하드웨어 칩 기반 보안시스템 및 해킹동향

  • Published : 2014.04.30

Abstract

최근 보안기술 동향은 소프트웨어 기반 보안시스템의 한계를 보완하고자 하드웨어 기반 보안시스템으로 발전하고 있다. 그러나 이러한 하드웨어 기반 보안시스템도 부채널 공격, 메모리 공격, 버스프루빙 공격과 같은 해킹 기술에 취약하다. 본고에서는 최근 보안기술 동향을 기술하고, 하드웨어 보안시스템에 대한 해킹기술 및 이에 대한 대응책에 대하여 기술한다.

Keywords

References

  1. Trusted Computing Group(TCG),"TPM Main Part1 Design Principles Specification Version 1.2", 2011.
  2. GlobalPlatform, "TEE System Architecture", (http:// www.globalplatform.org)
  3. GlobalPlatform, "TEE Internal API Specification", (http://www. globalplatform.org)
  4. GlobalPlatform, "TEE Client API Specification", (http://www. globalplatform.org)
  5. ARM,"ARM Security Technology-Building a Secure System using TrustZone Technology", (http://in focenter.arm.com/help/topic/com.arm.doc.prd29- genc-009492c/PRD29-GENC-009492C_trustzone_ security_whitepaper.pdf)
  6. Samsung, "Samsung Knox", (https://www. samsungknox.com/ko)
  7. P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," CRYPTO '99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
  8. C. Tarnovsky, "Deconstructing a 'Secure' Processor", Black Hat, Washington DC., (www.blackhat.com)
  9. Kamal, A.A. Youssef, A.M, "An-Area-optimized Implementation for AES with Hybrid Countermeasure against Power Analysis," ISSCS 2009, pp. 1-4, 2009.
  10. M. Joye, P. Paillier, and B. Schoenmaker, "On Second-Order Differential Power Analysis," CHES 2005, LNCS 3659, pp.293-308, 2005.
  11. A. Hevia, M. Kiwi, "Strength of two data encryption standard implementations under timing attacks," ACM Trans. on Information and System Security, Vol. 2, pp.416-437, 1999. https://doi.org/10.1145/330382.330390
  12. D. D. Hwang, K. Tiri, A. Hodjat, B.-C. Lai, S. Yang, P. Schaumont, I. Verbauwhede, "AES-Based Security Coprocessor IC in 0.18-$\mu{m}$ CMOS With Resistance to Differential Power Analysis Side-Channel Attacks," IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 41, NO. 4, pp. 781-791, 2006. https://doi.org/10.1109/JSSC.2006.870913
  13. K. Lofstrom, W.R. Daasch, and D. Taylor, "IC identification circuit using device mismatch," Solid- State Circuits Conference, 2000. Digest of Technical Papers. ISSCC. 2000 IEEE International, 2000.
  14. D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, VOL. 13, 2005.
  15. J. Guajardo, S.S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," Cryptographic Hardware and Embedded Systems-CHES 2007, VOL. 4727, 2007.
  16. D. Roy, J. H. Klootwijk, N. Verhaegh, H. Roosen, and R. Wolters, "Comb capacitor structures for onchip physical uncloneable function," Semiconductor Manufacturing, IEEE Transactions on, VOL. 22, 2009.