Donanımsal Truva Atı Tespiti EtNinliN Analizi

Transkript

Donanımsal Truva Atı Tespiti EtNinliN Analizi
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
'RQDQÕPVDO7UXYD$WÕ7HVSLWL (WNLQOLN$QDOL]L
0ùDKLQR÷OX0g]WHPUYH%6R\VDO
Özet—%LOJL JYHQOL÷LQLQ VD÷ODQPDVÕ WP GQ\DGD ]HULQGH
oDOÕúÕODQNULWLNELUNRQXGXU%XNRQXGDRUWD\DoÕNDQHQ|QHPOL
WHKGLWOHUGHQ ELULVL GRQDQÕP \DSÕODUÕ ]HULQH WUXYD DWÕ
\HUOHúWLULOPHVLGLU 6DKLS ROGX÷X NULWLN |QHP QHGHQL\OH WP
GQ\DGD GRQDQÕPVDO WUXYD DWODUÕQÕQ WHVSLWLQH \|QHOLN
oDOÕúPDODU \DSÕOPDNWDGÕU %X NDSVDPGD IDUNOÕ \|QWHPOHU
|QHULOPHNWHGLU %X \|QWHPOHULQ IDUNOÕ DoÕODUGDQ ELUELUOHULQH
NDUúÕ DYDQWDM YH GH]DYDQWDMODUÕ RODELOLU 7UXYD DWÕ WHVSLWLQGH
EDúDUÕ\DXODúÕODELOPHVLLoLQEX\|QWHPOHULQJYHQOLNLKWL\DFÕQD
ED÷OÕ RODUDN HWNLQ ELU úHNLOGH NXOODQÕOPDVÕ JHUHNPHNWHGLU Bu
PDNDOH NDSVDPÕQGD OLWHUDWUGHNL WUXYD DWÕ WHVSLW \|QWHPOHUL
anlDWÕODFDNYHELUHWNLQOLNDQDOL]L\DSÕODFDNWÕU
Anahtar Kelimeler—7UXYDDWÕ$UNDNDSÕ<DQNDQDODQDOL]L
0DQWÕNVDO GDYUDQÕúWHVWL
Abstract—Information security is an important subject
studied on all over the world. One of the most important
threats encountered in this subject is placement of trojan horse
on hardware. Studies regarding the detection of trojan horse
on hardware have been carried out all over the world because
of its critical importance. Different methods are advised on this
field. These methods may have advantages and disadvantages
to each other in some terms. These methods must be used
efficiently for detecting the trojan horse depending on the need
of security. In the scope of this article, trojan dedection
methods in literature will be explained and an efficency
analyze will be presented.
Keywords—Trojan horse, Backdoor, Side channel analysis,
Logic test.
I. *ø5øù
RUVA DWÕDGÕQÕ7UR\DNHQWLQLHOHJHoLUPHNWHNXOODQÕODQ
HIVDQHYL WDKWD WUXYD DWÕQGDQ DOÕU %LU DUPD÷DQ JLEL
J|VWHULOHQ EX E\N DW DVOÕQGD 7UR\D VXUODUÕQÕ JHoLS 7URya
NHQWLQL HOH JHoLUHFHN <XQDQ DVNHUOHULQL WDúÕPÕúWÕU <DNODúÕN
\ÕO VUHQ VDYDú LOH HOH JHoLULOHPH\HQ úHKLU \NVHN
JYHQOLN VD÷OD\DQ VXUODUÕQD UD÷PHQ EX DW VD\HVLQGH
IHWKHGLOPLúWLU
$VÕUODUVRQUDVÕQGDLVH WHNQRORMLLOHUOHPLúDQFDNJYHQOLN
|QOHPOHULQL EHUWDUDI HWPHN LoLQ LQVDQR÷OX \LQH EHQ]HU
\|QWHPOHUH EDúYXUPXúWXU 7UR\D DWÕ GXUXPXQD EHQ]HU
VHQDU\RODU WHNQRORML UQOHUL ]HULQGH GH X\JXODQPD\D
EDúODPÕúWÕU ,7 VHNW|UQGH LON NDUúÕODúÕODQ WUXYD DWÕ \ÕOÕQGD ROXúWXUXODQ 3HUYDGH-$QLPDO LVLPOL ELU \D]ÕOÕPGÕU
$VOÕQGD JYHQOLN DoÕNOÕ÷Õ ROXúWXUPD\Õ DPDoODPD\DQ EX
\D]ÕOÕP WLFDUL VWQON VD÷ODPDN DPDFÕ\OD ELUoRN
ELOJLVD\DUDVÕ]PD\ÕEDúDUPÕúWÕU'DKD VRQUD OL \ÕOODUGD
JYHQOLN LKODOOHUL ROXúWXUDQ WUXYD DWODUÕ GD SL\DVDGD
\D\ÕOPD\DEDúODPÕúWÕU[1],[2].
T
0 ù 78%ø7$. %ø/*(0 6LEHU *YHQOLN (QVWLWV *HE]H
.2&$(/ø 7h5.ø<( (Telefon Nu: 0262 648 10 00; fax: 0262 648
11 00; e-posta: muhammet.sahinoglu@ tubitak.gov.tr).
0 g 78%ø7$. %ø/*(0 6LEHU *YHQOLN (QVWLWV *HE]H
.2&$(/ø7h5.ø<(7HOHIRQNu: 0262 648 10 00; fax: 0262 648
11 00; e-posta: muhammet.oztemur@ tubitak.gov.tr).
B. S78%ø7$.%ø/*(06LEHU*YHQOLN(QVWLWV*HE]H.2&$(/ø
7h5.ø<( 7HOHIRQ 1X ID[ Hposta: betul.soysal@ tubitak.gov.tr).
20-21 September /Eylül 2013 | Ankara / TURKEY
7UXYD DWODUÕ LON DúDPDGD GDKD oRN \D]ÕOÕPD |]J ELU
X\JXODPD JLEL GLNNDWH DOÕQPÕúWÕU $QFDN VRQ \ÕOODUGD
GRQDQÕP \DSÕODUÕ LoLQGH WUXYD DWODUÕQÕQ FLGGL ELU WHKGLW
ROXúWXUDELOHFH÷L ELOLQFL RUWD\D oÕNPÕúWÕU %X GXUXP
³GRQDQÕPVDO WUXYD DWÕ´ WHULPLnin orta\D oÕNPDVÕQD YH EX
DODQGDFLGGLoDOÕúPDODU\DSÕOPDVÕQD]HPLQROXúWXUPXúWXU
'RQDQÕPVDO7UXYD$WÕ³elektronik bir devrenin içerisine,
NXOODQÕFÕQÕQ LVWH÷L ROPDNVÕ]ÕQ NDVÕWOÕ RODUDN \HUOHúWLULOPLú
N|WFOGHYUH\DSÕVÕ´RODUDNWDQÕPODQPDNWDGÕU[3]%X\DSÕ
GHYUHQLQ QRUPDO LúOH\LúL \D GD ERúWD EHNOHPHVL HVQDVÕQGD
GHYUHQLQLúOHYOHULQLGH÷LúWLUHELOLUHNVWUDELULúOHP\DSPDVÕQD
sebep olabilir, hDWWD JYHQOLN PHNDQL]PDODUÕQÕ GHYUH GÕúÕ
EÕUDNDELOLU%|\OHFHNULWLNYHULOHULQLúOHQPHVLQGHLOHWLPLQGH
ya da VDNODQPDVÕQGD NXOODQÕODQ UQQ verileri istenmeyen
WDUDIODUDVÕ]GÕUPDVÕVD÷ODQDELOLU$\UÕFDGHYUHOHULQLoHULVLQH
\HUOHúWLULOHQ WUXYD DWODUÕ LOH NULWLN LúOHYOHUGH NXOODQÕOPDN
]HUH WDVDUODQDQ UQOHU SODQODQPD\DQ YH |QJ|UOHPH\HQ
ELUúHNLOGHVHUYLVGÕúÕNDODELOLUOHU[3].
7UXYD DWÕ NDYUDPÕ LOH ELU DUDGD GH÷HUOHQGLULOHQ
NDYUDPODUÕQELULGHDUNDNDSÕ¶GÕU%DFNGRRURODUDNGD\D\JÕQ
úHNLOGHELOLQHQDUNDNDSÕ, "bir programa, bir online sisteme
veya bir bilgisayar VLVWHPLQH HULúPHN LoLQ VWDQGDUW
GRNPDQODUÕQGD EHOLUWLOPH\HQ ELU |]HOOLN" demektir [4].
Arka NDSÕODU \D]ÕOÕPÕ YH\D GDKD JHQHO DQODPGD VLVWHPL
meyGDQD JHWLUHQ NLúLOHU WDUDIÕQGDQ ROXúWXUXOXUODU *HQHOGH
VDGHFH EX NLúLOHU WDUDIÕQGDQ ELOLQLUOHU [4] $UND NDSÕ ELU
EDNÕPD WUXYD DWÕ \DSÕVÕQÕQ |]HO bir hali olarak ta
GúQOHELOLU
II. GERÇEK HAYATTA TRUVA ATI gRNEKLERI
'RQDQÕP \DSÕODUÕ LoHULVLQH WUXYD DWÕ YH DUND NDSÕ
\HUOHúWLUPH X\JXODPDODUÕ $%'-5XV\D DUDVÕ VR÷XN VDYDú
G|QHPLQH GD\DQPDNWDGÕU [5] %X G|QHPGH 5XV\D YH $%'
GRQDQÕPVDO WUXYD DWÕ X\JXODPDODUÕ LOH ELUELUOHULQLQ
VLQ\DOOHULQL JL]OLFH GLQOHPH\L EDúDUPÕúODUGÕU 'DKD VRQUDNL
\ÕOODUGD GD $YUXSD ONHOHULQLQ 6XUL\H WDUDIÕQGDQ NXOODQÕODQ
UDGDUODU ]HULQGHNL ELU LúOHPFL\H 6XUL\H¶QLQ øVUDLO¶L
L]OHPHVLQL HQJHOOHPHN DPDoOÕ GRQDQÕPVDO WUXYD DWÕ
\HUOHúWLUGL÷LQGHQYHEXúHNLOGHoDOÕúPDVÕQÕGXUGXUGX÷XQGDQ
úSKHOHQLOPLúWLU [5].
