Donanımsal Truva Atı Tespiti EtNinliN Analizi
Transkript
6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 'RQDQÕPVDO7UXYD$WÕ7HVSLWL (WNLQOLN$QDOL]L 0ùDKLQR÷OX0g]WHPUYH%6R\VDO Özet—%LOJL JYHQOL÷LQLQ VD÷ODQPDVÕ WP GQ\DGD ]HULQGH oDOÕúÕODQNULWLNELUNRQXGXU%XNRQXGDRUWD\DoÕNDQHQ|QHPOL WHKGLWOHUGHQ ELULVL GRQDQÕP \DSÕODUÕ ]HULQH WUXYD DWÕ \HUOHúWLULOPHVLGLU 6DKLS ROGX÷X NULWLN |QHP QHGHQL\OH WP GQ\DGD GRQDQÕPVDO WUXYD DWODUÕQÕQ WHVSLWLQH \|QHOLN oDOÕúPDODU \DSÕOPDNWDGÕU %X NDSVDPGD IDUNOÕ \|QWHPOHU |QHULOPHNWHGLU %X \|QWHPOHULQ IDUNOÕ DoÕODUGDQ ELUELUOHULQH NDUúÕ DYDQWDM YH GH]DYDQWDMODUÕ RODELOLU 7UXYD DWÕ WHVSLWLQGH EDúDUÕ\DXODúÕODELOPHVLLoLQEX\|QWHPOHULQJYHQOLNLKWL\DFÕQD ED÷OÕ RODUDN HWNLQ ELU úHNLOGH NXOODQÕOPDVÕ JHUHNPHNWHGLU Bu PDNDOH NDSVDPÕQGD OLWHUDWUGHNL WUXYD DWÕ WHVSLW \|QWHPOHUL anlDWÕODFDNYHELUHWNLQOLNDQDOL]L\DSÕODFDNWÕU Anahtar Kelimeler—7UXYDDWÕ$UNDNDSÕ<DQNDQDODQDOL]L 0DQWÕNVDO GDYUDQÕúWHVWL Abstract—Information security is an important subject studied on all over the world. One of the most important threats encountered in this subject is placement of trojan horse on hardware. Studies regarding the detection of trojan horse on hardware have been carried out all over the world because of its critical importance. Different methods are advised on this field. These methods may have advantages and disadvantages to each other in some terms. These methods must be used efficiently for detecting the trojan horse depending on the need of security. In the scope of this article, trojan dedection methods in literature will be explained and an efficency analyze will be presented. Keywords—Trojan horse, Backdoor, Side channel analysis, Logic test. I. *ø5øù RUVA DWÕDGÕQÕ7UR\DNHQWLQLHOHJHoLUPHNWHNXOODQÕODQ HIVDQHYL WDKWD WUXYD DWÕQGDQ DOÕU %LU DUPD÷DQ JLEL J|VWHULOHQ EX E\N DW DVOÕQGD 7UR\D VXUODUÕQÕ JHoLS 7URya NHQWLQL HOH JHoLUHFHN <XQDQ DVNHUOHULQL WDúÕPÕúWÕU <DNODúÕN \ÕO VUHQ VDYDú LOH HOH JHoLULOHPH\HQ úHKLU \NVHN JYHQOLN VD÷OD\DQ VXUODUÕQD UD÷PHQ EX DW VD\HVLQGH IHWKHGLOPLúWLU $VÕUODUVRQUDVÕQGDLVH WHNQRORMLLOHUOHPLúDQFDNJYHQOLN |QOHPOHULQL EHUWDUDI HWPHN LoLQ LQVDQR÷OX \LQH EHQ]HU \|QWHPOHUH EDúYXUPXúWXU 7UR\D DWÕ GXUXPXQD EHQ]HU VHQDU\RODU WHNQRORML UQOHUL ]HULQGH GH X\JXODQPD\D EDúODPÕúWÕU ,7 VHNW|UQGH LON NDUúÕODúÕODQ WUXYD DWÕ \ÕOÕQGD ROXúWXUXODQ 3HUYDGH-$QLPDO LVLPOL ELU \D]ÕOÕPGÕU $VOÕQGD JYHQOLN DoÕNOÕ÷Õ ROXúWXUPD\Õ DPDoODPD\DQ EX \D]ÕOÕP WLFDUL VWQON VD÷ODPDN DPDFÕ\OD ELUoRN ELOJLVD\DUDVÕ]PD\ÕEDúDUPÕúWÕU'DKD VRQUD OL \ÕOODUGD JYHQOLN LKODOOHUL ROXúWXUDQ WUXYD DWODUÕ GD SL\DVDGD \D\ÕOPD\DEDúODPÕúWÕU[1],[2]. T 0 ù 78%ø7$. %ø/*(0 6LEHU *YHQOLN (QVWLWV *HE]H .2&$(/ø 7h5.ø<( (Telefon Nu: 0262 648 10 00; fax: 0262 648 11 00; e-posta: muhammet.sahinoglu@ tubitak.gov.tr). 0 g 78%ø7$. %ø/*(0 6LEHU *YHQOLN (QVWLWV *HE]H .2&$(/ø7h5.ø<(7HOHIRQNu: 0262 648 10 00; fax: 0262 648 11 00; e-posta: muhammet.oztemur@ tubitak.gov.tr). B. S78%ø7$.%ø/*(06LEHU*YHQOLN(QVWLWV*HE]H.2&$(/ø 7h5.ø<( 7HOHIRQ 1X ID[ Hposta: betul.soysal@ tubitak.gov.tr). 20-21 September /Eylül 2013 | Ankara / TURKEY 7UXYD DWODUÕ LON DúDPDGD GDKD oRN \D]ÕOÕPD |]J ELU X\JXODPD JLEL GLNNDWH DOÕQPÕúWÕU $QFDN VRQ \ÕOODUGD GRQDQÕP \DSÕODUÕ LoLQGH WUXYD DWODUÕQÕQ FLGGL ELU WHKGLW ROXúWXUDELOHFH÷L ELOLQFL RUWD\D oÕNPÕúWÕU %X GXUXP ³GRQDQÕPVDO WUXYD DWÕ´ WHULPLnin orta\D oÕNPDVÕQD YH EX DODQGDFLGGLoDOÕúPDODU\DSÕOPDVÕQD]HPLQROXúWXUPXúWXU 'RQDQÕPVDO7UXYD$WÕ³elektronik bir devrenin içerisine, NXOODQÕFÕQÕQ LVWH÷L ROPDNVÕ]ÕQ NDVÕWOÕ RODUDN \HUOHúWLULOPLú N|WFOGHYUH\DSÕVÕ´RODUDNWDQÕPODQPDNWDGÕU[3]%X\DSÕ GHYUHQLQ QRUPDO LúOH\LúL \D GD ERúWD EHNOHPHVL HVQDVÕQGD GHYUHQLQLúOHYOHULQLGH÷LúWLUHELOLUHNVWUDELULúOHP\DSPDVÕQD sebep olabilir, hDWWD JYHQOLN PHNDQL]PDODUÕQÕ GHYUH GÕúÕ EÕUDNDELOLU%|\OHFHNULWLNYHULOHULQLúOHQPHVLQGHLOHWLPLQGH ya da VDNODQPDVÕQGD NXOODQÕODQ UQQ verileri istenmeyen WDUDIODUDVÕ]GÕUPDVÕVD÷ODQDELOLU$\UÕFDGHYUHOHULQLoHULVLQH \HUOHúWLULOHQ WUXYD DWODUÕ LOH NULWLN LúOHYOHUGH NXOODQÕOPDN ]HUH WDVDUODQDQ UQOHU SODQODQPD\DQ YH |QJ|UOHPH\HQ ELUúHNLOGHVHUYLVGÕúÕNDODELOLUOHU[3]. 7UXYD DWÕ NDYUDPÕ LOH ELU DUDGD GH÷HUOHQGLULOHQ NDYUDPODUÕQELULGHDUNDNDSÕ¶GÕU%DFNGRRURODUDNGD\D\JÕQ úHNLOGHELOLQHQDUNDNDSÕ, "bir programa, bir online sisteme veya bir bilgisayar VLVWHPLQH HULúPHN LoLQ VWDQGDUW GRNPDQODUÕQGD EHOLUWLOPH\HQ ELU |]HOOLN" demektir [4]. Arka NDSÕODU \D]ÕOÕPÕ YH\D GDKD JHQHO DQODPGD VLVWHPL meyGDQD JHWLUHQ NLúLOHU WDUDIÕQGDQ ROXúWXUXOXUODU *HQHOGH VDGHFH EX NLúLOHU WDUDIÕQGDQ ELOLQLUOHU [4] $UND NDSÕ ELU EDNÕPD WUXYD DWÕ \DSÕVÕQÕQ |]HO bir hali olarak ta GúQOHELOLU II. GERÇEK HAYATTA TRUVA ATI gRNEKLERI 'RQDQÕP \DSÕODUÕ LoHULVLQH WUXYD DWÕ YH DUND NDSÕ \HUOHúWLUPH X\JXODPDODUÕ $%'-5XV\D DUDVÕ VR÷XN VDYDú G|QHPLQH GD\DQPDNWDGÕU [5] %X G|QHPGH 5XV\D YH $%' GRQDQÕPVDO WUXYD DWÕ X\JXODPDODUÕ LOH ELUELUOHULQLQ VLQ\DOOHULQL JL]OLFH GLQOHPH\L EDúDUPÕúODUGÕU 'DKD VRQUDNL \ÕOODUGD GD $YUXSD ONHOHULQLQ 6XUL\H WDUDIÕQGDQ NXOODQÕODQ UDGDUODU ]HULQGHNL ELU LúOHPFL\H 6XUL\H¶QLQ øVUDLO¶L L]OHPHVLQL HQJHOOHPHN DPDoOÕ GRQDQÕPVDO WUXYD DWÕ \HUOHúWLUGL÷LQGHQYHEXúHNLOGHoDOÕúPDVÕQÕGXUGXUGX÷XQGDQ úSKHOHQLOPLúWLU [5]. *QP]GH GH GRQDQÕPVDO UQOHUGH WUXYD DWÕ YH DUND NDSÕ YDUOÕNODUÕ NRQXVXQGD PHG\DGD KHU JQ \HQL KDEHUOHU oÕNPDNWDGÕU gUQH÷LQ JHoWL÷LPL] JQOHUGH $YXVWXU\D *YHQOLN .XUXPX 6(& &RQVXOW %DUUDFXGD ILUPDVÕQD DLW ELUoRNUQGH GRNPDQWHHGLOPH\HQDUND NDSÕEXOXQGX÷XQX ELOGLUPLúWLU )LUPD EXQODUÕQ UHWLP DúDPDVÕQGDNL GHQH\VHO oDOÕúPDODUGDQ VRQUD XQXWXODQ |]HOOLNOHU ROGX÷XQX LGGLD HWPLú ROPDNOD EHUDEHU GROD\OÕ ELU úHNLOGH EX DUND NDSÕODUÕQ YDUOÕ÷ÕQÕ NDEXO HWPLúWLU &LKD]ODUD WDVDUÕPÕ HVQDVÕQGD J|POPú ROGX÷X LGGLD HGLOHQ EX DUND NDSÕODU FLKD] ]HULQGH NROD\FD DNWLI KDOH JHWLULOHELOHQ HN ELU \|QHWLFL KHVDEÕ úHNOLQGH WDQÕPODQPÕúWÕU 'ROD\ÕVÕ LOH EX \DSÕODU VDOGÕUJDQÕQX]DNWDQHULúLPLOH\HWNLOHQGLULOHUHND÷]HULQGHNL hassas verL\HHULúPHVLQHRODQDNVD÷ODPDNWDGÕU[6],[7]. 105 Proceedings/Bildiriler Kitabı 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE %HQ]HU ELU LGGLD GD SL\DVDGD \D\JÕQ RODUDN NXOODQÕODQ =7( YH +XDZHL KDEHUOHúPH FLKD]ODUÕ LoLQ PHYFXWWXU $PHULND dLQ PHQúHOL =7( YH +XDZHL KDEHUOHúPH FLKD]ODUÕQÕQ WUXYD DWÕ LoHUPHVL GXUXPXQD \|QHOLN ELU DUDúWÕUPD UDSRUX \D\ÕQODPÕú YH EX FLKD]ODUÕQ Nritik projeler LoHULVLQGHNXOODQÕOPDVÕQÕHQJHOOHPLúWLU[8]. %XDODQGDRUWD\DoÕNDQHQVRQJHOLúPHOHUGHQELUWDQHVLGH +3 ILUPDVÕQÕQ \D\JÕQ RODUDN NXOODQÕODQ GHSRODPD FLKD]ODUÕQGD NXOODQÕFÕODUÕQ ROXúWXUGX÷X KHVDSODU GÕúÕQGD UHWLPGHQ JHOHQ GRNPDQWH HGLOPHPLú HULúLP KDNODUÕQÕn EXOXQGX÷XQXQLWLUDIHWPHVLGLU[9]. 'RQDQÕP ED]ÕQGD ilk DUND NDSÕ tespit edilmesi ise 2012 VHQHVL\D]ÕQGDROPXúWXU6HUJHL6FRUREDJDWRYELUDVNHULoLS RODQ $&7(/ )3*$ ]HULQGH EXOGX÷X DUND NDSÕ\Õ J|VWHUPLúWLU[10]. III. DONANIMSAL TRUVA ATI TESPIT YÖNTEMLERI 'RQDQÕPVDO WUXYD DWODUÕ HOHNWURQLN VLVWHPOHULQ JYHQOL÷L LoLQ E\N ELU WHKGLW ROXúWXUGX÷XQGDQ EX \DSÕODUÕQ WHVSLWL LoLQ GH \R÷XQ ELU oDOÕúPD \DSÕOPDNWDGÕU %X oDOÕúPDODUGD NXOODQÕODQ \|QWHPOHU GXUXPD J|UH IDUNOÕOÕN J|VWHUPHNWHGLU 'RQDQÕPVDO WUXYD DWODUÕQÕQ WHVSLW HGLOPHVLQH \|QHOLN oDOÕúPDODU LQFHOHQGL÷LQGH EX \|QWHPOHULQ ùHNLO 1‘de J|UOG÷JLELVÕQÕIODQGÕUÕODELOHFH÷LGH÷HUOHQGLULOPLúWLU ùHNLO 1 'RQDQÕP \DSÕODUÕ LoLQGH WUXYD DWÕ WHVSLWL LoLQ OLWHUDWUGH WDQÕPODQPÕú\|QWHPOHULQLQVÕQÕIODQGÕUPDVÕ A. 7DKULEDWOÕ<|QWHPOH7UXYD$WÕ7HVSLWL 7UXYD DWODUÕQÕQ WHVSLW HGLOPHVLQGH DNOD LON JHOHQ \|QWHPGLU $QDOL] HGLOHFHN RODQ elektronik devrenin |QFHOLNOH VW NRUXPD NDWPDQÕ DoÕOÕU 'DKD VRQUD JHOLúPLú FLKD]ODUYHoHúLWOLNLP\DVDOODUNXOODQÕODUDNDúDPDDúDPDWP oLSNDWPDQODUÕWDUDQDUDNWHUVLQHPKHQGLVOLN\DSÕOÕU7HUVLQH PKHQGLVOLNOH HOGH HGLOHQ J|UQWOHU ELUOHúWLUHUHN oLSLQ HQ EDúWD WDVDUODQGÕ÷Õ úHNLOGH UHWLOGL÷LQH NDUDU YHULOLU 7HUVLQH PKHQGLVOLN LoLQ HQ \D\JÕQ NXOODQÕODQ WHNQLN HOHNWURQ mikroskobu ile tarama ve light-induce voltage iteration teknikleridir [14]. 7HUVLQH PKHQGLVOLN \DSDUDN WUXYD DWÕ DUDPak hem PDOL\HW KHPGH ]DPDQ DoÕVÕQGDQ oRN ]RU ELU X\JXODPDGÕU dQNGRQDQÕPVDOWUXYDDWODUÕELUPDQWÕNVDO GHYUH]HULQGH D] VD\ÕGD PDQWÕNVDO NDSÕQÕQ HNOHQPHVL NDOGÕUÕOPDVÕ YH\D PRGLIL\H HGLOPHVL VXUHWL\OH JHUoHNOHQHELOLU 2\VD PRGHUQ bir elektronik devreGH PLO\DUODU G]H\LQGH EX úHNLOGH NDSÕQÕQROPDVÕV|] NRQXVXRODELOLU%XNDGDUJHQLúELU\DSÕ LoHULVLQGHWUXYDDWÕQÕWHVSLWHWPHNVDPDQOÕNWDL÷QHDUDPDNOD HúGH÷HUELUoDOÕúPDRODELOLU[3]. %XQXQOD EHUDEHU GL÷HU ELU oRN WUXYD DWÕ WHVSLW \|QWHPL LoLQreferans olarak LKWL\DoGX\XODQJYHQLOLUGHYUHJROGHQ IC) [17] WHPLQL LoLQ WHUVLQH PKHQGLVOLN \|QWHPL NXOODQÕODELOLU Proceedings/Bildiriler Kitabı 106 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, B. 7DKULEDWVÕ]<|QWHPOH7UXYD$WÕ7HVSLWL 7DKULEDWOÕ GHYUHOHU LOH WUXYD DWÕ WHVSLWLQLQ E\N ]RUOXN LoHUPHVL WDKULEDWVÕ] \|QWHPOHUH \|QHOLN oDOÕúPDODU \DSÕOPDVÕ YH EXQODUÕQ NXOODQÕOPDVÕ VRQXFXQX GR÷XUPXúWXU 7DKULEDWVÕ] WUXYD DWÕ WHVSLW \|QWHPOHUL IDUNOÕ JUXSODUD D\UÕOPDNWDGÕU 0DQWÕNVDO 'DYUDQÕú7HVWL ,& OHULQ GDYUDQÕúVDO \DSÕODUÕQÕQ DQDOL] HGLOPHVL HVDVÕQD GD\DQÕU)RQNVL\RQHOGDYUDQÕú analizi YHJL]OL|]HOOLNWDUDPD ROPDN]HUHiki grupta incelenir. )RQNVL\RQHO 'DYUDQÕú $QDOL]L, bir elektronik devre JLULúLQHEHOOLWHVWYHNW|UOHULQLQYHULOHUHNoÕNÕúODUÕQL]OHQPHVL YH EHNOHQHQLQ GÕúÕQGD ELU oÕNÕú HOGH HGLOGL÷LQGH ELU DQRUPDOOL÷LQYDUROGX÷XQXQWHVSLWHGLOPHVLHVDVÕQDGD\DQÕU $VOÕQGD EX \|QWHP GDKD oRN IRQNVL\RQHO KDWDODUÕQ WHVSLWL LoLQ JHoHUOL ELU X\JXODPDGÕU [15]. Bununla beraber, parametrik WUXYD DWODUÕQÕQ GHYUHQLQ \DSÕVÕQÕ GH÷LúWLUHUHN WUXYD DWÕ HNOHPH WHVSLWL LoLQ GH NXOODQÕODELOLU %X WHVtlerde NXOODQÕODQ RWRPDWLN WHVW SDWHUQOHUL QRUPDOGH GHYUHGH ROPD\DQ ELU IRQNVL\RQX DNWLI HWPH \HWHQH÷LQGH ROPDGÕNODUÕQGDQ GHYUH\H HNOHPHoÕNDUPD \DSÕODUDN konulan) fonksiyonel WUXYD DWODUÕQÕQ (devreye HNOHPHoÕNDUPD \DSÕODUDN NRQXODQ WHVSLWLQGH NXOODQÕlamazlar [16]. 