计算机工程2011,Vol.37Issue(7):130-132,135,4.DOI:10.3969/j.issn.1000-3428.2011.07.043
基于功耗泄漏的密码芯片指令分析
Instruction Analysis for Crypto Chip Based on Power Consumption Leakage
摘要
Abstract
This paper goes on modeling attack to chips by using power consumption side channel leak signal with the idea of reverse engineering and the method of Side Channel Attack(SCA), selects the effective instruction power consumption path to establish side channel template for instructions, and proposes partitioning method for instruction class. The single cycle and single-byte side channel template analysis against the instructions executed in a microcontroller AT89C52 validates the effective of the instructions reversing.关键词
旁路攻击/模板攻击/逆向工程Key words
Side Channel Attack(SCA)/ template attack/ reverse engineering分类
信息技术与安全科学引用本文复制引用
吴恒旭,陈开颜,邓高明,邹程..基于功耗泄漏的密码芯片指令分析[J].计算机工程,2011,37(7):130-132,135,4.基金项目
国家自然科学基金资助项目(60571037) (60571037)
军械工程学院原始创新基金资助项(YSCX0903) (YSCX0903)