*QP]GH GH GRQDQÕPVDO UQOHUGH WUXYD DWÕ YH DUND
NDSÕ YDUOÕNODUÕ NRQXVXQGD PHG\DGD KHU JQ \HQL KDEHUOHU
oÕNPDNWDGÕU gUQH÷LQ JHoWL÷LPL] JQOHUGH $YXVWXU\D
*YHQOLN .XUXPX 6(& &RQVXOW %DUUDFXGD ILUPDVÕQD DLW
ELUoRNUQGH GRNPDQWHHGLOPH\HQDUND NDSÕEXOXQGX÷XQX
ELOGLUPLúWLU )LUPD EXQODUÕQ UHWLP DúDPDVÕQGDNL GHQH\VHO
oDOÕúPDODUGDQ VRQUD XQXWXODQ |]HOOLNOHU ROGX÷XQX LGGLD
HWPLú ROPDNOD EHUDEHU GROD\OÕ ELU úHNLOGH EX DUND NDSÕODUÕQ
YDUOÕ÷ÕQÕ NDEXO HWPLúWLU &LKD]ODUD WDVDUÕPÕ HVQDVÕQGD
J|POPú ROGX÷X LGGLD HGLOHQ EX DUND NDSÕODU FLKD]
]HULQGH NROD\FD DNWLI KDOH JHWLULOHELOHQ HN ELU \|QHWLFL
KHVDEÕ úHNOLQGH WDQÕPODQPÕúWÕU 'ROD\ÕVÕ LOH EX \DSÕODU
VDOGÕUJDQÕQX]DNWDQHULúLPLOH\HWNLOHQGLULOHUHND÷]HULQGHNL
hassas verL\HHULúPHVLQHRODQDNVD÷ODPDNWDGÕU[6],[7].
105
Proceedings/Bildiriler Kitabı
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
%HQ]HU ELU LGGLD GD SL\DVDGD \D\JÕQ RODUDN NXOODQÕODQ
=7( YH +XDZHL KDEHUOHúPH FLKD]ODUÕ LoLQ PHYFXWWXU
$PHULND dLQ PHQúHOL =7( YH +XDZHL KDEHUOHúPH
FLKD]ODUÕQÕQ WUXYD DWÕ LoHUPHVL GXUXPXQD \|QHOLN ELU
DUDúWÕUPD UDSRUX \D\ÕQODPÕú YH EX FLKD]ODUÕQ Nritik projeler
LoHULVLQGHNXOODQÕOPDVÕQÕHQJHOOHPLúWLU[8].
%XDODQGDRUWD\DoÕNDQHQVRQJHOLúPHOHUGHQELUWDQHVLGH
+3 ILUPDVÕQÕQ \D\JÕQ RODUDN NXOODQÕODQ GHSRODPD
FLKD]ODUÕQGD NXOODQÕFÕODUÕQ ROXúWXUGX÷X KHVDSODU GÕúÕQGD
UHWLPGHQ JHOHQ GRNPDQWH HGLOPHPLú HULúLP KDNODUÕQÕn
EXOXQGX÷XQXQLWLUDIHWPHVLGLU[9].
'RQDQÕP ED]ÕQGD ilk DUND NDSÕ tespit edilmesi ise 2012
VHQHVL\D]ÕQGDROPXúWXU6HUJHL6FRUREDJDWRYELUDVNHULoLS
RODQ $&7(/ )3*$ ]HULQGH EXOGX÷X DUND NDSÕ\Õ
J|VWHUPLúWLU[10].
III. DONANIMSAL TRUVA ATI TESPIT YÖNTEMLERI
'RQDQÕPVDO WUXYD DWODUÕ HOHNWURQLN VLVWHPOHULQ JYHQOL÷L
LoLQ E\N ELU WHKGLW ROXúWXUGX÷XQGDQ EX \DSÕODUÕQ WHVSLWL
LoLQ GH \R÷XQ ELU oDOÕúPD \DSÕOPDNWDGÕU %X oDOÕúPDODUGD
NXOODQÕODQ \|QWHPOHU GXUXPD J|UH IDUNOÕOÕN J|VWHUPHNWHGLU
'RQDQÕPVDO WUXYD DWODUÕQÕQ WHVSLW HGLOPHVLQH \|QHOLN
oDOÕúPDODU LQFHOHQGL÷LQGH EX \|QWHPOHULQ ùHNLO 1‘de
J|UOG÷JLELVÕQÕIODQGÕUÕODELOHFH÷LGH÷HUOHQGLULOPLúWLU
ùHNLO 1 'RQDQÕP \DSÕODUÕ LoLQGH WUXYD DWÕ WHVSLWL LoLQ OLWHUDWUGH
WDQÕPODQPÕú\|QWHPOHULQLQVÕQÕIODQGÕUPDVÕ
A. 7DKULEDWOÕ<|QWHPOH7UXYD$WÕ7HVSLWL
7UXYD DWODUÕQÕQ WHVSLW HGLOPHVLQGH DNOD LON JHOHQ
\|QWHPGLU $QDOL] HGLOHFHN RODQ elektronik devrenin
|QFHOLNOH VW NRUXPD NDWPDQÕ DoÕOÕU 'DKD VRQUD JHOLúPLú
FLKD]ODUYHoHúLWOLNLP\DVDOODUNXOODQÕODUDNDúDPDDúDPDWP
oLSNDWPDQODUÕWDUDQDUDNWHUVLQHPKHQGLVOLN\DSÕOÕU7HUVLQH
PKHQGLVOLNOH HOGH HGLOHQ J|UQWOHU ELUOHúWLUHUHN oLSLQ HQ
EDúWD WDVDUODQGÕ÷Õ úHNLOGH UHWLOGL÷LQH NDUDU YHULOLU 7HUVLQH
PKHQGLVOLN LoLQ HQ \D\JÕQ NXOODQÕODQ WHNQLN HOHNWURQ
mikroskobu ile tarama ve light-induce voltage iteration
teknikleridir [14].
7HUVLQH PKHQGLVOLN \DSDUDN WUXYD DWÕ DUDPak hem
PDOL\HW KHPGH ]DPDQ DoÕVÕQGDQ oRN ]RU ELU X\JXODPDGÕU
dQNGRQDQÕPVDOWUXYDDWODUÕELUPDQWÕNVDO GHYUH]HULQGH
D] VD\ÕGD PDQWÕNVDO NDSÕQÕQ HNOHQPHVL NDOGÕUÕOPDVÕ YH\D
PRGLIL\H HGLOPHVL VXUHWL\OH JHUoHNOHQHELOLU 2\VD PRGHUQ
bir elektronik devreGH PLO\DUODU G]H\LQGH EX úHNLOGH
NDSÕQÕQROPDVÕV|] NRQXVXRODELOLU%XNDGDUJHQLúELU\DSÕ
LoHULVLQGHWUXYDDWÕQÕWHVSLWHWPHNVDPDQOÕNWDL÷QHDUDPDNOD
HúGH÷HUELUoDOÕúPDRODELOLU[3].
%XQXQOD EHUDEHU GL÷HU ELU oRN WUXYD DWÕ WHVSLW \|QWHPL
LoLQreferans olarak LKWL\DoGX\XODQJYHQLOLUGHYUHJROGHQ
IC) [17] WHPLQL LoLQ WHUVLQH PKHQGLVOLN \|QWHPL
NXOODQÕODELOLU
Proceedings/Bildiriler Kitabı
106
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
B. 7DKULEDWVÕ]<|QWHPOH7UXYD$WÕ7HVSLWL
7DKULEDWOÕ GHYUHOHU LOH WUXYD DWÕ WHVSLWLQLQ E\N ]RUOXN
LoHUPHVL WDKULEDWVÕ] \|QWHPOHUH \|QHOLN oDOÕúPDODU
\DSÕOPDVÕ YH EXQODUÕQ NXOODQÕOPDVÕ VRQXFXQX GR÷XUPXúWXU
7DKULEDWVÕ] WUXYD DWÕ WHVSLW \|QWHPOHUL IDUNOÕ JUXSODUD
D\UÕOPDNWDGÕU
0DQWÕNVDO 'DYUDQÕú7HVWL
,&
OHULQ GDYUDQÕúVDO \DSÕODUÕQÕQ DQDOL] HGLOPHVL HVDVÕQD
GD\DQÕU)RQNVL\RQHOGDYUDQÕú analizi YHJL]OL|]HOOLNWDUDPD
ROPDN]HUHiki grupta incelenir.
)RQNVL\RQHO 'DYUDQÕú $QDOL]L, bir elektronik devre
JLULúLQHEHOOLWHVWYHNW|UOHULQLQYHULOHUHNoÕNÕúODUÕQL]OHQPHVL
YH EHNOHQHQLQ GÕúÕQGD ELU oÕNÕú HOGH HGLOGL÷LQGH ELU
DQRUPDOOL÷LQYDUROGX÷XQXQWHVSLWHGLOPHVLHVDVÕQDGD\DQÕU
$VOÕQGD EX \|QWHP GDKD oRN IRQNVL\RQHO KDWDODUÕQ WHVSLWL
LoLQ JHoHUOL ELU X\JXODPDGÕU [15]. Bununla beraber,
parametrik WUXYD DWODUÕQÕQ GHYUHQLQ \DSÕVÕQÕ GH÷LúWLUHUHN
WUXYD DWÕ HNOHPH WHVSLWL LoLQ GH NXOODQÕODELOLU %X WHVtlerde
NXOODQÕODQ RWRPDWLN WHVW SDWHUQOHUL QRUPDOGH GHYUHGH
ROPD\DQ ELU IRQNVL\RQX DNWLI HWPH \HWHQH÷LQGH
ROPDGÕNODUÕQGDQ GHYUH\H HNOHPHoÕNDUPD \DSÕODUDN
konulan)
fonksiyonel
WUXYD
DWODUÕQÕQ
(devreye
HNOHPHoÕNDUPD \DSÕODUDN NRQXODQ WHVSLWLQGH
NXOODQÕlamazlar [16].
0DQWÕNVDO WHVW LOH WUXYD DWÕ DUDPDQÕQ HQ E\N SUREOHPL
E\N elektronik devre \DSÕODUÕQHGHQL\OHWDUDQPDVÕJHUHNHQ
X]D\ÕQ oRN JHQLú ROPDVÕGÕU 8]D\ÕQ EX NDGDU JHQLú ROPDVÕ
WHVW YHNW|UOHUL LOH WP X]D\Õ WDUDPD\Õ QHUHGH\VH LPNDQVÕ]
hale getirmektedir. gUQH÷LQ VDGHFH WULJJHU QRNWDVÕ YH SD\ORDG QRNWDVÕ RODQ ELU WUXYD DWÕ GúQOVQ NDSÕOÕ
FWLSLQGHNoNELU,6&$6-85 Benchmark devresinde bu
WUXYD DWÕQÕQ \HUOHúWLULOPHVL LoLQ 11 muhtemel nokta
PHYFXWWXUYHWUXYDDWÕQÕWHWLNOHPHNLoLQ\DNODúÕN9 deneme
\DSÕOPDVÕJHUHNLU[17].
%XNÕVÕWÕQDúÕOPDVÕLoLQED]ÕPHWRGODU|QHULOPLúWLU-KDYH
-KD EX GXUXP LoLQ UDVWVDOOÕ÷D GD\DOÕ ELU \|QWHP |QHUPLúWLU
[18]. 'HYUHQLQ JLULúOHULQH GH÷LúLN SDWHUQOHU X\JXODQPÕúWÕU
'HYUHQLQEXJLULúOHUHYHUGL÷LFHYDSODUDED÷OÕRODUDNGHYUH\H
DLWRODVÕOÕNVDOSUREDELOLVWLFELULP]DWHVSLWHGLOPLúWLU'DKD
VRQUD D\QÕ SDWHUQOHU DQDOL] HGLOHQ GHYUHOHUH X\JXODQPÕúWÕU
'HYUHOHULQ GDYUDQÕúODUÕ GDKD |QFH HOGH HGLOHQ RODVÕOÕNVDO
LP]DGH÷HULLOHNDUúÕODúWÕUÕOPÕúWÕU(÷HUELUIDUNOÕOÕNYDUVDEX
GHYUHOHULQWUXYDDWOÕROGX÷XVRQXFXQDYDUÕOPÕúWÕU
:ROI YH DUNDGDúODUÕ WUXYD DWÕ WHVSLWL LoLQ GHYUH ]HULQGH
QDGLU RODUDN DNWLI RODQ DODQODUD \R÷XQODúPÕúODUGÕU Nadir
RODUDN DNWLI RODQ E|OJHOHUL WHWLNOH\HQ WHVW YHNW|UOHUL
UHWLOHUHN elektronik devreQLQ GDYUDQÕúÕ J|]OHPOHQPLúWLU
[19]. &KDFNUDERUW\ YH DUNDGDúODUÕ GD EHQ]HU ELU \|QWHPOH
WUXYDDWÕWHVSLWLQLQHWNLQOL÷LQLDUWÕUPD\DoDOÕúPÕúODUGÕU [20].
*L]OL g]HOOLN 7DUDPD, aQDOL] HGLOHQ \DSÕQÕQ WDQÕPOÕ
ROPD\DQ |]HOOLNOHULQLQ WHVSLW HGLOPHVL HVDVÕQD GD\DQÕU Bu
NRQX LOH LOJLOL ELU oDOÕúPD 6NRURERJDWRY YH :RRGV
tarafÕQGDQ JHUoHNOHQPLúWLU [10] %X oDOÕúPDQÕQ OLWHUDWUGHNL
GL÷HUGRQDQÕPVDOWUXYDDWÕWHVSLWLoDOÕúPDODUÕQGDQ|QHPOLELU
IDUNÕ JHUoHN ELU GRQDQÕP ]HULQGH JHUoHNOHúWLULOPLú
ROPDVÕGÕU Analiz edilen HOHPDQ $&7(/ ILUPDVÕQD DLW
3UR$VLF WLSL )3*$ HOHPDQÕGÕU dDOÕúPD NDSVDPÕQGD
DUDúWÕUPDFÕODU DQDOL] HGLOHQ )3*$ HOHPDQÕQÕQ -7$*
DUD\]QH \R÷XQODúPÕúODUGÕU %X DUD\] DUDFÕOÕ÷Õ LOH
)3*$
H UQ GRNPDQÕQGD WDQÕPOÕ ROPD\DQ NRPXWODU
20-21 September /Eylül 2013 | Ankara / TURKEY
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
J|QGHUHUHN D\QÕ ]DPDQGD HOHPDQÕQ oHNWL÷L JF
GLQOHPLúOHUGLU dHNLOHQ JFQ DQDOL]LQGHQ -7$*
DUD\]QGH WDQÕPOÕROPD\DQED]ÕEDúND NRPXWODUÕQYDUOÕ÷QÕ
WHVSLW HWPLúOHUGLU %X NRPXWODUÕQ ELULQLQ NXOODQÕOPDN LoLQ
ELWX]XQOX÷XQGDELUYHULWDOHSHWWL÷LQLWHVSLWHWPLúOHUGLU
*HOLúPLú \DQ NDQDO DQDOL] WHNQLNOHUL NXOODQDUDN ELW
X]XQOX÷XQGDNL EX GH÷HU HOGH HGLOPLúWLU Bu anahtar
NXOODQÕOGÕ÷ÕQGDoLSWHWDQÕPOÕROPDGÕ÷ÕEHOLUWLOHQJHULRNXQPD
|]HOOL÷LQLQ DNWLI ROGX÷X WHVSLW HGLOPLúWLU $\UÕFD oLS
|]HOOLNOHULQGH ³GH÷LúPH]´ olarak
belirtLOHQ
ED]Õ
NRQILJUDV\RQ E|OJHOHULQLQ SURJUDPODQDELOLU KDOH JHOGL÷L
WHVSLWHGLOPLúWLU
Yan Kanal Analizi
7UXYD DWÕQÕQ WHVSLW HGLOPHVLQGH GHYUHOHULQ oDOÕúPDVÕ
HVQDVÕQGDLVWHPVL]RODUDN\D\GÕNODUÕ\DQNDQDOELOJLOHULQGHQ
ID\GDODQÕOÕU %X \DQ NDQDO ELOJLVL GHYUHQLQ Jo-DNÕP
WNHWLPL HOHNWURPDJQHWLN \D\ÕQÕPÕ oDOÕúPD IUHNDQVÕ
oDOÕúPD]DPDQÕGH÷HUOHULRODELOLU<DQNDQDODQDOL]LLOHWUXYD
DWÕ WHVSLWLQGH WHPHO \DNODúÕP RODUDN JYHQLOLU GHYUH\H ait
\XNDUÕGD |UQHNOHUL YHULOHQ \DQ NDQDO YHULOHUL |OoOHUHN ELU
kDUDNWHULVWLNoÕNDUÕOÕU'DKDVRQUDDQDOL]HGLOHFHNGHYUHOHULQ
\DQNDQDOELOJLOHULQHED÷OÕNDUDNWUHULVWLNOHULRUMLQDOGHYUHLOH
NDUúÕODúWÕUÕODUDNWUXYDDWÕQÕQROXSROPDGÕ÷ÕQDNDUDUYHULOLU
<DQ NDQDO DQDOL]L LOH \DSÕODQ WUXYD DWÕ WHVSLW oDOÕúPDODUÕ
kullanÕODQ\DQNDQDOSDUDPHWUHVLQHJ|UHVÕQÕIODQGÕUÕODELOLU
*o 7DEDQOÕ $QDOL] WUXYD DWÕ WHVSLWLQGH \DQ NDQDO
SDUDPHWUHVLRODUDNJFNXOODQÕU
$JUDZDO YH DUNDGDúODUÕQÕQ \DSWÕNODUÕ oDOÕúPD WUXYD DWÕ
tespitinde JF YH GROD\ÕVÕ\OD yan kanal bilgisini kullanan
LON oDOÕúPDGÕU [11] dDOÕúPDGD |QFHOLNOH UDVWJHOH VHoLOPLú
bir grup elektronik devre\HUDVWJHOHJLULúYHULOHULYHULOPLúYH
GHYUHOHULQ Jo |OoPOHUL DOÕQPÕúWÕU. %X Jo WNHWLPL
GH÷HUOHUL ELU LP]D GH÷HUL ILQJHUSULQW RODUDN NDEXO
HGLOPLúWLU *HULGH NDODQ GHYUHOHUH D\QÕ UDVWJHOH YHULOHU
X\JXODQDUDN Jo |OoP DOPÕúODUGÕU (OGH HGLOHQ GH÷HUOHUL
JYHQLOLUGHYUH\HDLWLP]DGH÷HULLOHNDUúÕODúWÕUPÕúODUGÕU
Yan kanal aQDOL]L LOH WUXYD DWÕ WHVSLWLQGH HQ |QHPOL
SUREOHPOHUGHQ ELUL UHWLP VDoÕOPDVÕQGDQ ND\QDNODQDQ
LúOHPJUOWOHULQLQ (process variation) devredeki yan kanal
parametrelerini etkilemesidir. Bu paraPHWUHOHUGH \DúDQDQ
GH÷LúLPOHU WUXYD DWODUÕQÕQ GHYUH\H NDWDFD÷Õ \DQ NDQDO
GH÷HUOHULQLQ PDVNHOHQPHVLQH QHGHQ ROPDNWDGÕU [26]. Bu da
|]HOOLNOH NoN WUXYD DWODUÕQÕQ WHVSLW HGilmesine engel
ROXúWXUPDNWDGÕU 5DG YH DUNDGDúODUÕ WDUDIÕQGDQ SURFHVV
GH÷LúNHQOHULQLQGHYUH\HHWNLVLQLD]DOWPDNLoLQGHYUH\HE|OJH
WDEDQOÕ WUDQVLHQW SRZHU VLJQDO DQDOL]L \DSÕOPDVÕ
|QHULOPLúWLU[22].