0DQWÕNVDO WHVW LOH WUXYD DWÕ DUDPDQÕQ HQ E\N SUREOHPL E\N elektronik devre \DSÕODUÕQHGHQL\OHWDUDQPDVÕJHUHNHQ X]D\ÕQ oRN JHQLú ROPDVÕGÕU 8]D\ÕQ EX NDGDU JHQLú ROPDVÕ WHVW YHNW|UOHUL LOH WP X]D\Õ WDUDPD\Õ QHUHGH\VH LPNDQVÕ] hale getirmektedir. gUQH÷LQ VDGHFH WULJJHU QRNWDVÕ YH SD\ORDG QRNWDVÕ RODQ ELU WUXYD DWÕ GúQOVQ NDSÕOÕ FWLSLQGHNoNELU,6&$6-85 Benchmark devresinde bu WUXYD DWÕQÕQ \HUOHúWLULOPHVL LoLQ 11 muhtemel nokta PHYFXWWXUYHWUXYDDWÕQÕWHWLNOHPHNLoLQ\DNODúÕN9 deneme \DSÕOPDVÕJHUHNLU[17]. %XNÕVÕWÕQDúÕOPDVÕLoLQED]ÕPHWRGODU|QHULOPLúWLU-KDYH -KD EX GXUXP LoLQ UDVWVDOOÕ÷D GD\DOÕ ELU \|QWHP |QHUPLúWLU [18]. 'HYUHQLQ JLULúOHULQH GH÷LúLN SDWHUQOHU X\JXODQPÕúWÕU 'HYUHQLQEXJLULúOHUHYHUGL÷LFHYDSODUDED÷OÕRODUDNGHYUH\H DLWRODVÕOÕNVDOSUREDELOLVWLFELULP]DWHVSLWHGLOPLúWLU'DKD VRQUD D\QÕ SDWHUQOHU DQDOL] HGLOHQ GHYUHOHUH X\JXODQPÕúWÕU 'HYUHOHULQ GDYUDQÕúODUÕ GDKD |QFH HOGH HGLOHQ RODVÕOÕNVDO LP]DGH÷HULLOHNDUúÕODúWÕUÕOPÕúWÕU(÷HUELUIDUNOÕOÕNYDUVDEX GHYUHOHULQWUXYDDWOÕROGX÷XVRQXFXQDYDUÕOPÕúWÕU :ROI YH DUNDGDúODUÕ WUXYD DWÕ WHVSLWL LoLQ GHYUH ]HULQGH QDGLU RODUDN DNWLI RODQ DODQODUD \R÷XQODúPÕúODUGÕU Nadir RODUDN DNWLI RODQ E|OJHOHUL WHWLNOH\HQ WHVW YHNW|UOHUL UHWLOHUHN elektronik devreQLQ GDYUDQÕúÕ J|]OHPOHQPLúWLU [19]. &KDFNUDERUW\ YH DUNDGDúODUÕ GD EHQ]HU ELU \|QWHPOH WUXYDDWÕWHVSLWLQLQHWNLQOL÷LQLDUWÕUPD\DoDOÕúPÕúODUGÕU [20]. *L]OL g]HOOLN 7DUDPD, aQDOL] HGLOHQ \DSÕQÕQ WDQÕPOÕ ROPD\DQ |]HOOLNOHULQLQ WHVSLW HGLOPHVL HVDVÕQD GD\DQÕU Bu NRQX LOH LOJLOL ELU oDOÕúPD 6NRURERJDWRY YH :RRGV tarafÕQGDQ JHUoHNOHQPLúWLU [10] %X oDOÕúPDQÕQ OLWHUDWUGHNL GL÷HUGRQDQÕPVDOWUXYDDWÕWHVSLWLoDOÕúPDODUÕQGDQ|QHPOLELU IDUNÕ JHUoHN ELU GRQDQÕP ]HULQGH JHUoHNOHúWLULOPLú ROPDVÕGÕU Analiz edilen HOHPDQ $&7(/ ILUPDVÕQD DLW 3UR$VLF WLSL )3*$ HOHPDQÕGÕU dDOÕúPD NDSVDPÕQGD DUDúWÕUPDFÕODU DQDOL] HGLOHQ )3*$ HOHPDQÕQÕQ -7$* DUD\]QH \R÷XQODúPÕúODUGÕU %X DUD\] DUDFÕOÕ÷Õ LOH )3*$ H UQ GRNPDQÕQGD WDQÕPOÕ ROPD\DQ NRPXWODU 20-21 September /Eylül 2013 | Ankara / TURKEY 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE J|QGHUHUHN D\QÕ ]DPDQGD HOHPDQÕQ oHNWL÷L JF GLQOHPLúOHUGLU dHNLOHQ JFQ DQDOL]LQGHQ -7$* DUD\]QGH WDQÕPOÕROPD\DQED]ÕEDúND NRPXWODUÕQYDUOÕ÷QÕ WHVSLW HWPLúOHUGLU %X NRPXWODUÕQ ELULQLQ NXOODQÕOPDN LoLQ ELWX]XQOX÷XQGDELUYHULWDOHSHWWL÷LQLWHVSLWHWPLúOHUGLU *HOLúPLú \DQ NDQDO DQDOL] WHNQLNOHUL NXOODQDUDN ELW X]XQOX÷XQGDNL EX GH÷HU HOGH HGLOPLúWLU Bu anahtar NXOODQÕOGÕ÷ÕQGDoLSWHWDQÕPOÕROPDGÕ÷ÕEHOLUWLOHQJHULRNXQPD |]HOOL÷LQLQ DNWLI ROGX÷X WHVSLW HGLOPLúWLU $\UÕFD oLS |]HOOLNOHULQGH ³GH÷LúPH]´ olarak belirtLOHQ ED]Õ NRQILJUDV\RQ E|OJHOHULQLQ SURJUDPODQDELOLU KDOH JHOGL÷L WHVSLWHGLOPLúWLU Yan Kanal Analizi 7UXYD DWÕQÕQ WHVSLW HGLOPHVLQGH GHYUHOHULQ oDOÕúPDVÕ HVQDVÕQGDLVWHPVL]RODUDN\D\GÕNODUÕ\DQNDQDOELOJLOHULQGHQ ID\GDODQÕOÕU %X \DQ NDQDO ELOJLVL GHYUHQLQ Jo-DNÕP WNHWLPL HOHNWURPDJQHWLN \D\ÕQÕPÕ oDOÕúPD IUHNDQVÕ oDOÕúPD]DPDQÕGH÷HUOHULRODELOLU<DQNDQDODQDOL]LLOHWUXYD DWÕ WHVSLWLQGH WHPHO \DNODúÕP RODUDN JYHQLOLU GHYUH\H ait \XNDUÕGD |UQHNOHUL YHULOHQ \DQ NDQDO YHULOHUL |OoOHUHN ELU kDUDNWHULVWLNoÕNDUÕOÕU'DKDVRQUDDQDOL]HGLOHFHNGHYUHOHULQ \DQNDQDOELOJLOHULQHED÷OÕNDUDNWUHULVWLNOHULRUMLQDOGHYUHLOH NDUúÕODúWÕUÕODUDNWUXYDDWÕQÕQROXSROPDGÕ÷ÕQDNDUDUYHULOLU <DQ NDQDO DQDOL]L LOH \DSÕODQ WUXYD DWÕ WHVSLW oDOÕúPDODUÕ kullanÕODQ\DQNDQDOSDUDPHWUHVLQHJ|UHVÕQÕIODQGÕUÕODELOLU *o 7DEDQOÕ $QDOL] WUXYD DWÕ WHVSLWLQGH \DQ NDQDO SDUDPHWUHVLRODUDNJFNXOODQÕU $JUDZDO YH DUNDGDúODUÕQÕQ \DSWÕNODUÕ oDOÕúPD WUXYD DWÕ tespitinde JF YH GROD\ÕVÕ\OD yan kanal bilgisini kullanan LON oDOÕúPDGÕU [11] dDOÕúPDGD |QFHOLNOH UDVWJHOH VHoLOPLú bir grup elektronik devre\HUDVWJHOHJLULúYHULOHULYHULOPLúYH GHYUHOHULQ Jo |OoPOHUL DOÕQPÕúWÕU. %X Jo WNHWLPL GH÷HUOHUL ELU LP]D GH÷HUL ILQJHUSULQW RODUDN NDEXO HGLOPLúWLU *HULGH NDODQ GHYUHOHUH D\QÕ UDVWJHOH YHULOHU X\JXODQDUDN Jo |OoP DOPÕúODUGÕU (OGH HGLOHQ GH÷HUOHUL JYHQLOLUGHYUH\HDLWLP]DGH÷HULLOHNDUúÕODúWÕUPÕúODUGÕU Yan kanal aQDOL]L LOH WUXYD DWÕ WHVSLWLQGH HQ |QHPOL SUREOHPOHUGHQ ELUL UHWLP VDoÕOPDVÕQGDQ ND\QDNODQDQ LúOHPJUOWOHULQLQ (process variation) devredeki yan kanal parametrelerini etkilemesidir. Bu paraPHWUHOHUGH \DúDQDQ GH÷LúLPOHU WUXYD DWODUÕQÕQ GHYUH\H NDWDFD÷Õ \DQ NDQDO GH÷HUOHULQLQ PDVNHOHQPHVLQH QHGHQ ROPDNWDGÕU [26]. Bu da |]HOOLNOH NoN WUXYD DWODUÕQÕQ WHVSLW HGilmesine engel ROXúWXUPDNWDGÕU 5DG YH DUNDGDúODUÕ WDUDIÕQGDQ SURFHVV GH÷LúNHQOHULQLQGHYUH\HHWNLVLQLD]DOWPDNLoLQGHYUH\HE|OJH WDEDQOÕ WUDQVLHQW SRZHU VLJQDO DQDOL]L \DSÕOPDVÕ |QHULOPLúWLU[22]. Banga ve Hsiao [24]¶GH WUXYD DWÕQÕQ KDUFDGÕ÷Õ JFQ GHYUHQLQ WRSODP Jo WNHWLPLQGH IDUN HGLOHELOLU KDOH JHOPHVLQL VD÷ODPDN LoLQ E|OJH WDEDQOÕ WUXYD DWÕ WHVSLW \|QWHPLQL |QHUPLúWLU Yine Banga ve Hsiao [25]¶GD WUXYD DWÕQÕQKDUFDGÕ÷ÕJFQGHYUHQLQWRSODPJoWNHWLPLQGH fark HGLOHELOLU KDOH JHOPHVLQL VD÷ODPDN LoLQ JHoLú VD\ÕVÕ minimizasyonu WRJJOHPLQLPL]DWLRQ\|QWHPLQL|QHUPLúWLU *HoLú VD\ÕVÕ PLQLPL]DV\RQ \|QWHPLQGH WUXYD DWÕQÕQ oHNWL÷L Jo VDELW NDOÕUNHQ GHYUHQLQ oHNWL÷L WRSODP JF D]DOWPDN KHGHIOHQPLúWLU Alkabani [26]¶GD WUXYD DWÕQÕQ WHVSLWLQLQ KDVVDVL\HWLQL DUWÕUPDNLoLQWXWDUOÕOÕNWDEDQOÕNDSÕVHYL\HVLNDUDNWHUL]DV\RQX \|QWHPLQL |QHUPLúWLU $ONDEDQL oDOÕúPDVÕQGD WXWDUOÕOÕN 20-21 