期刊文献+

基于ICA和SVM的FPGA电磁泄露分析

FPGA Electromagnetic Information Leakage Analysis Based on ICA and SVM
下载PDF
导出
摘要 针对FPGA在运算时会产生电磁泄露的现象,以简单逻辑运算为攻击目标,提出了一种基于支持向量机(SVM)的旁路攻击方法。通过电磁泄露信息采集平台实现电磁泄露信息的采集,以电磁泄露信息为特征信号,通过独立成分分析(ICA)对其进行特征提取。将经过ICA处理之后的信号作为新的特征向量,用已知逻辑运算情况下的样本训练多分类SVM,用训练好的多分类SVM对未知的简单逻辑运算的电磁泄漏信号进行分类。实验结果表明该方法能成功识别加、减、异或、左移、右移运算,其准确率达到了91.4%。 Aimed at the electromagnetic leakage while FPGA is executing,in this paper,the simple logic operations are considered as the attack target,and a kind of side channel analysis method is proposed based on support vector machine(SVM).Electromagnetic leakage information is captured through electromagnetic leakage information capture platform.Regard electromagnetic leakage information as characteristic signal,feature extract is accomplished by ICA which is considered as the new feature vectors.Then they are used to train by multi-class SVM combined with known classification logic operation.After that a sample of electromagnetic signal with unknown classification logic operation is classified with the trained data.The experimental results show that this method could successfully recognize addition,subtraction,exclusive OR,left shift and right shift,and the accuracy rate reaches 91.4%.
作者 米芳 张洪欣 MI Fang ZHANG Hong-xin(School of Electronic Engineering, Beijing University of Posts and Telecommunications,Beijing 100876,China)
出处 《滨州学院学报》 2017年第2期66-69,共4页 Journal of Binzhou University
基金 国家自然科学基金资助项目(61202399 61571063 61472357)
关键词 电磁泄露分析 独立成分分析 支持向量机 FPGA electromagnetic leakage analysis ICA SVM FPGA
  • 相关文献

参考文献5

二级参考文献38

  • 1尹克重,龚卫国,李伟红,梁毅雄.基于小波变换和ICA的人脸识别方法[J].仪器仪表学报,2005,26(z2):412-415. 被引量:10
  • 2许士敏,陈鹏举.频谱混叠通信信号分离方法[J].航天电子对抗,2004,33(5):53-55. 被引量:10
  • 3余晓梅,徐丹.基于外观的子空间人脸识别方法研究[J].计算机应用研究,2007,24(5):10-12. 被引量:5
  • 4Kocher P. Timing attacks on implementations of Diffie-- Hellman, RSA, DSS, and other systems [A], In Neal Koblitz, editor, Ad vances in Cryptology, Proceedings Crypto' 96, LCNS [C], New York: Springer--Verlag, 1996: 104--113.
  • 5Chari S, Rao J R, Rohatgi P. Template Attacks [A]. Burton S. Kaliski Jr. , C etin Kaya Koc, and Christof Paar, editors, Proceedings of CHES 2002 [C], LNCS, Springer, 2003: 13--28.
  • 6Archambeau C, Peeters E, Standaert F --X, et al. Quisquater. Template attacks in principal subspaces [A]. In Louis Goubin and Mitsuru Matsui, editors, Cryptographic Hardware and Embedded Systems -- CHES 2006 [C], volume 4249 of LNCS, Springer, 2006: 1--14.
  • 7Moulay Abdelaziz EL AABID, Sylvain Guilley, Philippe Hoogvorst. Template Attacks with a Power Model 2007 [EB/OL]. http: // eprint, iacr. org/2007/443.
  • 8International Eleetrotechnical Commission. IEC 61967: Integrated Circuits--Measurement of Electromagnetic Emanations, 150 kHz to 1 GHz. 2003[EB/OL], http: //www. iee. ch/.
  • 9Serway R A. Physics for scientists and engineers [M]. Saunders Golden sunburst series. Saunders college publishing, 1996.
  • 10Vapnik V. The nature of statistical learning theory [M]. New York: Springer--Verlag, 1999.

共引文献2307

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部