Banga ve Hsiao [24]¶GH WUXYD DWÕQÕQ KDUFDGÕ÷Õ JFQ
GHYUHQLQ WRSODP Jo WNHWLPLQGH IDUN HGLOHELOLU KDOH
JHOPHVLQL VD÷ODPDN LoLQ E|OJH WDEDQOÕ WUXYD DWÕ WHVSLW
\|QWHPLQL |QHUPLúWLU Yine Banga ve Hsiao [25]¶GD WUXYD
DWÕQÕQKDUFDGÕ÷ÕJFQGHYUHQLQWRSODPJoWNHWLPLQGH fark
HGLOHELOLU KDOH JHOPHVLQL VD÷ODPDN LoLQ JHoLú VD\ÕVÕ
minimizasyonu WRJJOHPLQLPL]DWLRQ\|QWHPLQL|QHUPLúWLU
*HoLú VD\ÕVÕ PLQLPL]DV\RQ \|QWHPLQGH WUXYD DWÕQÕQ oHNWL÷L
Jo VDELW NDOÕUNHQ GHYUHQLQ oHNWL÷L WRSODP JF D]DOWPDN
KHGHIOHQPLúWLU
Alkabani [26]¶GD WUXYD DWÕQÕQ WHVSLWLQLQ KDVVDVL\HWLQL
DUWÕUPDNLoLQWXWDUOÕOÕNWDEDQOÕNDSÕVHYL\HVLNDUDNWHUL]DV\RQX
\|QWHPLQL |QHUPLúWLU $ONDEDQL oDOÕúPDVÕQGD WXWDUOÕOÕN
20-21 September /Eylül 2013 | Ankara / TURKEY
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
PHWUL÷LRODUDNGHYUHQLQJHUoHNJo|OoPOHULLOHVLPODV\RQ
\ROX\OD HOGH HGLOPLú Jo |OoPOHULQLQ |OoHNOHPH GH÷HULQLQ
DUDVÕQGDNL IDUNÕ NXOODQPÕúWÕU gOoHNOHPH GH÷HUL NDSÕQÕQ
JHUoHN Jo |OoP GH÷HULQL KHVDSODUNHQ PDWHPDWLNVHO
LúOHPOHUOe HOGH HGLOHQ Jo |OoPQQ LúOHP SURFHVV
JUOWVQGHQND\QDNOÕoDUSÕOPDVÕJHUHNHQVDELWGH÷HULGLU
5HHFH \DQ NDQDO DQDOL]L LOH 7UXYD DWÕ WHVSLWLQGH \D\JÕQ
RODUDNLKWL\DoGX\XODQJYHQLOLUGHYUH NXOODQÕOPDGDQ7UXYD
DWÕ WHVSLWL \DSDQ ELU \DSÕ |QHUPLúWLU [29],[30]. Elektronik
devre WDVDUÕPÕQGD NXOODQÕODQ 3URFHVV 'HYHORSPHQW .LW LOH
elektronik devreQLQ LúOHP JUOWV (process variation) ile
HWNLOHQPH\HFHN SDUDPHWUHOHUL LoLQ GHYUH\H DLW ELU LP]D
oÕNDUÕOPÕúWÕU %XQXQ LoLQ elektronik devre\H IDUNOÕ YROWDM
beslemeleri verilirken elektronik devre ]HULQGH LNL QRNWD
DUDVÕQGDROXúDQDNÕPGH÷HUOHULGLNNDWHDOÕQPÕúWÕU
*o DQDOL]L LOH 7UXYD DWÕ WHVSLWLQGH VRQXo DOÕQPDVÕ LoLQ
GHYUHGHQ DOÕQDQ Jo LúDUHWOHULQLQ LúOHQPHVL |QHP
kazanmaktDGÕU /LWHUDWUGH EX NDSVDPGD DúD÷ÕGDNL JLEL
oDOÕúPDODU\DSÕOPÕúWÕU
%DNWLU YH DUNDGDúODUÕ VLPODV\RQ RUWDPÕQGD
JHUoHNOHGLNOHUL GHYUHGHQ WDQHVLQH 7UXYD DWÕ
\HUOHúWLUPLúOHUGLU [31] 'DKD VRQUD 7UXYD DWÕ ROPD\DQ
GHYUHOHU LoLQ HOGH HGLOHQ Jo LúDUHWOHUL LOH WUXYD DWÕ LoHUHQ
GHYUHOHULoLQHOGHHGLOHQJoLúDUHWOHULQLNDUúÕODúWÕUPÕúODUGÕU
*o LúDUHWOHUL LoLQ NODVLN \|QWHPOH ]DPDQ X]D\ÕQGD
NDUúÕODúWÕUPD \DSÕOGÕ÷ÕQGD VRQXo DOÕQDPDPÕúWÕU %XQXQOD
beraber, Discrete Waveleth Transform, Spektogram ve
1HXUDO 1HWZRUN NXOODQÕODUDN LúDUHWOHU LúOHQGL÷LQGH WUXYD
DWODUÕQÕQWHVSLWHGLOGL÷LJ|VWHULOPLúWLU
/*ZRQYHDUNDGDúODUÕ',6752<DGÕQÕYHUGLNOHULELUWHVW
RUWDPÕ\OD HWNLQ VLQ\DO DQDOL]L LoHUHQ ELU \|QWHP
|QHUPLúOHUGLU [33],[34] dDOÕúPDODUÕQGD JHQHO RODUDN
VLPODV\RQ RUWDPÕQGDQ HOGH HWWLNOHUL Jo |OoPOHUL LOH
JHUoHN GHYUHGHQ DOGÕNODUÕ Jo |OoPOHULQL NDUúÕODúWÕUDUDN
WUXYD DWÕQÕ WHVSLW HWPLúOHUGLU gOoPOHULQ NDUúÕODúWÕUÕOPDVÕ
|QFHVLQGH Jo |OoPOHULQLQ LúDUHWLQ IDUNOÕ |]HOOLNOHU ED]
DOÕQDUDN VÕNÕúWÕUÕOPDVÕ HVDVÕQD GD\DQDQ FRPSUHVVLYH
VHQVLQJ LúOHPLQL X\JXODPÕúODUGÕU &RPSUHVVLYH VHQVLQJ
\|QWHPL LOH \|QWHPLQ NXOODQÕOPDGÕ÷Õ VLVWHPH RUDQOD NDW
GDKD KÕ]OÕ YH NDW GDKD D] |OoP DQDOL] HGLOHUHN WUXYD
DWÕWHVSLWHGLOPLúWLU
$6,& VLVWHPOHU LoLQ \DSÕODQ oDOÕúPDODU LoLQ $6,&
PRGOOHULQL WHPLQ HWPH ]RUOX÷X DUDúWÕUPDFÕODUÕ VLPODV\RQ
]HULQGH oDOÕúPD\D \|QHOWPLúWLU 2\VD EX oDOÕúPDODUÕQ
EDúDUÕVÕQÕQ GH÷HUOHQGLULOPHVL LoLQ JHUoHN GHYUHOHU ]HULQGH
X\JXODPDODU \DSÕOPDVÕ |QHPOLGLU %X GXUXP DUDúWÕUPDFÕODUÕ
$6,& \DSÕVÕQÕQ ELU EHQ]HUL RODUDN NDEXO HGLOHQ )3*$
HOHPDQODUՁ]HULQGHoDOÕúPDODU\DSPD\D\|QHOWPLúWLU
:DQJ YH /XR 6SDUWDQ( )3*$ ]HULQGH '(6
DOJRULWPDVÕJHUoHNOH\HUHNSUDWLNRODUDN7UXYDDWÕ\HUOHúWLUPH
YHEXOPDoDOÕúPDVÕ\DSPÕúODUGÕU[35].