September /Eylül 2013 | Ankara / TURKEY 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, PHWUL÷LRODUDNGHYUHQLQJHUoHNJo|OoPOHULLOHVLPODV\RQ \ROX\OD HOGH HGLOPLú Jo |OoPOHULQLQ |OoHNOHPH GH÷HULQLQ DUDVÕQGDNL IDUNÕ NXOODQPÕúWÕU gOoHNOHPH GH÷HUL NDSÕQÕQ JHUoHN Jo |OoP GH÷HULQL KHVDSODUNHQ PDWHPDWLNVHO LúOHPOHUOe HOGH HGLOHQ Jo |OoPQQ LúOHP SURFHVV JUOWVQGHQND\QDNOÕoDUSÕOPDVÕJHUHNHQVDELWGH÷HULGLU 5HHFH \DQ NDQDO DQDOL]L LOH 7UXYD DWÕ WHVSLWLQGH \D\JÕQ RODUDNLKWL\DoGX\XODQJYHQLOLUGHYUH NXOODQÕOPDGDQ7UXYD DWÕ WHVSLWL \DSDQ ELU \DSÕ |QHUPLúWLU [29],[30]. Elektronik devre WDVDUÕPÕQGD NXOODQÕODQ 3URFHVV 'HYHORSPHQW .LW LOH elektronik devreQLQ LúOHP JUOWV (process variation) ile HWNLOHQPH\HFHN SDUDPHWUHOHUL LoLQ GHYUH\H DLW ELU LP]D oÕNDUÕOPÕúWÕU %XQXQ LoLQ elektronik devre\H IDUNOÕ YROWDM beslemeleri verilirken elektronik devre ]HULQGH LNL QRNWD DUDVÕQGDROXúDQDNÕPGH÷HUOHULGLNNDWHDOÕQPÕúWÕU *o DQDOL]L LOH 7UXYD DWÕ WHVSLWLQGH VRQXo DOÕQPDVÕ LoLQ GHYUHGHQ DOÕQDQ Jo LúDUHWOHULQLQ LúOHQPHVL |QHP kazanmaktDGÕU /LWHUDWUGH EX NDSVDPGD DúD÷ÕGDNL JLEL oDOÕúPDODU\DSÕOPÕúWÕU %DNWLU YH DUNDGDúODUÕ VLPODV\RQ RUWDPÕQGD JHUoHNOHGLNOHUL GHYUHGHQ WDQHVLQH 7UXYD DWÕ \HUOHúWLUPLúOHUGLU [31] 'DKD VRQUD 7UXYD DWÕ ROPD\DQ GHYUHOHU LoLQ HOGH HGLOHQ Jo LúDUHWOHUL LOH WUXYD DWÕ LoHUHQ GHYUHOHULoLQHOGHHGLOHQJoLúDUHWOHULQLNDUúÕODúWÕUPÕúODUGÕU *o LúDUHWOHUL LoLQ NODVLN \|QWHPOH ]DPDQ X]D\ÕQGD NDUúÕODúWÕUPD \DSÕOGÕ÷ÕQGD VRQXo DOÕQDPDPÕúWÕU %XQXQOD beraber, Discrete Waveleth Transform, Spektogram ve 1HXUDO 1HWZRUN NXOODQÕODUDN LúDUHWOHU LúOHQGL÷LQGH WUXYD DWODUÕQÕQWHVSLWHGLOGL÷LJ|VWHULOPLúWLU /*ZRQYHDUNDGDúODUÕ',6752<DGÕQÕYHUGLNOHULELUWHVW RUWDPÕ\OD HWNLQ VLQ\DO DQDOL]L LoHUHQ ELU \|QWHP |QHUPLúOHUGLU [33],[34] dDOÕúPDODUÕQGD JHQHO RODUDN VLPODV\RQ RUWDPÕQGDQ HOGH HWWLNOHUL Jo |OoPOHUL LOH JHUoHN GHYUHGHQ DOGÕNODUÕ Jo |OoPOHULQL NDUúÕODúWÕUDUDN WUXYD DWÕQÕ WHVSLW HWPLúOHUGLU gOoPOHULQ NDUúÕODúWÕUÕOPDVÕ |QFHVLQGH Jo |OoPOHULQLQ LúDUHWLQ IDUNOÕ |]HOOLNOHU ED] DOÕQDUDN VÕNÕúWÕUÕOPDVÕ HVDVÕQD GD\DQDQ FRPSUHVVLYH VHQVLQJ LúOHPLQL X\JXODPÕúODUGÕU &RPSUHVVLYH VHQVLQJ \|QWHPL LOH \|QWHPLQ NXOODQÕOPDGÕ÷Õ VLVWHPH RUDQOD NDW GDKD KÕ]OÕ YH NDW GDKD D] |OoP DQDOL] HGLOHUHN WUXYD DWÕWHVSLWHGLOPLúWLU $6,& VLVWHPOHU LoLQ \DSÕODQ oDOÕúPDODU LoLQ $6,& PRGOOHULQL WHPLQ HWPH ]RUOX÷X DUDúWÕUPDFÕODUÕ VLPODV\RQ ]HULQGH oDOÕúPD\D \|QHOWPLúWLU 2\VD EX oDOÕúPDODUÕQ EDúDUÕVÕQÕQ GH÷HUOHQGLULOPHVL LoLQ JHUoHN GHYUHOHU ]HULQGH X\JXODPDODU \DSÕOPDVÕ |QHPOLGLU %X GXUXP DUDúWÕUPDFÕODUÕ $6,& \DSÕVÕQÕQ ELU EHQ]HUL RODUDN NDEXO HGLOHQ )3*$ HOHPDQODUÕ]HULQGHoDOÕúPDODU\DSPD\D\|QHOWPLúWLU :DQJ YH /XR 6SDUWDQ( )3*$ ]HULQGH '(6 DOJRULWPDVÕJHUoHNOH\HUHNSUDWLNRODUDN7UXYDDWÕ\HUOHúWLUPH YHEXOPDoDOÕúPDVÕ\DSPÕúODUGÕU[35]. Zaman 7DEDQOÕ $QDOL] LOH WUXYD DWÕ WHVSLWL \DSÕOPDVÕQGD \XNDUÕGD DQODWÕODQ Jo WNHWLPL \HULQH ]DPDQ JHFLNPHOHUL NXOODQÕOÕU -LQ YH 0DUNLV oLS ]HULQGH \HU DODQ NDSÕODU DUDVÕ JHFLNPHOHUL |OoHUHN WUXYD DWÕ WHVSLWL \|QWHPL |QHUPLúOHUGLU [36] gQHUGLNOHUL \|QWHPGH |QFHOLNOH JYHQLOLU WDVDUÕP ]HULQGHQ NDSÕ JHFLNPHOHUL |OoOHUHN EX GH÷HUOHU ELU LP]D ILQJHUSULQW RODUDN NDEXO HGLOPLúWLU $\QÕ \|QWHPOH GH÷HUOHQGLULOHQ KHUELUGHYUHLoLQNDUDNWHULVWLNoÕNDUÕOPÕúWÕU 'H÷HUOHQGLULOHQ GHYUHOHULQ NDUDNWHULVWLNOHUL JYHQLOLU GHYUH 107 Proceedings/Bildiriler Kitabı 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE LOH NDUúÕODúWÕUÕODUDN WUXYD DWÕ ROXS ROPDGÕ÷ÕQD NDUDU YHULOPLúWLU :HL YH DUNDGDúODUÕ WUXYD DWÕ WHVSLW HWPHN LoLQ ]DPDQ JHFLNPHOHULQL NXOODQDQ \|QWHPOHULQ HQ E\N VÕNÕQWÕVÕ RODQ SDUDOHO \ROODU SUREOHPLQLQ o|]PQGH LoHUHQ ELU \|QWHP |QHUPLúOHUGLU [37]. =LUD ]DPDQ JHFLNPHVLQH EDNÕODFDN NÕVPÕQ JLULúL LOH oÕNÕúÕ DUDVÕQGD ELUGHQ ID]OD \RO olabilmektedir UHFRQYHUJHQW SDWK dDOÕúPDGD EX \ROODUD WHVW QRNWDVÕ (D Flip flop) eklenerek ve oradan zaman JHFLNPHVLQL |OoHUHN SDUDOHO \RO SUREOHPL RUWDGDQ NDOGÕUÕOPÕúWÕU <DQ NDQDO DQDOL]L LOH WUXYD DWÕ WHVSLWLQGH NXOODQÕODQ ELU \|QWHP GH ELUGHQ ID]OD \DQ NDQDO SDUDPHWUHVLQLQ ELUOLNWH NXOODQÕOPDVÕGÕU dRN 3arametreli Analiz olarak bilinen bu \|QWHPNDSVDPÕQGDDúD÷ÕGDNLoDOÕúPDODU\DSÕOPÕúWÕU 1DUDVLQKDP YH DUNDGDúODUÕ VLPODV\RQ RUWDPÕQGD YH VRQUDVÕQGD )3*$ NXOODQDUDN GLQDPLN DNÕP (IDDT) ve oDOÕúPD IUHNDQVÕQÕQ PDNVLPXP GH÷HULQL (Fmax) birlikte NXOODQDUDN WUXYD DWÕ WHVSLW HWPH \|QWHPLQL |QHUPLúOHUGLU [12]. IDDT ve Fmax LoLQ ELU H÷UL ROXúWXUXOPXú YH H÷ULGHQ IDUNOÕODúDQ GH÷HUOHU LoLQ WUXYD DWÕ WHVSLW HGLOPLúWLU 1DUDVLPKDP YH DUNDGDúODUÕ [13]¶WH GH D\QÕ \|ntemle truva DWÕ WHVSLWL ]HULQGH oDOÕúPÕúODUGÕU $QFDN EX \|QWHPGH HN RODUDN WUXYD DWÕQÕ WHVSLW HWPH KDVVDVL\HWLQL DUWÕUPDN LoLQ SRZHU JDWLQJ YH RSHUDQG LVRODWLRQ \|QWHPLQL NXOODQPÕúODUGÕU %X \|QWHP GHYUHQLQ DQDOL] HGLOHQ NÕVPÕ aktif iken geriye kalDQ NÕVÕPODUÕQÕQ SDVLI KDOH JHWLULOPHVL HVDVÕQDGD\DQÕU 3RWNRQMDNYH DUNDGDúODUÕ .DSÕVHYL\HVLNDUHNWHUL]DV\RQX *DWH /HYHO &KDUDFWHUL]DWLRQ LOH WUXYD DWÕ WHVSLWLQL |QHUPLúOHUGLU[27].DUDNWHUL]DV\RQXQoÕNDUÕOPDVÕQGDVWDWLN JoWNHWLPLYH]DPDQJHFLNPHVLQLNXOODQPÕúODUGÕU 