• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊

基于FPGA的可信平台模块攻击方法

李健俊, 方娟, 季琦, 刘鹏, 毛军捷, 林莉, 姜伟

李健俊, 方娟, 季琦, 刘鹏, 毛军捷, 林莉, 姜伟. 基于FPGA的可信平台模块攻击方法[J]. 北京工业大学学报, 2013, 39(1): 70-75.
引用本文: 李健俊, 方娟, 季琦, 刘鹏, 毛军捷, 林莉, 姜伟. 基于FPGA的可信平台模块攻击方法[J]. 北京工业大学学报, 2013, 39(1): 70-75.
LI Jianjun, FANG Juan, JI Qi, LIU Peng, MAO Junjie, LIN Li, JIANG Wei. FPGA-based Trusted Platform Module Attack[J]. Journal of Beijing University of Technology, 2013, 39(1): 70-75.
Citation: LI Jianjun, FANG Juan, JI Qi, LIU Peng, MAO Junjie, LIN Li, JIANG Wei. FPGA-based Trusted Platform Module Attack[J]. Journal of Beijing University of Technology, 2013, 39(1): 70-75.

基于FPGA的可信平台模块攻击方法

基金项目: 

国家“863”计划资助项目(2009AA012437)

信息网络安全公安部重点实验室开放课题资助项目(C11610)

信息安全国家重点实验室(中国科学院软件研究所)开放课题资助项目(04-04-1)

详细信息
    作者简介:

    李健俊(1970—),高级工程师,主要从事可信计算、工业信息化方面的研究,E-mail:lijj@zjtobacco.com

    通讯作者:

    姜伟(1979-),讲师,主要从事可信计算、网络与信息安全方面的研究,E-mail:j8w8@sohu.com

  • 中图分类号: TP309

FPGA-based Trusted Platform Module Attack

  • 摘要: 为测试可信计算平台的安全性,提出了一种使用现场可编程门阵列(field program gate array,FPGA)搭建监控平台,针对可信平台模块被动工作模式的特点,采用监听、篡改和伪造输入数据等手段对可信平台模块进行攻击,达到攻击可信计算平台的目的.实验结果证明,现有可信计算平台存在中间人攻击的安全隐患.
    Abstract: To test the security of trusted computing platform,a method using the field program gate array to build a monitor platform was proposed.By monitoring,tampering with and forging input data etc,this method deceived the trusted platform module(TPM) of the passive working mode,doing attacking experiments to the existing trusted platform and TPM.Result of this experiment proves that the existence of man in the middle attack in trusted platform.
  • [1]

    Trusted Computing Group.TCG specification architectureoverview[EB/OL].[2011-01-15].http:∥www.trustedcomputinggroup.org/groups/TCG_1_2_Architecture_Overview.pdf.

    [2]

    HALDERMAN Alexh J,SCHOEN Seth D,HENINGERNadia,et al.Lest we remember:cold boot attacks onencryption keys[EB/OL].[2011-01-15].http:∥citp.princeton.edu/memory/.

    [3]

    SPARKS,EVAN R.A security assessment of trustedplatform modules[EB/OL].Dartmouth:ComputerScience Technical Report[2011-01-15].http:∥www.cs.dartmouth.edu/-pkilab/sparks/thesis.ps.

    [4]

    Trusted Computing Group.TCG platform reset attackmitigation specification version 1[EB/OL].[2011-01-15].http:∥www.trusted-computinggroup.org/files/temp/6452209B-1D09-3519-AD815636FC36C5CF/Platform%20Reset%20Attack%20Mitigation%20Specification.pdf.

    [5]

    KLAUS K,DRIES S,BART P.Analyzing trusted platformcommunication[EB/OL].[2011-01-15].http:∥www.cosic.esat.kuleuven.be/publications/article-591.pdf.

    [6] 张涛.面向密码芯片的旁路攻击关键技术研究[D].成都:电子科技大学计算机科学与工程学院,2009.ZHANG Tao.The research on the key technologies of side-channel attack oriented to cryptographic chips[D].Chengdu:School of Computer Science and Engineering,University of Electronic Science and Technology of China,2009.(in Chinese)
    [7] 李海军.加密芯片的旁道攻击防御对策研究[D].哈尔滨:哈尔滨工程大学计算机科学与技术学院,2010.LI Hai-jun.Research on side channel attackcountermeasures of encryption chip[D].Harbin:Collegeof Computer Science and Technology,Harbin EngineeringUniversity,2010.(in Chinese)
    [8]

    DAVID C,KENT Y,RYAN C,et al.A practical guide totrusted computing[M].Lebanon:IBM Press,2007:1-35.

    [9]

    Intel.Low pin count interface specification[EB/OL].[2011-01-15].http:∥www.intel.com/design/chipsets/industry/lpc.htm.

    [10] 刘孜文,冯登国.基于可信计算的动态完整性度量架构[J].电子与信息学报,2010,32(4):875-879.LIU Zi-wen,FENG Deng-guo.TPM-based dynamicintegrity measurement architecture[J].Journal ofElectronics&Information Technology,2010,32(4):875-879.(in Chinese)
    [11]

    MA Xin-qiang,HUANG Yi.Trusted computing modelbased on lattice[J].Journal on Communications,2010,31(8A):105-110.

    [12] 王立斌,黄征.计算机安全学导论[M].北京:电子工业出版社,2005:20-100.
    [13] 周巢尘.通信的顺序进程及其研究[J].计算机学报,1983(1):1-9.ZHOU Chao-chen.An applicative notation forcommunicating processes[J].Chinese Journal ofComputers,1983(1):1-9.(in Chinese)
    [14] 周巢尘.通信进程的确定性语义学[J].计算机学报,1983(2):81-89.ZHOU Chao-chen.A deterministic semantics ofcommunicating processes[J].Chinese Journal ofComputers,1983(2):81-89.(in Chinese)
    [15] 周巢尘.通信协议的设计[J].计算机学报,1983(5):321-329.ZHOU Chao-chen.A rigorous approach to the design ofprotocols[J].Chinese Journal of Computers,1983(5):321-329.(in Chinese)
    [16]

    HOARE C A R,ZHOU Chao-chen.Communicatingsequential processes[M].Beijing:Beijing PekingUniversity Press,1990:10-50.

    [17]

    Infineon.Trusted platform module(SLB9635TT1.2)[EB/OL].[2011-01-15].http:∥www.infineon.com/cms/en/product/channel.html?channel=ff80808112ab681d0112ab6921ae011f&pt=db3a304329a0f6ee0129ac094b1e5603.

    [18]

    Jetway.Jetway information security industry Co.Ltd.J281security chip[EB/OL].[2011-01-15].http:∥www.jetsec.com.cn.

    [19]

    Nationz.Nationz-TC trusted platform module[EB/OL].[2011-01-15].http:∥www.nationz.com.cn/en/Solutions2.aspx?id=40.

计量
  • 文章访问数:  10
  • HTML全文浏览量:  0
  • PDF下载量:  8
  • 被引次数: 0
出版历程
  • 收稿日期:  2011-01-05
  • 网络出版日期:  2023-01-10

目录

    /

    返回文章
    返回