TY - JOUR
T1 - 一种针对分组密码软件的 APT 后门及其防范
AU - Wang, An
AU - Dong, Yong Yin
AU - Zhu, Lie Huang
AU - Zhang, Yu
AU - Ding, Yao Ling
N1 - Publisher Copyright:
© 2021 Chinese Association for Cryptologic Research. All right reserved.
PY - 2021/2/25
Y1 - 2021/2/25
N2 - With the rapid development of computer technology and information technology, software is used everywhere. Attackers can make use of software backdoors to gain important information and resources, causing severe problems and losses. There are contradictions between the concealment and powerful function of software backdoors. Long codes and complex functionalities bring obvious features of the backdoor. This paper proposes a feasible backdoor injection scheme on the block cipher software. The proposed method is based on differential fault analysis, reverse engineering, and advanced persistent threat. By employing fault ciphertexts from active backdoor and correct ciphertexts from non-active backdoor, it is possible to recover the whole DES key by differential fault analysis. The characteristics of this backdoor include strong concealment, easy to operate, can cause big harm, etc. So, this backdoor can be used as a means of advanced persistent threat. Finally, countermeasures for this type of backdoor are given, and the problems of backdoor injection and defense are dialectically discussed.
AB - With the rapid development of computer technology and information technology, software is used everywhere. Attackers can make use of software backdoors to gain important information and resources, causing severe problems and losses. There are contradictions between the concealment and powerful function of software backdoors. Long codes and complex functionalities bring obvious features of the backdoor. This paper proposes a feasible backdoor injection scheme on the block cipher software. The proposed method is based on differential fault analysis, reverse engineering, and advanced persistent threat. By employing fault ciphertexts from active backdoor and correct ciphertexts from non-active backdoor, it is possible to recover the whole DES key by differential fault analysis. The characteristics of this backdoor include strong concealment, easy to operate, can cause big harm, etc. So, this backdoor can be used as a means of advanced persistent threat. Finally, countermeasures for this type of backdoor are given, and the problems of backdoor injection and defense are dialectically discussed.
KW - Advanced persistent threat
KW - DES algorithm
KW - Differential fault analysis
KW - Reverse analysis
KW - Software backdoor
UR - http://www.scopus.com/inward/record.url?scp=85110479183&partnerID=8YFLogxK
U2 - 10.13868/j.cnki.jcr.000420
DO - 10.13868/j.cnki.jcr.000420
M3 - 文章
AN - SCOPUS:85110479183
SN - 2095-7025
VL - 8
SP - 65
EP - 75
JO - Journal of Cryptologic Research
JF - Journal of Cryptologic Research
IS - 1
ER -