'HYUHQLQ NRQWURO HGLOHELOLU NDSÕ VD\ÕVÕQÕ DUWÕUPDN YH NDUDNWHULVWL÷L oÕNDUÕODQ NDSÕ VD\ÕVÕQÕ DUWÕUPDN LoLQ :HL [28]¶GH VÕFDNOÕN L\LOHúWLUPHVLQL |QHUPLúWLU %LU NDSÕQÕQ VÕFDNOÕ÷ÕQÕ DUWÕUPDN LoLQ GÕúDUÕGDQ ELU VLVWHP LOH ÕVÕWPDN \HULQH NDSÕODUÕQ - JHoLúOHUL LOH GR÷DO \ROGDQ VD÷ODQDQ VÕFDNOÕNDUWÕPÕQÕNXOODQPÕúWÕU 7DVDUÕPGD(NOHQHQ<DSÕODUøOH7UXYD$WÕ7HVSLWL %X \|QWHPOH 7UXYD DWÕ WHVSLWLQGH elektronik devrenin UHWLOPHVLQGHQ|QFHGHYUH\HWUXYDDWÕHNOHQPHVLGXUXPXQGD EXQXDQOD\DQELU\DSÕHNOHQLUBu yapÕoR÷X]DPDQELUGHYUH YH\D GHYUH SDUoDVÕGÕU /LWHUDWUGH 'HVLJQ IRU +DGZDUH 7UXVW RODUDN GD ELOLQLU %X \|QWHPLQ WDVDUÕPD KDNLP ROXQPDVÕ GXUXPXQGD X\JXODQDELOHQ ELU \|QWHP ROGX÷X V|\OHQHELOLU 'ROD\ÕVÕ\OD $6,& GHYUHOHU ]HULQGH uygulanabilir. Ancak araúWÕUPD oDOÕúPDODUÕQGD $6,& UHWPHQLQ ]RUOX÷X QHGHQL\OH GHQH\VHO RODUDN )3*$ ]HULQGHGHX\JXODQGÕ÷ÕJ|UOPHNWHGLU ChacraboW\YHDUNDGDúODUÕPDQWÕNVDO test kullanarak truva DWÕQÕQ HNOHQPHVLQL WHVSLW HGHQ ELU \DSÕ |QHUPLúOHUGLU [38]. %XQXQLoLQGHYUH\HELUWHVWORML÷LYH,2SRUWODUÕHNOHQLUdLS normal mod ve saydam mod (transparent mod) ROPDN]HUH PRGX LoHULU dLSLQ saydam PRGGD ROGX÷X GXUXPODUda GHYUHQLQELULP]DGH÷HULUHWHUHNoÕNÕúÕQDYHUPHVLVD÷ODQÕU 7HVW LúOHPL GDKD |QFH WDQÕPODQPÕú DQDKWDU EHQ]HUL ELU SDWHUQLQ GHYUH\H YHULOPHVL LOH EDúODU 7UXYD DWODUÕQÕQ GHYUHOHULQ HQ D] DNWLI RODQ NÕVÕPODUÕQD \HUOHúWLULOHFH÷L YDUVD\ÕPÕQGDQ KDUHNHWOH WUXYD DWÕQÕQ WHVSLWLQL VD÷OD\DQ kontrol devrelerinin de devrelerin en az aktif olan bu Proceedings/Bildiriler Kitabı 108 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, NÕVÕPODUÕQÕ J|]OHPOHPHVL JHUHNLU 9HULOHQ EDúODQJÕo GH÷HUL LOH NRQWURO GHYUHVLQLQ J|]OHPOHGL÷L GH÷HUOHUGH EHNOHQHQ GH÷HUOHUGHQ LP]D IDUNOÕ ELU GH÷HU WHVSLW HGLOPHVL KDlinde WUXYD DWÕQÕQ YDUOÕ÷Õ WHVSLW HGLOLU %X \|QWHPGH GHYUH\H NRQWUROGHYUHOHULQHGHQL\OHHNWDVDUÕPDODQÕYHNDUPDúÕNOÕ÷Õ ROXúPDVÕHQ|QHPOLGH]DYDQWDMGÕU %X \DSÕGDQ GDKD NDUPDúÕN DQFDN GDKD HWNLQ ELU |QOH\LFL WUXYD DWÕ WHVSLW \|QWHPL $EURPLFL YH %UDGDOH\ WDUDIÕQGDQ |QHULOPLúWLU[39]. Elektronik devre LoLQHGHYUHQLQoDOÕúPDVÕ HVQDVÕQGD JHUoHN ]DPDQOÕ NRQWURO \DSDUDN WUXYD DWÕQÕ WHVSLW eden bir NRQWURO ORML÷L HNOHQPHNWHGLU '()(1&( '(VLJQFor_ENabling-Security) PDQWÕNVDO RODUDNGDELOLQHQ\DSÕQÕQ HQ|QHPOL|]HOOL÷L elektronik devreQLQUHWLOPHVLQGHQVRQUD SURJUDPODQDELOPHHVQHNOL÷LQHVDKLSROPDVÕGÕU 6HOPDQLYHDUNDGDúODUÕ[15] ve [40]'de, fonksiyonel Truva DWÕGHYUHOHULQGHNLJHoLúROD\ODUÕQÕQRODVÕOÕ÷ÕQÕQDUWÕUÕOPDVÕQD GD\DQDQELU\|QWHP|QHUPLúOHUGLU'DKDVRQUDEXJHoLúOHULQ UHWLOPH ]DPDQODUÕ DQDOL] HGLOPLúWLU <|QWHPGH |QFHOLNOH JHRPHWULN GD÷ÕOÕP \|QWHPL\OH GHYUH ]HULQGHNL \ROODUGD JHoLú RODVÕOÕNODUÕ KHVDSODQÕU [40] 'DKD VRQUD EHOOL ELU HúLN GH÷HULDOWÕQGDJHoLúRODVÕOÕ÷ÕRODQ\ROODU]HULQHGXPP\IOLS IORSODU \HUOHúWLULOLU %X \|QWHPOH WUXYD DWODUÕQÕQ VDNODQPD LKWLPDOLQLQ \NVHN ROGX÷X GHYUHQLQ D] DNWLI RODQ E|OJHOHULQGHDNWLYDV\RQRUDQÕQÕQDUWÕUÕOPDVÕKHGHIOHQPLúWLU Bu metodun daha uygulanabilir bir benzeri Li ve Lach WDUDIÕQGDQ |QHULOPLúWLU [41] %X PHWRWWD oLSH \D]PDoODU YH NDSÕODU HNOHQHUHN \D]PDoWDQ \D]PDFD JHFLNPHOHU |OoOPúWU 5HHFH YH DUNDGDúODUÕ [29] ve [32]¶GH )3*$ ]HULQGH EHOOL QRNWDODUD ULQJ RVLODW|UOHU NR\DUDN HN ELU PGDKDOH\DSÕOGÕ÷ÕQGD EX RVLODW|UOHULQ IUHNDQVODUÕQGDNL GH÷LúLPH J|UH 7UXYD DWÕ WHVSLWL \DSDQ ELU \|QWHP |QHUPLúOHUGLU =KDQJ YH 7HKUDQLSRRU EX ILNUL GDKD LOHUL G]H\GH X\JXOD\DQ ELU oDOÕúPD \DSPÕúODUGÕU [42]. Elektronik devre ]HULQH ELUELUOHUL LOH ED÷OÕ ULQJ RVLODW|U QHWZRUN NR\XS PXKWHPHO ELU WURMHQL EX RVLODW|UOHUGHNL GH÷LúLPGHQ WHVSLW HWPH\HoDOÕúPÕúODUGÕU )HUUDLXROR YH DUNDGDúODUÕ [43] GH D\QÕ \|QWHPL QP WHQRORMLVLQGH JHUoHNOHQPLú $6,& GHYUHOHU ]HULQGH DQDOL] HWPLúWLU Banga ve Hsiao, elektronik devre ]HULQGH \HU DODQ PDQWÕNVDO NDSÕODUÕQ EDúND NDSÕODU LOH JHUoHNOHQHELOPH DYDQWDMÕQGDQ ID\GDODQDQ ELU \|QWHP |QHUPLúWLU [44]. Bu \|QWHPGH GH DPDo WUXYD DWODUÕQÕQ GDKD D] DNWLI olan QRNWDODUD NRQXOPDVÕ YDUVD\ÕPÕQD NDUúÕQ EX QRNWDODUGDNL DNWLYDV\RQ RUDQÕQÕ \NVHOWPHNWLU %X DPDoOD JLULúOHULQGHNL GH÷LúLPGHQ GDKD D] HWNLOHQHQ PDQWÕNVDO NDSÕODU GDKD ID]OD etkilenen PDQWÕNVDO NDSÕODUODGH÷LúWLULOPLúWLU %HQ]HU PDQWÕNVDO WHPHOH GD\DQDQ ELU oDOÕúPD $ONDEDQL WDUDIÕQGDQJHUoHNOHúWLULOPLúWLU [45]7UXYDDWÕQÕWHVSLWHWPHN LoLQ GHYUHQLQ GXDO¶L\OH D\QÕ GHYUHQLQ Hú GH÷HULQLQ GL÷HU manWÕNVDO NDSÕODUOD JHUoHNOHQPLú KDOL EHUDEHU GH÷HUOHQGLUPHVLQGHQ \ROD oÕNPÕúODUGÕU $\UÕFD JHQHOOLNOH WUXYD DWÕ HNOHQHQ ELU GHYUHGH WUXYD DWÕQÕQ WHWLNOHQPHVL LoLQ QDGLUJHUoHNOHúHQELUJLULúGH÷HULQLQ VHoLOHFH÷L YDUVD\ÕPÕGD WHPHO DOÕQPÕúWÕU %X DPDoOD WUXYD DWÕ WHVSLWL LoLQ GHYUHQLQ QDGLU DNWLI RODQ E|OJHOHUL LoLQ NDSÕODU VHYL\HVLQGH GXDOL DOÕQPÕúWÕU %X úHNLOGH 7UXYD DWODUÕQD DLW JLULú nadir JHUoHNOHúPH GXUXPX VÕN JHUoHNOHúPH GXUXPXQD G|QPú ROPDNWDGÕU%|\OHOLNOHWUXYDDWÕWHVSLWLoLQWUXYDDWÕQÕQoR÷X 20-21 September /Eylül 2013 | Ankara / TURKEY 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE gLULú YHNW|UQQ GHYUH\H JLUGL÷L ELU GHYUH HOGH HGLOPLú ROPDNWDGÕU /DPHFK YH DUNDGDúODUÕ \RO