检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:吴恒旭[1,2] 陈开颜[1] 邓高明[1] 邹程[1]
机构地区:[1]军械工程学院计算机工程系 [2]成都军区78086部队
出 处:《小型微型计算机系统》2011年第6期1245-1248,共4页Journal of Chinese Computer Systems
基 金:国家自然科学基金项目(60940019)资助;军械工程学院原始创新基金项目(YSCX0903)资助
摘 要:微控制器芯片所有活动都会在其旁路泄漏信号上留下"指纹"信息,将逆向工程思想与旁路攻击方法结合,对芯片旁路"指纹"信息进行分析,判断微控制器所执行的未知指令.针对微控制器(AT89C52)指令集构建对应不同指令的旁路模板库,对未知指令进行模板分析,通过实验验证了指令恢复的可行性,扩展了旁路攻击的研究领域.There are different power consumption leakage characters for different instructions executed in chips,and the power consumption characters can be considered as the "finger printing" of each instruction.Taking the idea of reverse engineering,the power traces obtained from microcontroller where instructions were executed are analyzed with Side-Channel Attacks(SCA),power consumption template(finger printing) for each instruction were constructed.Then power traces obtained from an unknown microcontroller would be recognized with these side channel templates.The side channel template analysis against the instructions executed in a microcontroller(AT89C52) validated the effective of the instructions reversing.This research exploits a new application approach of SCA.
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.4