Abstract:
This paper goes on modeling attack to chips by using power consumption side channel leak signal with the idea of reverse engineering and the method of Side Channel Attack(SCA), selects the effective instruction power consumption path to establish side channel template for instructions, and proposes partitioning method for instruction class. The single cycle and single-byte side channel template analysis against the instructions executed in a microcontroller AT89C52 validates the effective of the instructions reversing.
Key words:
Side Channel Attack(SCA),
template attack,
reverse engineering
摘要: 结合逆向工程思想和旁路攻击原理,利用密码芯片的旁路功耗泄漏信号对芯片指令进行建模攻击,选取指令功耗轨迹上的有效点建立指令旁路模板,并提出指令类划分方法。通过对AT89C52单片机上运行的单周期单字节指令进行分析,验证了旁路模板指令恢复的可行性。
关键词:
旁路攻击,
模板攻击,
逆向工程
CLC Number:
TUN Heng-Xu, CHEN Kai-Ya, DENG Gao-Meng, JU Cheng. Instruction Analysis for Crypto Chip Based on Power Consumption Leakage[J]. Computer Engineering, 2011, 37(7): 130-132,135.
吴恒旭, 陈开颜, 邓高明, 邹程. 基于功耗泄漏的密码芯片指令分析[J]. 计算机工程, 2011, 37(7): 130-132,135.