JHFLNPHOHULQGHQ WUXYD DWÕQÕ WHVSLW HWPHN LoLQ 5(%(/ 5HJLRQDO 'HOD\ %HYDYLRU LVLPOL J|PO WHVW \DSÕVÕQÕ |QHUPLúOHUGLU [46] 7UXYD DWÕ RODUDN \ROODUDNDSDVLWH\DGDNDSÕ\HUOHúWLUPLúOHUGLU IV. SONUÇ /LWHUDWUGH GRQDQÕPVDO WUXYD DWODUÕQÕQ WHVSLWLQH \|QHOLN X\ODQDQ \|QWHPOHU HWNLQOLN DoÕVÕQGDQ IDUNOÕOÕN J|VWHUPHNWHGLU 8\JXODQDQ \|QWHPOHU YH EXQODUÕQ HWNLQOL÷L Tablo-1¶GH|]HWOHQPLúWLU7DEORGD\|QWHPOHUHLOLúNLQWPDOW NÕUÕOÕPODUÕQ J|VWHULOPHVL \HULQH HWNLQOLN DoÕVÕQGDQ ELUELUL\OH IDUNOÕOÕN ROXúWXUDFDN NDGDU VW VHYL\H RODQ EDúOÕNODU J|VWHULOPLúWLU <|QWHPOHULQ HWNLQOLNOHUL DOW\DSÕ LKWL\DFÕ PDOL\HW X\JXODPD ]DPDQÕ EDúDUÕ úDQVÕ YH X\JXODQDELOHFHN UQNDSVDPODUÕGLNNDWHDOÕQDUDNincelenmektedir. TABLO I TESPIT YÖNTEMLERI ETKINLIK ANALIZI y|QWHPLQH LKWL\Do GX\XOPDNWDGÕU gUQH÷LQ KDNNÕQGD KLoELU |Q ELOJL EXOXQPD\DQ ELU HOHNWURQLN ELOHúHQ YH\D VRQ UQ ]HULQGH WUXYD DWÕ DUDQPDVÕQD LON RODUDN PDQWÕNVDO GDYUDQÕú WHVWLLOHEDúODQDELOLU%XJHQLúNDSVDPÕ QHGHQL\OH PDQWÕNVDO GDYUDQÕú WHVWLQLQ HWNLQ ELU \|QWHP ROGX÷X GH÷HUOHQGLULOPHNWHGLU <DQ NDQDO DQDOL]L \|QWHPL DOW\DSÕ ]DPDQ YH PDOL\HW DoÕVÕQGDQDYDQWDMOÕELUVLVWHPGLU8\JXODPDNDSVDPÕRODUDN GDELUoRN\DSÕLoLQNDSVD\ÕFÕGXUXPGDGÕU$\UÕFDPDQWÕNVDO GDYUDQÕú WHVWL YH WDVDUÕPGD |QOHP DOPD \|QWHPOHUL LoLQ GH \DUGÕPFÕ ELU DQDOL] WUGU 7P EXQODUOD EHUDEHU EDúDUÕ úDQVÕQÕQ GD GúN ROPDPDVÕ EX \|QWHPL úX DQ OLWDUDWUGH WDQÕPOÕ GRQDQÕPVDO WUXYD DWÕ WHVSLW \|QWHPOHUL DUDVÕQGD HQ HWNLQ\|QWHPKDOLQHJHWLUPLúWLU KAYNAKLAR [1] [2] [3] [4] [5] 7DKULEDWOÕ \|QWHPOH GRQDQÕPVDO WUXYD DWÕ WHVSLWL KHU QH NDGDUEDúDUÕúDQVÕ\NVHNROVDGD (tespit sonunda somut bir NDQÕWDXODúÕOPÕúROVDGD ELUoRNGH]DYDQWDMLoHUPHNWHGLU%X \|QWHPLoLQLKWL\DoGX\XODQDOW\DSÕ]DPDQYH PDOL\HWoRN ID]ODGÕU YH JHOLúWLULOHQ DOW\DSÕ YH ND]DQÕODQ \HWHQHN LOH oDOÕúPD\ÕWHNUDUODPDNKHUVHIHULQGH\HQLGHQ\NVHNPDOL\HW YH ]DPDQ JHUHNWLUHFHNWLU $\UÕFD WHUVLQH PKHQGLVOLN oDOÕúPDVÕ DQFDN ELU UHIHUDQV QRNWDVÕ RODUDN VHULP OD\RXW ELOJLVL JLEL NULWLN WDVDUÕP YHULOHULQH VDKLS RODQ $6,& X\JXODPDODULoLQJHUoHNOHQPH\HX\JXQGXU Bu nedenlerden dola\Õ OLWHUDWUGH HWNLQ ELU GRQDQÕPVDO WUXYD DWÕ WHVSLW \|QWHPLRODUDN|QHULOPHPHNWHGLU 7DKULEDWVÕ] \|QWHPOHULQ HWNLQOL÷LQL IDUNOÕ DOW EDúOÕNODU DOWÕQGD LQFHOHPHN X\JXQ RODFDNWÕU 7DVDUÕPGD NRQWURO GHYUHVL HNOH\HUHN WUXYD DWÕQÕQ WHVSLW HGLOPHVL GH WDKULEDWOÕ WHUVLQHPKHQGLVOLN\|QWHPLNDGDUROPDVDGDDOW\DSÕ]DPDQ YH PDOL\HW DoÕVÕQGDQ GH]DYDQWDMD VDKLSWLU +HU GHYUH LoLQ \HQLGHQ WDVDUÕP \DSÕOPDVÕ JHUHNHFH÷L YH \LQH NRQWURO GHYUHVLQLQ \HU NDSODPDVÕ VRUXQX WHNUDU HGHFH÷L LoLQ EX \|QWHPLQ \HWHQHN ND]DQÕPÕVRQUDVÕQGD \LQH ]RUOX÷XGHYDP HWPHNWHGLU 8\JXODPD DODQÕGD $6,& \DSÕODUÕ LOH VÕQÕUOÕGÕU <|QWHPLQ JHWLUGL÷L \NOHULQ WDKULSOL \|QWHP NDGDU ID]OD ROPDPDVÕ YH $6,& \DSÕODUÕ LoLQ EDúDUÕ úDQVÕQÕQ \NVHN ROPDVÕEX\|QWHPLQOLWHUDWUGH|]HOOLNOH$6,&\DSÕODUÕLoin HWNLQ VD\ÕODELOHFHN ELU \|QWHP RODUDN NDEXO HGLOPHVLQL VD÷ODPÕúWÕU 0DQWÕNVDO GDYUDQÕú WHVWL DOW \DSÕ ]DPDQ YH PDOL\HW DoÕVÕQGDQ DYDQWDMOÕ ELU VLVWHPGLU $VOÕQGD IRQNVL\RQHO ER]XNOXNODU LoLQ |]HOOHúPLú EX \|QWHPLQ EDúDUÕ úDQVÕQÕQ GD GúN ROGX÷X J|UOmektedir. Bu durum WUXYD DWODUÕQÕQ IRQNVL\RQ ER]XNOXNODUÕ LOH NROD\FD IDUNHGLOHPH\HFH÷L YDUVD\ÕPÕQD GD\DQPDNWDGÕU $QFDN EX \|QWHPLQ GL÷HU WP \|QWHPOHUH J|UH oRN E\N ELU DYDQWDMÕ PHYFXWWXU 'L÷HU \|QWHPOHULQ KLoELULQLQ oDOÕúPDGÕ÷Õ QRNWDODUGD EX WHVSLW 20-21 September /Eylül 2013 | Ankara / TURKEY [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] K. Jurgen : Selbstreproduktion bei programmen' (VX heavens) Vx.netlux.org. http://vx.netlux.org/lib/mjk00.html. Retrieved 201007-10., "Fred Cohen 1984 "Computer Viruses – Theory and Experiments". Eecs.umich.edu. 1983-11-03. http://www.eecs.umich.edu/%7Eaprakash/eecs588/handouts/cohenviruses.html. Retrieved 2012-03-29., Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. M. Beaumont, B. Hopkins, Newby T.: Hardware Trojans – Prevention, Detection, Countermeasures (A Literature Review), Defence Science and Technology Organisation (2011) http://www.webopedia.com/TERM/B/backdoor.html T. Huffmire, C. Irvine, T. D. Nguyen , T. Levin, R. Kastner: Handbook of FPGA Design Security, Springer (2010). http://isc.sans.edu/diary/Barracuda+Back+Door+/15004 https://www.seconsult.com/fxdata/seccons/prod/temedia/advisories_t xt/20130124-0_Barracuda_Appliances_Backdoor_wo_poc_v10.txt http://intelligence.house.gov/sites/intelligence.house.gov/files/docume nts/Huawei-ZTE%20Investigative%20Report%20(FINAL).pdf http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_ storage_vuln/ S. Skorobogatov, C. Woods : Breakthrough silicon scanning discovers backdoor in military chip. Cryptographic Hardware and Embedded Systems Workshop - CHESS (2012). D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar: Trojan GHWHFWLRQ XVLQJ LF ¿QJHUSULQWLQJ ,((( 6\PSRVLXP RQ 6HFXULW\ DQG Privacy. (2007). S. Narasimhan, D. Du, R. S. Chakraborty, S. Paul, F. Wolff : Multiple-Parameter Side-Channel Analysis: A Non-Invasive Hardware Trojan Detection Approach. IEEE (2010) S. Narasimhan, D. Du, R. S. Chakraborty, S. Paul, F. Wolff, C. Papachristou, K. Roy, S. Bhunia: Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis. IEEE Transaction on Computers. (2012) B. Sanno: Detecting Hardware Trojans. Ruhr-University Bochum, Germany. (2009). H. Salmani, M.Tehranipoor, J. Plusquellic: A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. IEEE Transaction on very large Scale Integration (VLSI) Systems, VOL. 20, NO. 1. (2012). X. Wang, M. Tehranipoor, J. Plusquellic: Detect-ing Malicious Inclusions in Secure Hardware, Challenges and Solutions. 