摘要: 攻击者在现场可编程门阵列芯片设计、生产过程中能够偷偷嵌入恶意的所谓硬件木马以形成隐藏的后门,从而得到非授权的私密信息。为此,论述一种基于器件功率旁路泄露特性的硬件木马,以有意形成功率旁路来传递私密信息。通过实验证明了在器件有效的功率噪声级别下,该功率旁路木马能够泄露私密信息,采用扩展频谱技术实现多位密钥的并行泄露体现了硬件木马的设计灵活性。
关键词:
硬件木马,
信息泄露,
现场可编程门阵列,
扩展频谱,
差分功率分析
Abstract: Malicious hardware components can be covertly inserted at the design and foundry of Field Programmable Gate Array(FPGA) to implement hidden backdoors for unauthorized exposure of secret information. This paper proposes a new class of hardware Trojan which intentionally induces physical side-channels to convey secret information. Power side-channel engineered to leak information below the effective noise power level of the device is demonstrated. The Trojan side-channel is implemented and it is evaluated with respect to the feasibility on FPGA. Spread spectrum technology used for parallel leakage of multi-key shows this type of Trojan is very flexible in design.
Key words:
hardware Trojan,
information exposure,
Field Programmable Gate Array(FPGA),
spread spectrum,
differential power analysis
中图分类号:
邹程, 张鹏, 邓高明, 吴恒旭. 基于功率旁路泄露的硬件木马设计[J]. 计算机工程, 2011, 37(11): 135-137.
JU Cheng, ZHANG Feng, DENG Gao-Meng, TUN Heng-Xu. Design of Hardware Trojan Based on Power Side-channel Exposure[J]. Computer Engineering, 2011, 37(11): 135-137.