Zaman 7DEDQOÕ $QDOL] LOH WUXYD DWÕ WHVSLWL \DSÕOPDVÕQGD
\XNDUÕGD DQODWÕODQ Jo WNHWLPL \HULQH ]DPDQ JHFLNPHOHUL
NXOODQÕOÕU
-LQ YH 0DUNLV oLS ]HULQGH \HU DODQ NDSÕODU DUDVÕ
JHFLNPHOHUL |OoHUHN WUXYD DWÕ WHVSLWL \|QWHPL |QHUPLúOHUGLU
[36] gQHUGLNOHUL \|QWHPGH |QFHOLNOH JYHQLOLU WDVDUÕP
]HULQGHQ NDSÕ JHFLNPHOHUL |OoOHUHN EX GH÷HUOHU ELU LP]D
ILQJHUSULQW RODUDN NDEXO HGLOPLúWLU $\QÕ \|QWHPOH
GH÷HUOHQGLULOHQ KHUELUGHYUHLoLQNDUDNWHULVWLNoÕNDUÕOPÕúWÕU
'H÷HUOHQGLULOHQ GHYUHOHULQ NDUDNWHULVWLNOHUL JYHQLOLU GHYUH
107
Proceedings/Bildiriler Kitabı
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
LOH NDUúÕODúWÕUÕODUDN WUXYD DWÕ ROXS ROPDGÕ÷ÕQD NDUDU
YHULOPLúWLU
:HL YH DUNDGDúODUÕ WUXYD DWÕ WHVSLW HWPHN LoLQ ]DPDQ
JHFLNPHOHULQL NXOODQDQ \|QWHPOHULQ HQ E\N VÕNÕQWÕVÕ RODQ
SDUDOHO \ROODU SUREOHPLQLQ o|]PQGH LoHUHQ ELU \|QWHP
|QHUPLúOHUGLU [37]. =LUD ]DPDQ JHFLNPHVLQH EDNÕODFDN
NÕVPÕQ JLULúL LOH oÕNÕúÕ DUDVÕQGD ELUGHQ ID]OD \RO
olabilmektedir UHFRQYHUJHQW SDWK dDOÕúPDGD EX \ROODUD
WHVW QRNWDVÕ (D Flip flop) eklenerek ve oradan zaman
JHFLNPHVLQL |OoHUHN SDUDOHO \RO SUREOHPL RUWDGDQ
NDOGÕUÕOPÕúWÕU
<DQ NDQDO DQDOL]L LOH WUXYD DWÕ WHVSLWLQGH NXOODQÕODQ ELU
\|QWHP GH ELUGHQ ID]OD \DQ NDQDO SDUDPHWUHVLQLQ ELUOLNWH
NXOODQÕOPDVÕGÕU dRN 3arametreli Analiz olarak bilinen bu
\|QWHPNDSVDPÕQGDDúD÷ÕGDNLoDOÕúPDODU\DSÕOPÕúWÕU
1DUDVLQKDP YH DUNDGDúODUÕ VLPODV\RQ RUWDPÕQGD YH
VRQUDVÕQGD )3*$ NXOODQDUDN GLQDPLN DNÕP (IDDT) ve
oDOÕúPD IUHNDQVÕQÕQ PDNVLPXP GH÷HULQL (Fmax) birlikte
NXOODQDUDN WUXYD DWÕ WHVSLW HWPH \|QWHPLQL |QHUPLúOHUGLU
[12]. IDDT ve Fmax LoLQ ELU H÷UL ROXúWXUXOPXú YH H÷ULGHQ
IDUNOÕODúDQ GH÷HUOHU LoLQ WUXYD DWÕ WHVSLW HGLOPLúWLU
1DUDVLPKDP YH DUNDGDúODUÕ [13]¶WH GH D\QÕ \|ntemle truva
DWÕ WHVSLWL ]HULQGH oDOÕúPÕúODUGÕU $QFDN EX \|QWHPGH HN
RODUDN WUXYD DWÕQÕ WHVSLW HWPH KDVVDVL\HWLQL DUWÕUPDN LoLQ
SRZHU JDWLQJ YH RSHUDQG LVRODWLRQ \|QWHPLQL
NXOODQPÕúODUGÕU %X \|QWHP GHYUHQLQ DQDOL] HGLOHQ NÕVPÕ
aktif iken geriye kalDQ NÕVÕPODUÕQÕQ SDVLI KDOH JHWLULOPHVL
HVDVÕQDGD\DQÕU
3RWNRQMDNYH DUNDGDúODUÕ .DSÕVHYL\HVLNDUHNWHUL]DV\RQX
*DWH /HYHO &KDUDFWHUL]DWLRQ LOH WUXYD DWÕ WHVSLWLQL
|QHUPLúOHUGLU[27].DUDNWHUL]DV\RQXQoÕNDUÕOPDVÕQGDVWDWLN
JoWNHWLPLYH]DPDQJHFLNPHVLQLNXOODQPÕúODUGÕU
'HYUHQLQ NRQWURO HGLOHELOLU NDSÕ VD\ÕVÕQÕ DUWÕUPDN YH
NDUDNWHULVWL÷L oÕNDUÕODQ NDSÕ VD\ÕVÕQÕ DUWÕUPDN LoLQ :HL
[28]¶GH VÕFDNOÕN L\LOHúWLUPHVLQL |QHUPLúWLU %LU NDSÕQÕQ
VÕFDNOÕ÷ÕQÕ DUWÕUPDN LoLQ GÕúDUÕGDQ ELU VLVWHP LOH ÕVÕWPDN
\HULQH NDSÕODUÕQ - JHoLúOHUL LOH GR÷DO \ROGDQ VD÷ODQDQ
VÕFDNOÕNDUWÕPÕQÕNXOODQPÕúWÕU
7DVDUÕPGD(NOHQHQ<DSÕODUøOH7UXYD$WÕ7HVSLWL
%X \|QWHPOH 7UXYD DWÕ WHVSLWLQGH elektronik devrenin
UHWLOPHVLQGHQ|QFHGHYUH\HWUXYDDWÕHNOHQPHVLGXUXPXQGD
EXQXDQOD\DQELU\DSÕHNOHQLUBu yapÕoR÷X]DPDQELUGHYUH
YH\D GHYUH SDUoDVÕGÕU /LWHUDWUGH 'HVLJQ IRU +DGZDUH
7UXVW RODUDN GD ELOLQLU %X \|QWHPLQ WDVDUÕPD KDNLP
ROXQPDVÕ GXUXPXQGD X\JXODQDELOHQ ELU \|QWHP ROGX÷X
V|\OHQHELOLU 'ROD\ÕVÕ\OD $6,& GHYUHOHU ]HULQGH
uygulanabilir. Ancak araúWÕUPD oDOÕúPDODUÕQGD $6,&
UHWPHQLQ ]RUOX÷X QHGHQL\OH GHQH\VHO RODUDN )3*$
]HULQGHGHX\JXODQGÕ÷ÕJ|UOPHNWHGLU
ChacraboW\YHDUNDGDúODUÕPDQWÕNVDO test kullanarak truva
DWÕQÕQ HNOHQPHVLQL WHVSLW HGHQ ELU \DSÕ |QHUPLúOHUGLU [38].
%XQXQLoLQGHYUH\HELUWHVWORML÷LYH,2SRUWODUÕHNOHQLUdLS
normal mod ve saydam mod (transparent mod) ROPDN]HUH
PRGX LoHULU dLSLQ saydam PRGGD ROGX÷X GXUXPODUda
GHYUHQLQELULP]DGH÷HULUHWHUHNoÕNÕúÕQDYHUPHVLVD÷ODQÕU
7HVW LúOHPL GDKD |QFH WDQÕPODQPÕú DQDKWDU EHQ]HUL ELU
SDWHUQLQ GHYUH\H YHULOPHVL LOH EDúODU 7UXYD DWODUÕQÕQ
GHYUHOHULQ HQ D] DNWLI RODQ NÕVÕPODUÕQD \HUOHúWLULOHFH÷L
YDUVD\ÕPÕQGDQ KDUHNHWOH WUXYD DWÕQÕQ WHVSLWLQL VD÷OD\DQ
kontrol devrelerinin de devrelerin en az aktif olan bu
Proceedings/Bildiriler Kitabı
108
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
NÕVÕPODUÕQÕ J|]OHPOHPHVL JHUHNLU 9HULOHQ EDúODQJÕo GH÷HUL
LOH NRQWURO GHYUHVLQLQ J|]OHPOHGL÷L GH÷HUOHUGH EHNOHQHQ
