全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于FPGA的可信平台模块攻击方法

Keywords: 可信计算,现场可编程门阵列(FPGA),可信平台模块(TPM),被动模式

Full-Text   Cite this paper   Add to My Lib

Abstract:

为测试可信计算平台的安全性,提出了一种使用现场可编程门阵列(fieldprogramgatearray,FPGA)搭建监控平台,针对可信平台模块被动工作模式的特点,采用监听、篡改和伪造输入数据等手段对可信平台模块进行攻击,达到攻击可信计算平台的目的.实验结果证明,现有可信计算平台存在中间人攻击的安全隐患.

References

[1]  Trusted Computing Group.TCG specification architectureoverview[EB/OL].[2011-01-15].http:∥www.trustedcomputinggroup.org/groups/TCG_1_2_Architecture_Overview.pdf.
[2]  HALDERMAN Alexh J,SCHOEN Seth D,HENINGERNadia,et al.Lest we remember:cold boot attacks onencryption keys[EB/OL].[2011-01-15].http:∥citp.princeton.edu/memory/.
[3]  SPARKS,EVAN R.A security assessment of trustedplatform modules[EB/OL].Dartmouth:ComputerScience Technical Report[2011-01-15].http:∥www.cs.dartmouth.edu/~pkilab/sparks/thesis.ps.
[4]  Trusted Computing Group.TCG platform reset attackmitigation specification version 1[EB/OL].[2011-01-15].http:∥www.trusted-computinggroup.org/files/temp/6452209B-1D09-3519-AD815636FC36C5CF/Platform%20Reset%20Attack%20Mitigation%20Specification.pdf.
[5]  KLAUS K,DRIES S,BART P.Analyzing trusted platformcommunication[EB/OL].[2011-01-15].http:∥www.cosic.esat.kuleuven.be/publications/article-591.pdf.
[6]  张涛.面向密码芯片的旁路攻击关键技术研究[D].成都:电子科技大学计算机科学与工程学院,2009.ZHANG Tao.The research on the key technologies of side-channel attack oriented to cryptographic chips[D].Chengdu:School of Computer Science and Engineering,University of Electronic Science and Technology of China,2009.(in Chinese)
[7]  李海军.加密芯片的旁道攻击防御对策研究[D].哈尔滨:哈尔滨工程大学计算机科学与技术学院,2010.LI Hai-jun.Research on side channel attackcountermeasures of encryption chip[D].Harbin:Collegeof Computer Science and Technology,Harbin EngineeringUniversity,2010.(in Chinese)
[8]  DAVID C,KENT Y,RYAN C,et al.A practical guide totrusted computing[M].Lebanon:IBM Press,2007:1-35.
[9]  Intel.Low pin count interface specification[EB/OL].[2011-01-15].http:∥www.intel.com/design/chipsets/industry/lpc.htm.
[10]  刘孜文,冯登国.基于可信计算的动态完整性度量架构[J].电子与信息学报,2010,32(4):875-879.LIU Zi-wen,FENG Deng-guo.TPM-based dynamicintegrity measurement architecture[J].Journal ofElectronics&Information Technology,2010,32(4):875-879.(in Chinese)
[11]  MA Xin-qiang,HUANG Yi.Trusted computing modelbased on lattice[J].Journal on Communications,2010,31(8A):105-110.
[12]  王立斌,黄征.计算机安全学导论[M].北京:电子工业出版社,2005:20-100.
[13]  周巢尘.通信的顺序进程及其研究[J].计算机学报,1983(1):1-9.ZHOU Chao-chen.An applicative notation forcommunicating processes[J].Chinese Journal ofComputers,1983(1):1-9.(in Chinese)
[14]  周巢尘.通信进程的确定性语义学[J].计算机学报,1983(2):81-89.ZHOU Chao-chen.A deterministic semantics ofcommunicating processes[J].Chinese Journal ofComputers,1983(2):81-89.(in Chinese)
[15]  周巢尘.通信协议的设计[J].计算机学报,1983(5):321-329.ZHOU Chao-chen.A rigorous approach to the design ofprotocols[J].Chinese Journal of Computers,1983(5):321-329.(in Chinese)
[16]  HOARE C A R,ZHOU Chao-chen.Communicatingsequential processes[M].Beijing:Beijing PekingUniversity Press,1990:10-50.
[17]  Infineon.Trusted platform module(SLB9635TT1.2)[EB/OL].[2011-01-15].http:∥www.infineon.com/cms/en/product/channel.html?channel=ff80808112ab681d0112ab6921ae011f&pt=db3a304329a0f6ee0129ac094b1e5603.
[18]  Jetway.Jetway information security industry Co.Ltd.J281security chip[EB/OL].[2011-01-15].http:∥www.jetsec.com.cn.
[19]  Nationz.Nationz-TC trusted platform module[EB/OL].[2011-01-15].http:∥www.nationz.com.cn/en/Solutions2.aspx?id=40.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133