FPGA-based Trusted Platform Module Attack
-
摘要: 为测试可信计算平台的安全性,提出了一种使用现场可编程门阵列(field program gate array,FPGA)搭建监控平台,针对可信平台模块被动工作模式的特点,采用监听、篡改和伪造输入数据等手段对可信平台模块进行攻击,达到攻击可信计算平台的目的.实验结果证明,现有可信计算平台存在中间人攻击的安全隐患.
-
关键词:
- 可信计算 /
- 现场可编程门阵列(FPGA) /
- 可信平台模块(TPM) /
- 被动模式
Abstract: To test the security of trusted computing platform,a method using the field program gate array to build a monitor platform was proposed.By monitoring,tampering with and forging input data etc,this method deceived the trusted platform module(TPM) of the passive working mode,doing attacking experiments to the existing trusted platform and TPM.Result of this experiment proves that the existence of man in the middle attack in trusted platform. -
-
[1] Trusted Computing Group.TCG specification architectureoverview[EB/OL].[2011-01-15].http:∥www.trustedcomputinggroup.org/groups/TCG_1_2_Architecture_Overview.pdf.
[2] HALDERMAN Alexh J,SCHOEN Seth D,HENINGERNadia,et al.Lest we remember:cold boot attacks onencryption keys[EB/OL].[2011-01-15].http:∥citp.princeton.edu/memory/.
[3] SPARKS,EVAN R.A security assessment of trustedplatform modules[EB/OL].Dartmouth:ComputerScience Technical Report[2011-01-15].http:∥www.cs.dartmouth.edu/-pkilab/sparks/thesis.ps.
[4] Trusted Computing Group.TCG platform reset attackmitigation specification version 1[EB/OL].[2011-01-15].http:∥www.trusted-computinggroup.org/files/temp/6452209B-1D09-3519-AD815636FC36C5CF/Platform%20Reset%20Attack%20Mitigation%20Specification.pdf.
[5] KLAUS K,DRIES S,BART P.Analyzing trusted platformcommunication[EB/OL].[2011-01-15].http:∥www.cosic.esat.kuleuven.be/publications/article-591.pdf.
[6] 张涛.面向密码芯片的旁路攻击关键技术研究[D].成都:电子科技大学计算机科学与工程学院,2009.ZHANG Tao.The research on the key technologies of side-channel attack oriented to cryptographic chips[D].Chengdu:School of Computer Science and Engineering,University of Electronic Science and Technology of China,2009.(in Chinese) [7] 李海军.加密芯片的旁道攻击防御对策研究[D].哈尔滨:哈尔滨工程大学计算机科学与技术学院,2010.LI Hai-jun.Research on side channel attackcountermeasures of encryption chip[D].Harbin:Collegeof Computer Science and Technology,Harbin EngineeringUniversity,2010.(in Chinese) [8] DAVID C,KENT Y,RYAN C,et al.A practical guide totrusted computing[M].Lebanon:IBM Press,2007:1-35.
[9] Intel.Low pin count interface specification[EB/OL].[2011-01-15].http:∥www.intel.com/design/chipsets/industry/lpc.htm.
[10] 刘孜文,冯登国.基于可信计算的动态完整性度量架构[J].电子与信息学报,2010,32(4):875-879.LIU Zi-wen,FENG Deng-guo.TPM-based dynamicintegrity measurement architecture[J].Journal ofElectronics&Information Technology,2010,32(4):875-879.(in Chinese) [11] MA Xin-qiang,HUANG Yi.Trusted computing modelbased on lattice[J].Journal on Communications,2010,31(8A):105-110.
[12] 王立斌,黄征.计算机安全学导论[M].北京:电子工业出版社,2005:20-100. [13] 周巢尘.通信的顺序进程及其研究[J].计算机学报,1983(1):1-9.ZHOU Chao-chen.An applicative notation forcommunicating processes[J].Chinese Journal ofComputers,1983(1):1-9.(in Chinese) [14] 周巢尘.通信进程的确定性语义学[J].计算机学报,1983(2):81-89.ZHOU Chao-chen.A deterministic semantics ofcommunicating processes[J].Chinese Journal ofComputers,1983(2):81-89.(in Chinese) [15] 周巢尘.通信协议的设计[J].计算机学报,1983(5):321-329.ZHOU Chao-chen.A rigorous approach to the design ofprotocols[J].Chinese Journal of Computers,1983(5):321-329.(in Chinese) [16] HOARE C A R,ZHOU Chao-chen.Communicatingsequential processes[M].Beijing:Beijing PekingUniversity Press,1990:10-50.
[17] Infineon.Trusted platform module(SLB9635TT1.2)[EB/OL].[2011-01-15].http:∥www.infineon.com/cms/en/product/channel.html?channel=ff80808112ab681d0112ab6921ae011f&pt=db3a304329a0f6ee0129ac094b1e5603.
[18] Jetway.Jetway information security industry Co.Ltd.J281security chip[EB/OL].[2011-01-15].http:∥www.jetsec.com.cn.
[19] Nationz.Nationz-TC trusted platform module[EB/OL].[2011-01-15].http:∥www.nationz.com.cn/en/Solutions2.aspx?id=40.
计量
- 文章访问数: 10
- HTML全文浏览量: 0
- PDF下载量: 8