GH÷HUOHUGHQ LP]D IDUNOÕ ELU GH÷HU WHVSLW HGLOPHVL KDlinde
WUXYD DWÕQÕQ YDUOÕ÷Õ WHVSLW HGLOLU %X \|QWHPGH GHYUH\H
NRQWUROGHYUHOHULQHGHQL\OHHNWDVDUÕPDODQÕYHNDUPDúÕNOÕ÷Õ
ROXúPDVÕHQ|QHPOLGH]DYDQWDMGÕU
%X \DSÕGDQ GDKD NDUPDúÕN DQFDN GDKD HWNLQ ELU |QOH\LFL
WUXYD DWÕ WHVSLW \|QWHPL $EURPLFL YH %UDGDOH\ WDUDIÕQGDQ
|QHULOPLúWLU[39]. Elektronik devre LoLQHGHYUHQLQoDOÕúPDVÕ
HVQDVÕQGD JHUoHN ]DPDQOÕ NRQWURO \DSDUDN WUXYD DWÕQÕ WHVSLW
eden bir NRQWURO ORML÷L HNOHQPHNWHGLU '()(1&( '(VLJQFor_ENabling-Security) PDQWÕNVDO RODUDNGDELOLQHQ\DSÕQÕQ
HQ|QHPOL|]HOOL÷L elektronik devreQLQUHWLOPHVLQGHQVRQUD
SURJUDPODQDELOPHHVQHNOL÷LQHVDKLSROPDVÕGÕU
6HOPDQLYHDUNDGDúODUÕ[15] ve [40]'de, fonksiyonel Truva
DWÕGHYUHOHULQGHNLJHoLúROD\ODUÕQÕQRODVÕOÕ÷ÕQÕQDUWÕUÕOPDVÕQD
GD\DQDQELU\|QWHP|QHUPLúOHUGLU'DKDVRQUDEXJHoLúOHULQ
UHWLOPH ]DPDQODUÕ DQDOL] HGLOPLúWLU <|QWHPGH |QFHOLNOH
JHRPHWULN GD÷ÕOÕP \|QWHPL\OH GHYUH ]HULQGHNL \ROODUGD
JHoLú RODVÕOÕNODUÕ KHVDSODQÕU [40] 'DKD VRQUD EHOOL ELU HúLN
GH÷HULDOWÕQGDJHoLúRODVÕOÕ÷ÕRODQ\ROODU]HULQHGXPP\IOLS
IORSODU \HUOHúWLULOLU %X \|QWHPOH WUXYD DWODUÕQÕQ VDNODQPD
LKWLPDOLQLQ \NVHN ROGX÷X GHYUHQLQ D] DNWLI RODQ
E|OJHOHULQGHDNWLYDV\RQRUDQÕQÕQDUWÕUÕOPDVÕKHGHIOHQPLúWLU
Bu metodun daha uygulanabilir bir benzeri Li ve Lach
WDUDIÕQGDQ |QHULOPLúWLU [41] %X PHWRWWD oLSH \D]PDoODU YH
NDSÕODU HNOHQHUHN \D]PDoWDQ \D]PDFD JHFLNPHOHU
|OoOPúWU
5HHFH YH DUNDGDúODUÕ [29] ve [32]¶GH )3*$ ]HULQGH
EHOOL QRNWDODUD ULQJ RVLODW|UOHU NR\DUDN HN ELU
PGDKDOH\DSÕOGÕ÷ÕQGD EX RVLODW|UOHULQ IUHNDQVODUÕQGDNL
GH÷LúLPH J|UH 7UXYD DWÕ WHVSLWL \DSDQ ELU \|QWHP
|QHUPLúOHUGLU
=KDQJ YH 7HKUDQLSRRU EX ILNUL GDKD LOHUL G]H\GH
X\JXOD\DQ ELU oDOÕúPD \DSPÕúODUGÕU [42]. Elektronik devre
]HULQH ELUELUOHUL LOH ED÷OÕ ULQJ RVLODW|U QHWZRUN NR\XS
PXKWHPHO ELU WURMHQL EX RVLODW|UOHUGHNL GH÷LúLPGHQ WHVSLW
HWPH\HoDOÕúPÕúODUGÕU
)HUUDLXROR YH DUNDGDúODUÕ [43]
GH D\QÕ \|QWHPL QP
WHQRORMLVLQGH JHUoHNOHQPLú $6,& GHYUHOHU ]HULQGH DQDOL]
HWPLúWLU
Banga ve Hsiao, elektronik devre ]HULQGH \HU DODQ
PDQWÕNVDO NDSÕODUÕQ EDúND NDSÕODU LOH JHUoHNOHQHELOPH
DYDQWDMÕQGDQ ID\GDODQDQ ELU \|QWHP |QHUPLúWLU [44]. Bu
\|QWHPGH GH DPDo WUXYD DWODUÕQÕQ GDKD D] DNWLI olan
QRNWDODUD NRQXOPDVÕ YDUVD\ÕPÕQD NDUúÕQ EX QRNWDODUGDNL
DNWLYDV\RQ RUDQÕQÕ \NVHOWPHNWLU %X DPDoOD JLULúOHULQGHNL
GH÷LúLPGHQ GDKD D] HWNLOHQHQ PDQWÕNVDO NDSÕODU GDKD ID]OD
etkilenen PDQWÕNVDO NDSÕODUODGH÷LúWLULOPLúWLU
%HQ]HU PDQWÕNVDO WHPHOH GD\DQDQ ELU oDOÕúPD $ONDEDQL
WDUDIÕQGDQJHUoHNOHúWLULOPLúWLU [45]7UXYDDWÕQÕWHVSLWHWPHN
LoLQ GHYUHQLQ GXDO¶L\OH D\QÕ GHYUHQLQ Hú GH÷HULQLQ GL÷HU
manWÕNVDO
NDSÕODUOD JHUoHNOHQPLú KDOL EHUDEHU
GH÷HUOHQGLUPHVLQGHQ \ROD oÕNPÕúODUGÕU $\UÕFD JHQHOOLNOH
WUXYD DWÕ HNOHQHQ ELU GHYUHGH WUXYD DWÕQÕQ WHWLNOHQPHVL LoLQ
QDGLUJHUoHNOHúHQELUJLULúGH÷HULQLQ VHoLOHFH÷L YDUVD\ÕPÕGD
WHPHO DOÕQPÕúWÕU %X DPDoOD WUXYD DWÕ WHVSLWL LoLQ GHYUHQLQ
QDGLU DNWLI RODQ E|OJHOHUL LoLQ NDSÕODU VHYL\HVLQGH GXDOL
DOÕQPÕúWÕU %X úHNLOGH 7UXYD DWODUÕQD DLW JLULú nadir
JHUoHNOHúPH GXUXPX VÕN JHUoHNOHúPH GXUXPXQD G|QPú
ROPDNWDGÕU%|\OHOLNOHWUXYDDWÕWHVSLWLoLQWUXYDDWÕQÕQoR÷X
20-21 September /Eylül 2013 | Ankara / TURKEY
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
gLULú YHNW|UQQ GHYUH\H JLUGL÷L ELU GHYUH HOGH HGLOPLú
ROPDNWDGÕU
/DPHFK YH DUNDGDúODUÕ \RO JHFLNPHOHULQGHQ WUXYD DWÕQÕ
WHVSLW HWPHN LoLQ 5(%(/ 5HJLRQDO 'HOD\ %HYDYLRU LVLPOL
J|PO WHVW \DSÕVÕQÕ |QHUPLúOHUGLU [46] 7UXYD DWÕ RODUDN
\ROODUDNDSDVLWH\DGDNDSÕ\HUOHúWLUPLúOHUGLU
IV. SONUÇ
/LWHUDWUGH GRQDQÕPVDO WUXYD DWODUÕQÕQ WHVSLWLQH \|QHOLN
X\ODQDQ
\|QWHPOHU
HWNLQOLN
DoÕVÕQGDQ
IDUNOÕOÕN
J|VWHUPHNWHGLU 8\JXODQDQ \|QWHPOHU YH EXQODUÕQ HWNLQOL÷L
Tablo-1¶GH|]HWOHQPLúWLU7DEORGD\|QWHPOHUHLOLúNLQWPDOW
NÕUÕOÕPODUÕQ J|VWHULOPHVL \HULQH HWNLQOLN DoÕVÕQGDQ ELUELUL\OH
IDUNOÕOÕN ROXúWXUDFDN NDGDU VW VHYL\H RODQ EDúOÕNODU
J|VWHULOPLúWLU <|QWHPOHULQ HWNLQOLNOHUL DOW\DSÕ LKWL\DFÕ
PDOL\HW X\JXODPD ]DPDQÕ EDúDUÕ úDQVÕ YH X\JXODQDELOHFHN
UQNDSVDPODUÕGLNNDWHDOÕQDUDNincelenmektedir.
