant AES S-box with hidden subfield inversion and glitch-free masking
2
作者 Xiangyu Li Pengyuan Jiao Chaoqun Yang 《Journal of Semiconductors》 EI CAS CSCD 2021年第3期60-65,共6页
A side-channel attack(SCA)-resistant AES S-box implementation is proposed,which is an improvement from the power-aware hiding(PAH)S-box but with higher security and a smaller area.We use the composite field approach a... A side-channel attack(SCA)-resistant AES S-box implementation is proposed,which is an improvement from the power-aware hiding(PAH)S-box but with higher security and a smaller area.We use the composite field approach and apply the PAH method to the inversion in the nonlinear kernel and a masking method to the other parts.In addition,a delaymatched enable control technique is used to suppress glitches in the masked parts.The evaluation results show that its area is contracted to 63.3%of the full PAH S-box,and its power-delay product is much lower than that of the masking implementation.The leakage assessment using simulation power traces concludes that it has no detectable leakage under t-test and that it at least can thwart the moment-correlation analysis using 665000 noiseless traces. 展开更多
关键词 ASIC side-channel attack AES S-box power-aware hiding glitch-free
下载PDF
An Efficient Method against Side-Channel Attacks on ECC
3
作者 LIU Shuanggen HU Yupu XU Wensheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1573-1576,共4页
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one. 展开更多
关键词 side-channel attacks ECC scalar multiplication algorithm
下载PDF
Side-Channel Attacks Based on Collaborative Learning
4
作者 Biao Liu Zhao Ding +2 位作者 Yang Pan Jiali Li Huamin Feng 《国际计算机前沿大会会议论文集》 2017年第1期139-141,共3页
Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces.However,in real life,this requirement i... Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces.However,in real life,this requirement is usually not met.In this paper,an attack algorithm based on collaborative learning is proposed.The algorithm only needs to use a small number of labeled power traces to cooperate with the unlabeled power trace to realize the attack to cryptographic device.By experimenting with the DPA contest V4 dataset,the results show that the algorithm can improve the accuracy by about 20%compared with the pure supervised learning in the case of using only 10 labeled power traces. 展开更多
关键词 side-channel attackS Supervised LEARNING COLLABORATIVE LEARNING POWER TRACE
下载PDF
基于决策边界敏感性和小波变换的电磁信号调制智能识别对抗样本检测方法
5
作者 徐东伟 蒋斌 +5 位作者 朱慧燕 宣琦 王巍 林云 沈伟国 杨小牛 《信号处理》 CSCD 北大核心 2024年第4期625-638,共14页
