微控制器芯片所有活动都会在其旁路泄漏信号上留下"指纹"信息,将逆向工程思想与旁路攻击方法结合,对芯片旁路"指纹"信息进行分析,判断微控制器所执行的未知指令.针对微控制器(AT89C52)指令集构建对应不同指令的旁路模板库,对未知指令进行模板分析,通过实验验证了指令恢复的可行性,扩展了旁路攻击的研究领域.
There are different power consumption leakage characters for different instructions executed in chips,and the power consumption characters can be considered as the "finger printing" of each instruction.Taking the idea of reverse engineering,the power traces obtained from microcontroller where instructions were executed are analyzed with Side-Channel Attacks(SCA),power consumption template(finger printing) for each instruction were constructed.Then power traces obtained from an unknown microcontroller would be recognized with these side channel templates.The side channel template analysis against the instructions executed in a microcontroller(AT89C52) validated the effective of the instructions reversing.This research exploits a new application approach of SCA.