1st IEEE International Workshop on Hardware-Oriented Security and Trust HOST'08. (2008). R. S. Chakraborty, S. Narasimhan, S. Bhunia: Hardware trojan: Threats and emerging solutions. (2010). S. Jha, S. K. Jha: Randomization based probabilistic approach to detect trojan circuits. High-Assurance Systems Engineering, IEEE International Symposium on 0, 117–124. (2008). F. Wolff, C. Papachristou, S. Bhunia, R. S. Chakraborty: Towards Trojan-Free Trustedelektronik devres: Problem Analysis and Detection Scheme. European Design and Automation Association EDAA. (2008). R. S. Chakraborty, F. G. Wollf, S. Paul, C. A. Papachristou, S. Bhunia: Mero: A statistical approach for hardware trojan detection. Cryptographic Hardware and Embedded Systems Workshop - CHESS (2009). 109 Proceedings/Bildiriler Kitabı 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE [21] M. Tehranipoor, F. Koushanfar: A survey of hardware trojan taxonomy and detection, IEEE Design and Test of Computers 27, 10– 25. (2010) [22] R. Rad, J. Plusquellic, M. Tehranipoor: Sensitivity analysis to hardware trojans using power supply transient signals. IEEE International Symposium on HardwareOriented Security and Trust. (2008) [23] R. M. Rad, X. Wang, M. Tehranipoor, J. Plusquellic: Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans. IEEE (2008) [24] M. Banga, M. Hsiao: A Region Based Approach for the Identification of Hardware Trojans. Proc. IEEE Int’l Workshop Hardware-Oriented Security and Trust - HOST (2008) [25] M. Banga, M. Hsiao: A Novel Sustained Vector Technique for the Detection of Hardware Trojans. Proc. 22nd Int’l Conf. VLSI Design, IEEE CS Press, pp. 327-332. (2009) [26] Y. Alkabani, F. Koushanfar: Consistency-Based Characterization for IC Trojan Detection. Proc. IEEE/ ACM Int’l Conf. Computer-Aided Design - ICCAD (2009) [27] M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey: ‘Hardware Trojan Horse Detection Using Gate-Level Characterization. Proc. 46th Design Automation Conf - DAC (2009) [28] S. Wei, S. Meguerdichian, M. Potkonjak: Malicious Circuitry Detection Using Thermal Conditioning. IEEE Transaction on very large Scale Integration (VLSI) Systems. VOL. 6, NO. 3. (2011) [29] T. Reece: Detection of Malicious Hardware Integrated Circuits and Field Programmable Gate Arrays. Submitted to the Faculty of the Graduate School of Vanderbilt University. (2009) [30] T. Reece, W. H. Robinson, B. L. Bhuva: Signature-based detection of hardware trojans with voltage stepping. Governmental Microcircuit Applications and Critical Technology - GOMACTech (2010) [31] S. Baktir, 7*oOR÷OX, A. Özmen: Detection of Trojans in Integrated Circuits. IEEE (2012) [32] T. Reece, W. H. Robinson: Hardware Trojans: The Defense and Attack of Integrated Circuits. IEEE (2011) [33] Y. L. Gwon, H. T. Kung, D. Vlah: DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements. Harvard University. (2011) [34] Y. Tsaiy, K. Huangy, H. T. Kung, D. Vlah, Y. L. Gwon, L. Cheny: A Chip Architecture for Compressive Sensing Based Detection of IC Trojans. Harvard University. (2012). [35] L. Wang, H. Luo: A Power Analysis Based Approach to Detect Trojan Circuits. IEEE (2011) [36] Y. Jin, Y. Makris: Hardware trojan detection using path delay ¿QJHUSULQW ,((( ,QWHUQDWLRQDO 6\PSRVLXP RQ +DUGZDUH-Oriented Security and Trust. (2008) [37] S. Weiy, K. Liz, F. Koushanfarz, M. Potkonjaky: Provably Complete Hardware Trojan Detection Using Test Point Insertion. IEEE/ACM International Conference on Computer-Aided Design - ICCAD (2012) [38] R. S. Chakraborty, S. Paul, S. Bhunia: On Demand Transparency for Improving Hardware Trojan DeWHFWDELOLW\3URF,(((,QW¶O:RUNVKRS Hardware Oriented Security and Trust - HOST (2008). [39] M. Abramovici, P. Bradley: Integrated Circuit Security: New Threats and Solutions. Proc. 5th Ann. Workshop Cyber Security and Information Intelligence Research: Cyber Security and Information Challenges and Strategies - CSIIRW (2009). [40] H. Salmani, M. Tehranipoor, J. Plusquellic: New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. IEEE (2009) [41] J. Li, J. Lach: At-speed delay characterization for ic authentication and trojan horse detection. Hardware-Oriented Security and Trust HOST (2008). [42] X. Zhang, M. Tehranipoor: RON: An On-Chip Ring Oscillator Network for Hardware Trojan Detection. European Design and Automation Association - EDAA. (2011) [43] A. Ferraiuolo, X. Zhang, M. Tehranipoor: Experimental Analysis of a Ring Oscillator Network for Hardware Trojan Detection in a 90nm ASIC [44] M. Banga, M. Hsiao: VITAMIN: Voltage InversionTechnique to AscertaLQ0DOLFLRXV,QVHUWLRQLQ,&V3URFQG,(((,QW¶O:RUNVKRS Hardware-Oriented Security and Trust - HOST (2009) [45] Y. Alkabani: Trojan Immune Circuits Using Duality. 