深度学习在图像分类和分割、物体检测和追踪、医疗、翻译和语音识别等与人类相关的任务中取得了巨大的成功。它能够处理大量复杂的数据,并自动提取特征进行预测,因此可以更准确地预测结果。随着深度学习模型的不断发展,以及可获得的数... 深度学习在图像分类和分割、物体检测和追踪、医疗、翻译和语音识别等与人类相关的任务中取得了巨大的成功。它能够处理大量复杂的数据,并自动提取特征进行预测,因此可以更准确地预测结果。随着深度学习模型的不断发展,以及可获得的数据和计算能力的提高,这些应用的准确性不断提升。最近,深度学习也在电磁信号领域得到了广泛应用,例如利用神经网络根据信号的频域和时域特征对其进行分类。但神经网络容易受到对抗样本的干扰,这些对抗样本可以轻易欺骗神经网络,导致分类错误。因此,对抗样本的生成、检测和防护的研究变得尤为重要,这将促进深度学习在电磁信号领域和其他领域的发展。针对现阶段单一的检测方法的有效性不高的问题,提出了基于决策边界敏感性和小波变换重构的对抗样本检测方法。利用了对抗样本与正常样本对模型决策边界的敏感性差异来进行检测,接着针对第一检测阶段中未检测出的对抗样本,本文利用小波变换对样本进行重构,利用样本去噪前后在模型中的预测值差异来进行检测。本文在两种调制信号数据集上进行了实验分析,并与基线检测方法进行对比,此方法更优。这一研究的创新点在于综合考虑了模型决策边界的敏感性和小波变换的重构能力,通过巧妙的组合,提出了一种更为全面、精准的对抗样本检测方法。这为深度学习在电磁信号领域的稳健应用提供了新的思路和方法。 展开更多
关键词 对抗样本检测 小波重构 决策边界 电磁信号 对抗攻击
下载PDF
基于雅可比显著图的电磁信号快速对抗攻击方法
6
作者 张剑 周侠 +1 位作者 张一然 王梓聪 《通信学报》 EI CSCD 北大核心 2024年第1期180-193,共14页
为了生成高质量的电磁信号对抗样本,提出了快速雅可比显著图攻击(FJSMA)方法。FJSMA通过计算攻击目标类别的雅可比矩阵,并根据该矩阵生成特征显著图,之后迭代选取显著性最强的特征点及其邻域内连续特征点添加扰动,同时引入单点扰动限制... 为了生成高质量的电磁信号对抗样本,提出了快速雅可比显著图攻击(FJSMA)方法。FJSMA通过计算攻击目标类别的雅可比矩阵,并根据该矩阵生成特征显著图,之后迭代选取显著性最强的特征点及其邻域内连续特征点添加扰动,同时引入单点扰动限制,最后生成对抗样本。实验结果表明,与雅可比显著图攻击方法相比,FJSMA在保持与之相同的高攻击成功率的同时,生成速度提升了约10倍,相似度提升了超过11%;与其他基于梯度的方法相比,攻击成功率提升了超过20%,相似度提升了20%~30%。 展开更多
关键词 深度神经网络 对抗样本 电磁信号调制识别 雅可比显著图 目标攻击
下载PDF
电磁频谱人工智能模型的对抗安全威胁综述 被引量:1
7
作者 张思成 张建廷 +4 位作者 杨研蝶 杨凇麟 姜航 宣琦 林云 《无线电通信技术》 北大核心 2024年第1期1-13,共13页
电磁频谱在现代社会中扮演着至关重要的角色,是国家战略资源,为通信、导航、科学研究和国防等领域提供关键支持。为应对电磁频谱高效管理与利用中的诸多挑战,人工智能(Artificial Intelligence, AI)技术在物理层中被广泛应用。然而,研... 电磁频谱在现代社会中扮演着至关重要的角色,是国家战略资源,为通信、导航、科学研究和国防等领域提供关键支持。为应对电磁频谱高效管理与利用中的诸多挑战,人工智能(Artificial Intelligence, AI)技术在物理层中被广泛应用。然而,研究发现AI模型对于数据的依赖导致其在训练和测试阶段容易受到恶意攻击。为推动针对电磁频谱AI模型的攻击与防御相关研究的发展,保障AI模型的安全应用,提升电磁安全能力,对电磁频谱物理层AI模型的对抗攻击方法进行了回顾,包括在训练阶段和测试阶段的攻击原理与方法。从数据、模型以及电磁信号特性的角度回顾了对抗攻击的评测工作。展望了攻击、评测和系统研发三个具有潜力的研究方向,并做出了总结。 展开更多
关键词 电磁频谱安全 人工智能模型 数据投毒 后门攻击 对抗样本
下载PDF
TEMPEST ATTACK对信息安全的威胁与对策 被引量:8
8
作者 刘杰 刘济林 《浙江大学学报(理学版)》 CAS CSCD 2004年第5期528-534,547,共8页
针对 TEMPEST ATTACK对计算机信息安全构成的威胁 ,建立了基本的电磁辐射模型 .详细讨论了TEMPEST ATTACK对计算机显示单元、外部设备和主机的信息窃取以及利用 TEMPEST ATTACK计算机病毒窃取信息 .最后介绍了防止 TEMPEST
关键词 电磁辐射 TEMPEST attack 信息窃取
下载PDF
电磁脉冲攻击下片上配电网络IR Drop分析方法
9
作者 刘强 张培然 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2024年第4期582-590,共9页
电磁脉冲攻击对集成电路的安全具有很强的威胁性.为了有效地抵御电磁脉冲攻击,针对片上配电网络易受电磁脉冲影响的问题,提出了一种电磁脉冲攻击下片上配电网络IRdrop分布的分析方法.首先,在集成电路布局规划阶段,基于有限元仿真构建片... 电磁脉冲攻击对集成电路的安全具有很强的威胁性.为了有效地抵御电磁脉冲攻击,针对片上配电网络易受电磁脉冲影响的问题,提出了一种电磁脉冲攻击下片上配电网络IRdrop分布的分析方法.首先,在集成电路布局规划阶段,基于有限元仿真构建片上配电网络模型和电磁脉冲攻击模型,仿真获得电磁脉冲下配电网络上感应电流密度的分布并计算感应电流,然后将感应电流加载到配电网络模型上,使用IR分析工具分析IRdrop分布.基于TSMC180 nm工艺版图的IR drop分析结果显示,电磁脉冲攻击能够在电源和地网络中引入2.3 V以上的IR drop.与现有基于电流分布理论值的分析方法相比,该分析方法能够更准确地获取电磁脉冲下配电网络中的IR drop分布.该分析方法可用于指导改进配电网络的设计,提升抗电磁脉冲攻击能力.实验结果显示,增加一组供电端口后,电源和地网络中的最大IR drop分别降低了28%和24%. 展开更多
关键词 集成电路 片上配电网络 电磁脉冲攻击 电压降
下载PDF
Detection Technique of Software-Induced Rowhammer Attacks 被引量:1
10
作者 Minkyung Lee Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2021年第4期349-367,共19页
Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access... Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access the cells as the cell density of DRAM increases,thereby generating a disturbance error affecting the neighboring cells,resulting in bit flips.Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits,it has been reported that it can be exploited on various platforms such as mobile devices,web browsers,and virtual machines.Furthermore,there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks.A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys.In an attempt to mitigate a rowhammer attack,various hardware-and software-based mitigation techniques are being studied,but there are limitations in that the research methods do not detect the rowhammer attack in advance,causing overhead or degradation of the system performance.Therefore,in this study,a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes. 展开更多
关键词 Rowhammer attack static analysis detecting technique side-channel attack bit flip
下载PDF
Side-Channel Analysis for Detecting Protocol Tunneling 被引量:1
11
作者 Harakrishnan Bhanu Jason Schwier +4 位作者 Ryan Craven Richard R. Brooks Kathryn Hempstalk Daniele Gunetti Christopher Griffin 《Advances in Internet of Things》 2011年第2期13-26,共14页
Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the ... Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools. We then show how to infer Hidden Markov models (HMMs) of network protocols from timing data and use the HMMs to detect when protocols are active. Unlike previous work, the HMM approach we present requires no a priori knowledge of the protocol. To illustrate the utility of this approach, we detect the use of English or Italian in interactive SSH sessions. For this example application, keystroke-timing data associates inter-packet delays with keystrokes. We first use clustering to extract discrete information from continuous timing data. We use discrete symbols to infer a HMM model, and finally use statistical tests to determine if the observed timing is consistent with the language typing statistics. In our tests, if the correct window size is used, fewer than 2% of data windows are incorrectly identified. Experimental verification shows that on-line detection of language use in interactive encrypted protocol tunnels is reliable. We compare maximum likelihood and statistical hypothesis testing for detecting protocol tunneling. We also discuss how this approach is useful in monitoring mix networks like The Onion Router (Tor). 展开更多
关键词 Hidden MARKOV Models TIMING side-channel attack VPN VULNERABILITY
下载PDF
Timing Attack Analysis on AA<sub>β</sub>Cryptosystem
12
作者 A. H. A. Ghafar M. R. K. Ariffin 《Journal of Computer and Communications》 2014年第4期1-9,共9页
Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analys... Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack discussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding. 展开更多
关键词 TIMING attack side-channel attack Public-Key CRYPTOSYSTEM AAβ Public Key CRYPTOSYSTEM
下载PDF
电磁信号对抗样本攻击与防御发展研究 被引量:3
13
作者 黄知涛 柯达 王翔 《信息对抗技术》 2023年第4期37-52,共16页
以深度学习为代表的智能化技术在提升电磁频谱控制与利用系统性能水平的同时,也暴露出其脆弱性,催生出一批以对抗样本为代表的智能电磁攻防技术。随着智能化的快速应用和发展,该领域势必成为电磁频谱竞争的又一个“制高点”。首次尝试... 以深度学习为代表的智能化技术在提升电磁频谱控制与利用系统性能水平的同时,也暴露出其脆弱性,催生出一批以对抗样本为代表的智能电磁攻防技术。随着智能化的快速应用和发展,该领域势必成为电磁频谱竞争的又一个“制高点”。首次尝试着明确了电磁对抗样本攻防的概念内涵,为规范后续的关键技术研究和具体应用提供参考。分析了智能模型脆弱性机理,认为智能模型脆弱性与可解释性存在一定的关系,将专家知识嵌入到模型学习中是下一步改善模型鲁棒性的研究方向。系统梳理了电磁信号对抗样本攻击和对抗样本防御的研究脉络,总结了通用对抗样本领域的共性研究规律,可以直接为电磁信号对抗样本研究提供借鉴。通过总结电磁信号对抗样本的研究规律,提炼出电磁信号对抗样本特有的问题。在此基础上,结合团队近年在该领域的研究积累,提出下一步的发展趋势,对抗攻击下一步的研究趋势是适应跨模型、跨任务的场景,应更加注重领域知识的应用,目标是要对抗多源综合的传感器体系;对抗防御的研究趋势是寻找鲁棒性与泛化性的权衡,通过利用信号处理知识优化处理流程,提高模型的对抗防御性能。同时关注鲁棒性评估,这可能是下一代智能化系统可靠性评估的关键技术之一。 展开更多
关键词 对抗样本攻击 对抗样本防御 电磁频谱控制与利用 深度学习
下载PDF
Jetson Nano神经网络物理电磁泄漏安全研究 被引量:1
14
作者 吴晨曦 张洪欣 崔晓彤 《太赫兹科学与电子信息学报》 2023年第9期1144-1149,共6页
如果采用旁路攻击方法对神经网络结构、框架进行攻击,恢复出结构、权重等信息,会产生敏感信息的泄漏,因此,需要警惕神经网络计算设备在旁路攻击领域产生敏感信息泄露的潜在风险。本文基于Jetson Nano平台,针对神经网络及神经网络框架推... 如果采用旁路攻击方法对神经网络结构、框架进行攻击,恢复出结构、权重等信息,会产生敏感信息的泄漏,因此,需要警惕神经网络计算设备在旁路攻击领域产生敏感信息泄露的潜在风险。本文基于Jetson Nano平台,针对神经网络及神经网络框架推理时产生的旁路电磁泄漏信号进行采集,设计了基于深度学习方法的旁路攻击算法,对旁路进行分析研究,并对两个维度的安全进行评估。研究表明,良好的网络转换策略能够提升网络分类识别准确率5%~12%。两种评估任务中,针对同一框架下不同结构的典型神经网络推理时,电磁泄漏的分类准确率达到97.21%;针对不同神经网络框架下同一种网络推理时,电磁泄漏的分类准确率达到100%。说明旁路电磁攻击方法对此类嵌入式图像处理器(GPU)计算平台中的深度学习算法隐私产生了威胁。 展开更多
关键词 旁路攻击 电磁泄漏 深度学习 一维卷积神经网络 Jetson Nano平台
下载PDF
基于显著图的电磁信号对抗样本生成方法
15
作者 周侠 张剑 李宁安 《电子学报》 EI CAS CSCD 北大核心 2023年第7期1917-1928,共12页
基于深度学习的电磁信号识别模型具有高效、准确和人工干预少的优点,然而其与传统神经网络模型一样容易受到对抗样本的影响.研究对抗样本对测试和提升模型的安全性和鲁棒性有着重要意义.为生成高质量电磁信号对抗样本,本文提出了基于雅... 基于深度学习的电磁信号识别模型具有高效、准确和人工干预少的优点,然而其与传统神经网络模型一样容易受到对抗样本的影响.研究对抗样本对测试和提升模型的安全性和鲁棒性有着重要意义.为生成高质量电磁信号对抗样本,本文提出了基于雅可比显著图批量特征点攻击算法(Batch Points Jacobian-based Saliency Map Attack, BP-JSMA).与传统雅可比显著图的攻击方法相比,BP-JSMA通过批量选取关键特征点能够更快生成对抗样本.此外,针对电磁信号数据的特点,增加自适应扰动限制,使得生成的对抗样本更具隐蔽性.在公开数据集的实验结果表明,与雅可比显著图攻击方法相比,BP-JSMA在生成速度方面提升了11倍,隐蔽性提升了10%;而与传统快速梯度符号攻击算法相比,攻击成功率提升了24%,隐蔽性提升了20%. 展开更多
关键词 人工智能 深度学习 对抗样本 电磁信号识别 显著图 目标攻击
下载PDF
Enhancing non-profiled side-channel attacks by time-frequency analysis
16
作者 Chengbin Jin Yongbin Zhou 《Cybersecurity》 EI CSCD 2023年第4期50-75,共26页
Side-channel analysis(SCA)has become an increasing important method to assess the physical security of cryptographic systems.In the process of SCA,the number of attack data directly determines the performance of SCA.W... Side-channel analysis(SCA)has become an increasing important method to assess the physical security of cryptographic systems.In the process of SCA,the number of attack data directly determines the performance of SCA.With sufficient attack data,the adversary