TABLO I
TESPIT YÖNTEMLERI ETKINLIK ANALIZI
y|QWHPLQH LKWL\Do GX\XOPDNWDGÕU gUQH÷LQ KDNNÕQGD KLoELU
|Q ELOJL EXOXQPD\DQ ELU HOHNWURQLN ELOHúHQ YH\D VRQ UQ
]HULQGH WUXYD DWÕ DUDQPDVÕQD LON RODUDN PDQWÕNVDO GDYUDQÕú
WHVWLLOHEDúODQDELOLU%XJHQLúNDSVDPÕ QHGHQL\OH PDQWÕNVDO
GDYUDQÕú
WHVWLQLQ
HWNLQ
ELU
\|QWHP
ROGX÷X
GH÷HUOHQGLULOPHNWHGLU
<DQ NDQDO DQDOL]L \|QWHPL DOW\DSÕ ]DPDQ YH PDOL\HW
DoÕVÕQGDQDYDQWDMOÕELUVLVWHPGLU8\JXODPDNDSVDPÕRODUDN
GDELUoRN\DSÕLoLQNDSVD\ÕFÕGXUXPGDGÕU$\UÕFDPDQWÕNVDO
GDYUDQÕú WHVWL YH WDVDUÕPGD |QOHP DOPD \|QWHPOHUL LoLQ GH
\DUGÕPFÕ ELU DQDOL] WUGU 7P EXQODUOD EHUDEHU EDúDUÕ
úDQVÕQÕQ GD GúN ROPDPDVÕ EX \|QWHPL úX DQ OLWDUDWUGH
WDQÕPOÕ GRQDQÕPVDO WUXYD DWÕ WHVSLW \|QWHPOHUL DUDVÕQGD HQ
HWNLQ\|QWHPKDOLQHJHWLUPLúWLU
KAYNAKLAR
[1]
[2]
[3]
[4]
[5]
7DKULEDWOÕ \|QWHPOH GRQDQÕPVDO WUXYD DWÕ WHVSLWL KHU QH
NDGDUEDúDUÕúDQVÕ\NVHNROVDGD (tespit sonunda somut bir
NDQÕWDXODúÕOPÕúROVDGD ELUoRNGH]DYDQWDMLoHUPHNWHGLU%X
\|QWHPLoLQLKWL\DoGX\XODQDOW\DSÕ]DPDQYH PDOL\HWoRN
ID]ODGÕU YH JHOLúWLULOHQ DOW\DSÕ YH ND]DQÕODQ \HWHQHN LOH
oDOÕúPD\ÕWHNUDUODPDNKHUVHIHULQGH\HQLGHQ\NVHNPDOL\HW
YH ]DPDQ JHUHNWLUHFHNWLU $\UÕFD WHUVLQH PKHQGLVOLN
oDOÕúPDVÕ DQFDN ELU UHIHUDQV QRNWDVÕ RODUDN VHULP OD\RXW
ELOJLVL JLEL NULWLN WDVDUÕP YHULOHULQH VDKLS RODQ $6,&
X\JXODPDODULoLQJHUoHNOHQPH\HX\JXQGXU Bu nedenlerden
dola\Õ OLWHUDWUGH HWNLQ ELU GRQDQÕPVDO WUXYD DWÕ WHVSLW
\|QWHPLRODUDN|QHULOPHPHNWHGLU
7DKULEDWVÕ] \|QWHPOHULQ HWNLQOL÷LQL IDUNOÕ DOW EDúOÕNODU
DOWÕQGD LQFHOHPHN X\JXQ RODFDNWÕU 7DVDUÕPGD NRQWURO
GHYUHVL HNOH\HUHN WUXYD DWÕQÕQ WHVSLW HGLOPHVL GH WDKULEDWOÕ
WHUVLQHPKHQGLVOLN\|QWHPLNDGDUROPDVDGDDOW\DSÕ]DPDQ
YH PDOL\HW DoÕVÕQGDQ GH]DYDQWDMD VDKLSWLU +HU GHYUH LoLQ
\HQLGHQ WDVDUÕP \DSÕOPDVÕ JHUHNHFH÷L YH \LQH NRQWURO
GHYUHVLQLQ \HU NDSODPDVÕ VRUXQX WHNUDU HGHFH÷L LoLQ EX
\|QWHPLQ \HWHQHN ND]DQÕPÕVRQUDVÕQGD \LQH ]RUOX÷XGHYDP
HWPHNWHGLU 8\JXODPD DODQÕGD $6,& \DSÕODUÕ LOH VÕQÕUOÕGÕU
<|QWHPLQ JHWLUGL÷L \NOHULQ WDKULSOL \|QWHP NDGDU ID]OD
ROPDPDVÕ YH $6,& \DSÕODUÕ LoLQ EDúDUÕ úDQVÕQÕQ \NVHN
ROPDVÕEX\|QWHPLQOLWHUDWUGH|]HOOLNOH$6,&\DSÕODUÕLoin
HWNLQ VD\ÕODELOHFHN ELU \|QWHP RODUDN NDEXO HGLOPHVLQL
VD÷ODPÕúWÕU
0DQWÕNVDO GDYUDQÕú WHVWL DOW \DSÕ ]DPDQ YH PDOL\HW
DoÕVÕQGDQ DYDQWDMOÕ ELU VLVWHPGLU $VOÕQGD IRQNVL\RQHO
ER]XNOXNODU LoLQ |]HOOHúPLú EX \|QWHPLQ EDúDUÕ úDQVÕQÕQ GD
GúN ROGX÷X J|UOmektedir. Bu durum WUXYD DWODUÕQÕQ
IRQNVL\RQ ER]XNOXNODUÕ LOH NROD\FD IDUNHGLOHPH\HFH÷L
YDUVD\ÕPÕQD GD\DQPDNWDGÕU $QFDN EX \|QWHPLQ GL÷HU WP
\|QWHPOHUH J|UH oRN E\N ELU DYDQWDMÕ PHYFXWWXU 'L÷HU
\|QWHPOHULQ KLoELULQLQ oDOÕúPDGÕ÷Õ QRNWDODUGD EX WHVSLW
20-21 September /Eylül 2013 | Ankara / TURKEY
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
K. Jurgen : Selbstreproduktion bei programmen' (VX heavens)
Vx.netlux.org. http://vx.netlux.org/lib/mjk00.html. Retrieved 201007-10.,
"Fred Cohen 1984 "Computer Viruses – Theory and Experiments".
Eecs.umich.edu.
1983-11-03.
http://www.eecs.umich.edu/%7Eaprakash/eecs588/handouts/cohenviruses.html. Retrieved 2012-03-29., Communication of the ACM,
Vol. 27, No. 8, August 1984, pp. 761-763.
M. Beaumont, B. Hopkins, Newby T.: Hardware Trojans –
Prevention, Detection, Countermeasures (A Literature Review),
Defence Science and Technology Organisation (2011)
http://www.webopedia.com/TERM/B/backdoor.html
T. Huffmire, C. Irvine, T. D. Nguyen , T. Levin, R. Kastner:
Handbook of FPGA Design Security, Springer (2010).
http://isc.sans.edu/diary/Barracuda+Back+Door+/15004
https://www.seconsult.com/fxdata/seccons/prod/temedia/advisories_t
xt/20130124-0_Barracuda_Appliances_Backdoor_wo_poc_v10.txt
http://intelligence.house.gov/sites/intelligence.house.gov/files/docume
nts/Huawei-ZTE%20Investigative%20Report%20(FINAL).pdf
http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_
storage_vuln/
S. Skorobogatov, C. Woods : Breakthrough silicon scanning discovers
backdoor in military chip. Cryptographic Hardware and Embedded
Systems Workshop - CHESS (2012).
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar: Trojan
GHWHFWLRQ XVLQJ LF ¿QJHUSULQWLQJ ,((( 6\PSRVLXP RQ 6HFXULW\ DQG
Privacy. (2007).
S. Narasimhan, D. Du, R. S. Chakraborty, S. Paul, F. Wolff :
Multiple-Parameter Side-Channel Analysis: A Non-Invasive
Hardware Trojan Detection Approach. IEEE (2010)
S. Narasimhan, D. Du, R. S. Chakraborty, S. Paul, F. Wolff, C.
Papachristou, K. Roy, S. Bhunia: Hardware Trojan Detection by
Multiple-Parameter Side-Channel Analysis. IEEE Transaction on
Computers. (2012)
B. Sanno: Detecting Hardware Trojans. Ruhr-University Bochum,
Germany. (2009).
H. Salmani, M.Tehranipoor, J. Plusquellic: A Novel Technique for
Improving Hardware Trojan Detection and Reducing Trojan
Activation Time. IEEE Transaction on very large Scale Integration
(VLSI) Systems, VOL. 20, NO. 1. (2012).
X. Wang, M. Tehranipoor, J. Plusquellic: Detect-ing Malicious
Inclusions in Secure Hardware, Challenges and Solutions. 1st IEEE
International Workshop on Hardware-Oriented Security and Trust HOST'08. (2008).
R. S. Chakraborty, S. Narasimhan, S. Bhunia: Hardware trojan:
Threats and emerging solutions. (2010).
S. Jha, S. K. Jha: Randomization based probabilistic approach to
detect trojan circuits. High-Assurance Systems Engineering, IEEE
International Symposium on 0, 117–124. (2008).
F. Wolff, C. Papachristou, S. Bhunia, R. S. Chakraborty: Towards
Trojan-Free Trustedelektronik devres: Problem Analysis and
Detection Scheme. European Design and Automation Association EDAA. (2008).
R. S. Chakraborty, F. G. Wollf, S. Paul, C. A. Papachristou, S.
Bhunia: Mero: A statistical approach for hardware trojan detection.
Cryptographic Hardware and Embedded Systems Workshop - CHESS
(2009).
109
Proceedings/Bildiriler Kitabı
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
[21] M. Tehranipoor, F. Koushanfar: A survey of hardware trojan
taxonomy and detection, IEEE Design and Test of Computers 27, 10–
25. (2010)
[22] R. Rad, J. Plusquellic, M. Tehranipoor: Sensitivity analysis to
hardware trojans using power supply transient signals. IEEE
International Symposium on HardwareOriented Security and Trust.
(2008)
[23] R. M. Rad, X. Wang, M. Tehranipoor, J. Plusquellic: Power Supply
Signal Calibration Techniques for Improving Detection Resolution to
Hardware Trojans. IEEE (2008)
[24] M. Banga, M. Hsiao:
A Region Based Approach for the
Identification of Hardware Trojans. Proc. IEEE Int’l Workshop
Hardware-Oriented Security and Trust - HOST (2008)
[25] M. Banga, M. Hsiao: A Novel Sustained Vector Technique for the
Detection of Hardware Trojans. Proc. 22nd Int’l Conf. VLSI Design,
IEEE CS Press, pp. 327-332. (2009)
[26] Y. Alkabani, F. Koushanfar: Consistency-Based Characterization for
IC Trojan Detection. Proc. IEEE/ ACM Int’l Conf. Computer-Aided
Design - ICCAD (2009)
[27] M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey: ‘Hardware
Trojan Horse Detection Using Gate-Level Characterization. Proc.
46th Design Automation Conf - DAC (2009)
[28] S. Wei, S. Meguerdichian, M. Potkonjak: Malicious Circuitry
Detection Using Thermal Conditioning. IEEE Transaction on very
large Scale Integration (VLSI) Systems. VOL. 6, NO. 3. (2011)
[29] T. Reece: Detection of Malicious Hardware Integrated Circuits and
Field Programmable Gate Arrays. Submitted to the Faculty of the
Graduate School of Vanderbilt University. (2009)
[30] T. Reece, W. H. Robinson, B. L. Bhuva: Signature-based detection of
hardware trojans with voltage stepping. Governmental Microcircuit
Applications and Critical Technology - GOMACTech (2010)
[31] S. Baktir, 7*oOR÷OX, A. Özmen: Detection of Trojans in Integrated
Circuits. IEEE (2012)
[32] T. Reece, W. H. Robinson: Hardware Trojans: The Defense and
Attack of Integrated Circuits. IEEE (2011)
[33] Y. L. Gwon, H. T. Kung, D. Vlah: DISTROY: Detecting Integrated
Circuit Trojans with Compressive Measurements. Harvard University.
