首页> 外文会议>International Conference on Communication and Signal Processing >Attack on Trace Buffer: A Study on Observability versus Security in Post-Silicon Debug
【24h】

Attack on Trace Buffer: A Study on Observability versus Security in Post-Silicon Debug

机译:对跟踪缓冲区的攻击:后硅调试中的可观察性与安全性研究

获取原文

摘要

The standardization of AES symmetric cipher was gained by National Institute of Standard and Technology in the widespread acceptance of various protocols with an intense study from crypto analysis theoretically. It remains more vulnerable from the physical point of implementation. Till now, the attacks are made on AES through differential power analysis, fault injection, cache access timings and scan-chains. Nowadays, trace buffers are extensively used in industries for debugging. A source of information is leaked from the trace buffer so that a countermeasure is taken in this paper in the name of trace buffer attack. This type of attack is having the capability to recover keys from various implementations on AES. The result shows the comprehensive process of an attack on trace buffer and also shows how to avoid such type of attacks.
机译:AES对称密码的标准化是由美国国家标准技术研究院在各种协议的广泛接受中获得的,并且在理论上从加密分析方面进行了深入研究。从实施的物理角度来看,它仍然更加脆弱。到目前为止,攻击是通过差分功率分析,故障注入,缓存访问时序和扫描链对AES进行的。如今,跟踪缓冲区已广泛用于调试行业。信息源从跟踪缓冲区泄漏,因此本文以跟踪缓冲区攻击的名义采取了对策。这种类型的攻击具有从AES上的各种实现中恢复密钥的能力。结果显示了对跟踪缓冲区进行攻击的综合过程,还显示了如何避免此类攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号