can achieve a successful SCA.However,in reality,the cryptographic device may be protected with some countermeasures to limit the number of encryptions using the same key.In this case,the adversary cannot use casual numbers of data to perform SCA.The performance of SCA will be severely dropped if the attack traces are insufficient.In this paper,we introduce wavelet scatter transform(WST)and short-time fourier transform(STFT)to non-profiled side-channel analysis domains,to improve the performance of side-channel attacks in the context of insufficient data.We design a practical framework to provide suitable parameters for WST/STFT-based SCA.Using the proposed method,the WST/STFT-based SCA method can significantly enhance the performance and robustness of non-profiled SCA.The practical attacks against four public datasets show that the proposed method is able to achieve more robust performance.Compared with the original correlation power analysis(CPA),the number of attack data can be reduced by 50–95%. 展开更多
关键词 Correlation power analysis side-channel analysis Proposed attack framework Wavelet scatter transform Short-time fourier transform
原文传递
Hardware Security for IoT in the Quantum Era: Survey and Challenges
17
作者 Doudou Dione Boly Seck +3 位作者 Idy Diop Pierre-Louis Cayrel Demba Faye Ibrahima Gueye 《Journal of Information Security》 2023年第4期227-249,共23页
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s... The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed. 展开更多
关键词 IOT Hardware Security side-channel attacks Post-Quantum Cryptography NIST
下载PDF
电磁攻击方法与能量攻击方法的对比 被引量:7
18
作者 袁征 毛明 李胜利 《现代电子技术》 2003年第8期37-38,共2页
旁道攻击是避开复杂的密码算法 ,利用密码算法在软硬件实现中泄露出的各种信息进行攻击 ,电磁攻击和能量攻击是两种不同旁道攻击方法 ,二者既有共同之处 ,又有各自的特点 ,可以通过实验分析 。
关键词 旁道攻击 电磁攻击 能量攻击 密码算法
下载PDF
基于PCA和SVM的电磁模板分析攻击 被引量:6
19
作者 邓高明 张鹏 +1 位作者 赵强 陈开颜 《计算机测量与控制》 CSCD 北大核心 2009年第9期1837-1839,1868,共4页
在分析密码芯片电磁辐射数据相关性的基础上,提出了一种基于主成分分析(PCA)技术和多分类支持向量机(SVM)的模板分析密码旁路攻击方法。将密码设备运行时采集到的泄漏的电磁信号经过PCA处理之后作为特征向量,其对应的密钥作为类别,用已... 在分析密码芯片电磁辐射数据相关性的基础上,提出了一种基于主成分分析(PCA)技术和多分类支持向量机(SVM)的模板分析密码旁路攻击方法。将密码设备运行时采集到的泄漏的电磁信号经过PCA处理之后作为特征向量,其对应的密钥作为类别,用已知密钥情况下获得的样本训练多分类SVM,用训练好的多分类SVM对未知密钥的电磁信号进行分类,并根据分类结果推测密钥值。实验表明,在用相同多个主成分和训练样本的条件下,SVM的分类效果好于大多数文献上使用的Bayes判别的分类效果。 展开更多
关键词 模板分析 电磁旁路攻击 主成分分析 支持向量机
下载PDF
一种针对密钥的单比特电磁模板攻击方法 被引量:4
20
作者 刘飚 封化民 +1 位作者 袁征 高攸纲 《电波科学学报》 EI CSCD 北大核心 2012年第6期1213-1218,共6页
旁路信息泄露是安全设备面临的一种严重威胁,通过检测包括电磁在内的任何一种旁路,都可能提取密钥信息。提出一种通过被动的监视和利用数据加密标准(DES)密码芯片的电磁泄漏来获取密钥的单比特电磁模板攻击方法。该方法与传统的模板攻... 旁路信息泄露是安全设备面临的一种严重威胁,通过检测包括电磁在内的任何一种旁路,都可能提取密钥信息。提出一种通过被动的监视和利用数据加密标准(DES)密码芯片的电磁泄漏来获取密钥的单比特电磁模板攻击方法。该方法与传统的模板攻击相比有三点显著的不同:一是直接以密钥为攻击目标而不是密钥的算法置换;二是为单比特建立模板而不是多个比特;三是不需要已知明文或密文。针对DES加密方案的实验结果确认了这种方法在密码分析中的有效性。 展开更多
关键词 电磁 模板攻击 密钥 DES 单比特
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部