15th Euromicro Conference on Digital System Design. (2012) [46] C. Lamech, J. Plusquellic: Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure. Univercity of New Mexico. (2012) 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, OLVDQV GHUHFHOHULQL DOGÕ GDQ LWLEDUHQ *HE]H <NVHN 7HNQRORML (QVWLWVQGH (OHNWURQLN 0KHQGLVOL÷L E|OPQGH 'RNWRUD SURJUDPÕQD devam etmektedir. Genel oDOÕúPD DODQÕ NULSWRORML ROPDNOD ELUOLNWH |]HO oDOÕúPDDODQÕNULSWRJUDILNVLVWHPOHUH\DSÕODQJYHQOLNGH÷HUOHQGLUPHOHULGLU /LVDQV |÷UHQLPL VÕUDVÕQGD VÕUDVÕ LOH VWDMODUÕQÕ D\ VUHFHN úHNLOGH 757 Radyo (Harbiye - ø67$1%8/ 1(7$ù hPUDQL\H - ø67$1%8/ YH $5d(/ø. $ù GH dD\ÕURYD - .2&$(/ø \DSPÕúWÕU <NVHN /LVDQV WH] oDOÕúPDODUÕVÕUDVÕQGDø7h GH-\ÕOODUÕDUDVÕQGDDUDúWÕUPDSHUVRQHOL RODUDN oDOÕúPÕúWÕU \ÕOÕQGDQ LWLEDUHQ 7h%ø7$.-%ø/*(0 6LEHU *YHQOLN(QVWLWVQGH*HE]H- .2&$(/øoDOÕúPDNWDGÕU M. Öztemür 6DPVXQ XQ dDUúDPED LOoHVLQGH \ÕOÕQGD GQ\D\D JHOGL GH 6DPVXQ %DIUD /LVHVL QGHQ PH]XQ ROGX YH GH <ÕOGÕ] 7HNQLN hQLYHUVLWHVL (OHNWURQLN YH +DEHUOHúPH 0KHQGLVOL÷L E|OPQGHQ OLVDQVYH\NVHNOLVDQVGHUHFHOHULQLDOGÕ*HQHOoDOÕúPDDODQÕUQJYHQOL÷L YH J|PO VLVWHPOHU ROPDNOD ELUOLNWH |]HO oDOÕúPD DODQÕ NULSWRJUDILN VLVWHPOHUH\DSÕODQJYHQOLNGH÷HUOHQGLUPHOHULGLU /LVDQV|÷UHQLPLVÕUDVÕQGDVÕUDVÕLOHVWDMODUÕQÕD\VUHFHNúHNLOGH Siemens (Kartal - ø67$1%8/ $.%ø/ Otomasyon hPUDQL\H - ø67$1%8/ \DSPÕúWÕU7h%ø7$.EQ\HVLQGHoDOÕúPDXDEDúODPDGDQ|QFH\ÕOÕQGD ELU G|QHP 1(7$ù WD GRQDQÕP WDVDUÕP PKHQGLVL RODUDN oDOÕúPÕúWÕU 2009 \ÕOÕQGDQLWLEDUHQ7h%ø7$.-%ø/*(06LEHU*YHQOLN(QVWLWVQGH*HE]H - .2&$(/øoDOÕúPDNWDGÕU B. Soysal $QNDUD GD\ÕOÕQGDGR÷GX GHdDQNÕUÕ)HQ/LVHVL QGHQ PH]XQ ROGX GD 2UWDGR÷X 7HNQLN hQLYHUVLWHVL YH GD %R÷D]LoL hQLYHUVLWHVL (OHNWULN (OHNWURQLN 0KHQGLVOL÷LQGHQ OLVDQV YH \NVHN OLVDQV GHUHFHOHULQL DOGÕ GDQ LWLEDUHQ %R÷D]LoL hQLYHUVLWHVL (OHNWULN (OHNWURQLN 0KHQGLVOL÷L E|OPQGH 'RNWRUD SURJUDPÕQD GHYDP HWPHNWHGLU *HQHO oDOÕúPD DODQÕ NULSWRORML ROPDNOD ELUOLNWH |]HO oDOÕúPD DODQÕNULSWRJUDILN VLVWHPOHUH \DSÕODQ JYHQOLN GH÷HUOHQGLUPHOHULGLU Lisans |÷UHQLPL VÕUDVÕQGD VÕUDVÕ LOH VWDMODUÕQÕ D\ VUHFHN úHNLOGH 7h%ø7$.%ø/7(1 2'7h - ANAKRA), ASELSAN (0DFXQN|\ - ANAKRA) ve Turkcell $ù GH 6|÷W|] - ANAKRA \DSPÕúWÕU 5 \ÕOÕQGDQ LWLEDUHQ $6(/6$1$ù GH|QFH\ÕOVUHLOHDGD\PKHQGLVRODUDNGDKDVRQUDda D\ VUH LOH PKHQGLV RODUDN oDOÕúPÕúWÕU 2007'den beri Siber Güvenlik (QVWLWVQGH*HE]H- .2&$(/øoDOÕúPDNWDGÕU M. Sahinoglu ,VSDUWD QÕQ 6HQLUNHQW LOoHVLQGH \ÕOÕQGD GQ\D\D JHOGL 2001'de Isparta Fen Lisesi'nden mezun oldu YH GD øVWDQEXO 7HNQLNhQLYHUVLWHVL(OHNWURQLN0KHQGLVOL÷LE|OPQGHQOLVDQVYH\NVHN Proceedings/Bildiriler Kitabı 110 20-21 September /Eylül 2013 | Ankara / TURKEY
Benzer belgeler
Pdf Görüntüle
6FKUH\HU \DSWÕ÷Õ oDOÕúPDGD %ø7¶LQ oÕNWÕ E\PHVLQH \DSWÕ÷Õ NDWNÕODUÕ *
ONHOHUL ED]ÕQGD LQFHOHPLúWLU dDOÕúPDQÕQ VRQXFXQD J|UH * ONHOHULQGH %ø7
\DWÕUÕPODUÕHNRQRPLN...
Yalın Veri Ambarı Modeli - CEUR
NDWHJRUL]HHGLOPLúYHNDWHJRUL]DV\RQVRQXFXQGDELUWDQÕPVLVWHPLNXUXOGX÷XWDNGLUGH
UDSRU JHOLúWLUPH VUHoOHULQGH YH UDSRUXQ FDQOÕGD VRQ NXOODQÕFÕ\D DoÕOPDVÕ VUHFLQGH
oRNFLGGLND]DQÕP...
Siber Saldırı Hedefleri ve TürNiye`de Siber GüvenliN Stratejisi
KHGHI DODQ ELU \D]ÕOÕP VDOGÕUÕVÕ JHUoHNOHúWLULOPLú YH KDIWD
VUH\OH øQJLOL] .UDOL\HW 'RQDQPDVÕQÕQ SHUVRQHOL VLVWHPOHU
]HULQH NLúLVHO HULúLPOHULQL VD÷OD\DPDPÕúWÕU
HA03 - Mühendislik Fakültesi
+DVDU DQDOL]L LQFHOHPHVLQH WkEL WXWXODQ PDO]HPHOHU NXPODPD PDNLQDVÕQD DLW ³FKDLQ OLQN´ DGÕ YHULOHQ
SDUoDODUGÕU 3DUoDQÕQ JHQHO J|UQP ùHNLO ¶GH YHULOPLúWLU .XPODPD PDNLQDVÕ...
AES BloN Şifresinin Anahtar Genişletme Rutininin Geliştirilmesi ve
YHUVL\RQODUÕQGDNL DQDKWDU SODQODPD DOJRULWPDVÕQÕQ$(6-128
(128-ELWDQDKWDUNXOODQDQ$(6EORNúLIUHVLYHUVL\RQXQDJ|UH
GDKD \DYDú \D\ÕOÕP |]HOOL÷L VD÷ODPDVÕ RODUDN YHULOHELOLU
$\UÕFD ]...
Özgün Bir Şifreleme Algoritması Kullanan Güvenli E
Herhangi bir e-SRVWD VXQXFX\D ED÷ODQÕUNHQ QRUPDO ELU
TCP/IP ED÷ODQWÕVÕ \DSÕOPDNWDGÕU 323 LOH LOJLOL JHUHNOL
DNS Güçlendirme Saldırısı RisN Analizi
7/¶ye ve \DSÕODQ LúOHP PLNWDUÕQÕQ GD PLO\RQX EXOPDVÕ
beklenmektedir [2]. 'Q\DQÕQ GL÷HU ONHOHULQGH GH ,78
(International Telecommunication Union) verilerinHJ|UH
PLO\DU NLúLQL...
Pinnacle Brochure
0úWHULOHULPL]H GHWD\OÕ PDOL\HW DQDOL] VUHFL YH SL\DVD o|]POHPHOHUL LoLQ EHOLUOL ELU PDOL\HW
PRGHOLQH HULúLP LPNkQÕ VD÷ODQPDNWDGÕU7P +D¿I dHOLN
GenetiN Algoritma ve TeNil Değer Ayrışımı Tabanlı Yeni Bir Kırılgan
3UR$VLF WLSL )3*$ HOHPDQÕGÕU dDOÕúPD NDSVDPÕQGD
DUDúWÕUPDFÕODU DQDOL] HGLOHQ )3*$ HOHPDQÕQÕQ -7$*
DUD\]QH \R÷XQODúPÕúODUGÕU %X DUD\] DUDFÕOÕ÷Õ LOH