• 一种针对AES密码芯片的相关功耗分析方法

    Subjects: Information Science and Systems Science >> Basic Disciplines of Information Science and Systems Science submitted time 2023-02-14 Cooperative journals: 《桂林电子科技大学学报》

    Abstract: Aiming at the influence of the noise and other factors in the process of classical correlation power analysis, based
    on the linear correlation between Hamming weight and power traces, a correlation power analysis method for AES cryptographic
    chip is proposed. According to the uneven distribution of the median Hamming weight of the S-box output of the
    cryptographic algorithm, a set of plaintexts with strong correlation with the power traces is obtained by filtering the correct
    keys and the wrong keys by using the discrimination ratio. In the stage of key recovery, the leakage points of the first two
    S-boxes are found by observing this set of plaintext inputs, and the leakage intervals of the remaining 14 S-boxes are found
    one by one by using the separate guessing method, so that the key information of the remaining bytes can be captured without
    traversing all power traces. The experimental analysis of AT89S52 chip shows that the proposed method can correctly
    recover the one-byte key of AES with 90% success rate by using only 9 plaintexts and corresponding power traces, and the
    computational complexity is only 4.1% of the classical correlation power analysis, which significantly improves the efficiency
    of the correlation power analysis.

  • 基于自动机的Java信息流分析

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-20 Cooperative journals: 《计算机应用研究》

    Abstract: Existing Java-oriented information flow analysis works do not compatible with current systems due to the modifying of the compiler or run-time execution environment. At the same time, they also lack of formal analysis and security proof. First, this paper proposed a formal Java-oriented information flow analysis method based on finite state automata. It abstracted the taint value space of entire program variables into the state space of automata and transferred the Java bytecode instructions into the state transition actions of automata. Then, it given the information flow security rules of state machine conversion and proved the noninterference security property under these rules. Finally, it implemented the prototype system named IF-JVM by using the static taint track instruction inserting and dynamic taint tracking technologies. IF-JVM is independent of the customer operating system. Neither needs to get the source code of Java application, nor needs to modify the Java compiler or run-time execution environment. The experimental results show that the IF-JVM is an accurate system that tracking and controlling information flow for the Java with the 53.1% overhead on performance.