(2011)
[34] Y. Tsaiy, K. Huangy, H. T. Kung, D. Vlah, Y. L. Gwon, L. Cheny: A
Chip Architecture for Compressive Sensing Based Detection of IC
Trojans. Harvard University. (2012).
[35] L. Wang, H. Luo: A Power Analysis Based Approach to Detect
Trojan Circuits. IEEE (2011)
[36] Y. Jin, Y. Makris: Hardware trojan detection using path delay
¿QJHUSULQW ,((( ,QWHUQDWLRQDO 6\PSRVLXP RQ +DUGZDUH-Oriented
Security and Trust. (2008)
[37] S. Weiy, K. Liz, F. Koushanfarz, M. Potkonjaky: Provably Complete
Hardware Trojan Detection Using Test Point Insertion. IEEE/ACM
International Conference on Computer-Aided Design - ICCAD (2012)
[38] R. S. Chakraborty, S. Paul, S. Bhunia: On Demand Transparency for
Improving Hardware Trojan DeWHFWDELOLW\3URF,(((,QW¶O:RUNVKRS
Hardware Oriented Security and Trust - HOST (2008).
[39] M. Abramovici, P. Bradley: Integrated Circuit Security: New Threats
and Solutions. Proc. 5th Ann. Workshop Cyber Security and
Information Intelligence Research: Cyber Security and Information
Challenges and Strategies - CSIIRW (2009).
[40] H. Salmani, M. Tehranipoor, J. Plusquellic: New Design Strategy for
Improving Hardware Trojan Detection and Reducing Trojan
Activation Time. IEEE (2009)
[41] J. Li, J. Lach: At-speed delay characterization for ic authentication
and trojan horse detection. Hardware-Oriented Security and Trust HOST (2008).
[42] X. Zhang, M. Tehranipoor: RON: An On-Chip Ring Oscillator
Network for Hardware Trojan Detection. European Design and
Automation Association - EDAA. (2011)
[43] A. Ferraiuolo, X. Zhang, M. Tehranipoor: Experimental Analysis of a
Ring Oscillator Network for Hardware Trojan Detection in a 90nm
ASIC
[44] M. Banga, M. Hsiao: VITAMIN: Voltage InversionTechnique to
AscertaLQ0DOLFLRXV,QVHUWLRQLQ,&V3URFQG,(((,QW¶O:RUNVKRS
Hardware-Oriented Security and Trust - HOST (2009)
[45] Y. Alkabani: Trojan Immune Circuits Using Duality. 15th Euromicro
Conference on Digital System Design. (2012)
[46] C. Lamech, J. Plusquellic: Trojan detection based on delay variations
measured using a high-precision, low-overhead embedded test
structure. Univercity of New Mexico. (2012)
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
OLVDQV GHUHFHOHULQL DOGÕ GDQ LWLEDUHQ *HE]H <NVHN 7HNQRORML
(QVWLWVQGH (OHNWURQLN 0KHQGLVOL÷L E|OPQGH 'RNWRUD SURJUDPÕQD
devam etmektedir. Genel oDOÕúPD DODQÕ NULSWRORML ROPDNOD ELUOLNWH |]HO
oDOÕúPDDODQÕNULSWRJUDILNVLVWHPOHUH\DSÕODQJYHQOLNGH÷HUOHQGLUPHOHULGLU
/LVDQV |÷UHQLPL VÕUDVÕQGD VÕUDVÕ LOH VWDMODUÕQÕ D\ VUHFHN úHNLOGH 757
Radyo (Harbiye - ø67$1%8/ 1(7$ù hPUDQL\H - ø67$1%8/ YH
$5d(/ø. $ù
GH dD\ÕURYD - .2&$(/ø \DSPÕúWÕU <NVHN /LVDQV WH]
oDOÕúPDODUÕVÕUDVÕQGDø7h
GH-\ÕOODUÕDUDVÕQGDDUDúWÕUPDSHUVRQHOL
RODUDN oDOÕúPÕúWÕU \ÕOÕQGDQ LWLEDUHQ 7h%ø7$.-%ø/*(0 6LEHU
*YHQOLN(QVWLWVQGH*HE]H- .2&$(/øoDOÕúPDNWDGÕU
M. Öztemür 6DPVXQ
XQ dDUúDPED LOoHVLQGH \ÕOÕQGD GQ\D\D JHOGL
GH 6DPVXQ %DIUD /LVHVL
QGHQ PH]XQ ROGX YH GH <ÕOGÕ]
7HNQLN hQLYHUVLWHVL (OHNWURQLN YH +DEHUOHúPH 0KHQGLVOL÷L E|OPQGHQ
OLVDQVYH\NVHNOLVDQVGHUHFHOHULQLDOGÕ*HQHOoDOÕúPDDODQՁUQJYHQOL÷L
YH J|PO VLVWHPOHU ROPDNOD ELUOLNWH |]HO oDOÕúPD DODQÕ NULSWRJUDILN
VLVWHPOHUH\DSÕODQJYHQOLNGH÷HUOHQGLUPHOHULGLU
/LVDQV|÷UHQLPLVÕUDVÕQGDVÕUDVÕLOHVWDMODUÕQÕD\VUHFHNúHNLOGH Siemens
(Kartal - ø67$1%8/ $.%ø/ Otomasyon hPUDQL\H - ø67$1%8/
\DSPÕúWÕU7h%ø7$.EQ\HVLQGHoDOÕúPDXDEDúODPDGDQ|QFH\ÕOÕQGD
ELU G|QHP 1(7$ù
WD GRQDQÕP WDVDUÕP PKHQGLVL RODUDN oDOÕúPÕúWÕU 2009
\ÕOÕQGDQLWLEDUHQ7h%ø7$.-%ø/*(06LEHU*YHQOLN(QVWLWVQGH*HE]H
- .2&$(/øoDOÕúPDNWDGÕU
B. Soysal $QNDUD
GD\ÕOÕQGDGR÷GX
GHdDQNÕUÕ)HQ/LVHVL
QGHQ
PH]XQ ROGX GD 2UWDGR÷X 7HNQLN hQLYHUVLWHVL YH GD %R÷D]LoL
hQLYHUVLWHVL (OHNWULN (OHNWURQLN 0KHQGLVOL÷LQGHQ OLVDQV YH \NVHN OLVDQV
GHUHFHOHULQL DOGÕ GDQ LWLEDUHQ %R÷D]LoL hQLYHUVLWHVL (OHNWULN
(OHNWURQLN 0KHQGLVOL÷L E|OPQGH 'RNWRUD SURJUDPÕQD GHYDP
HWPHNWHGLU *HQHO oDOÕúPD DODQÕ NULSWRORML ROPDNOD ELUOLNWH |]HO oDOÕúPD
DODQÕNULSWRJUDILN VLVWHPOHUH \DSÕODQ JYHQOLN GH÷HUOHQGLUPHOHULGLU Lisans
|÷UHQLPL VÕUDVÕQGD VÕUDVÕ LOH VWDMODUÕQÕ D\ VUHFHN úHNLOGH 7h%ø7$.%ø/7(1 2'7h - ANAKRA), ASELSAN (0DFXQN|\ - ANAKRA) ve
Turkcell $ù
GH 6|÷W|] - ANAKRA \DSPÕúWÕU 5 \ÕOÕQGDQ LWLEDUHQ
$6(/6$1$ù
GH|QFH\ÕOVUHLOHDGD\PKHQGLVRODUDNGDKDVRQUDda
D\ VUH LOH PKHQGLV RODUDN oDOÕúPÕúWÕU 2007'den beri Siber Güvenlik
(QVWLWVQGH*HE]H- .2&$(/øoDOÕúPDNWDGÕU
M. Sahinoglu ,VSDUWD
QÕQ 6HQLUNHQW LOoHVLQGH \ÕOÕQGD GQ\D\D JHOGL
2001'de Isparta Fen Lisesi'nden mezun oldu YH GD øVWDQEXO
7HNQLNhQLYHUVLWHVL(OHNWURQLN0KHQGLVOL÷LE|OPQGHQOLVDQVYH\NVHN
Proceedings/Bildiriler Kitabı
110
20-21 September /Eylül 2013 | Ankara / TURKEY

Benzer belgeler

Pdf Görüntüle

Pdf Görüntüle 6FKUH\HU   \DSWÕ÷Õ oDOÕúPDGD %ø7¶LQ oÕNWÕ E\PHVLQH \DSWÕ÷Õ NDWNÕODUÕ * ONHOHUL ED]ÕQGD LQFHOHPLúWLU dDOÕúPDQÕQ VRQXFXQD J|UH * ONHOHULQGH %ø7 \DWÕUÕPODUÕHNRQRPLN...

Detaylı

Yalın Veri Ambarı Modeli - CEUR

Yalın Veri Ambarı Modeli - CEUR NDWHJRUL]HHGLOPLúYHNDWHJRUL]DV\RQVRQXFXQGDELUWDQÕPVLVWHPLNXUXOGX÷XWDNGLUGH UDSRU JHOLúWLUPH VUHoOHULQGH YH UDSRUXQ FDQOÕGD VRQ NXOODQÕFÕ\D DoÕOPDVÕ VUHFLQGH oRNFLGGLND]DQÕP...

Detaylı

Siber Saldırı Hedefleri ve TürNiye`de Siber GüvenliN Stratejisi

Siber Saldırı Hedefleri ve TürNiye`de Siber GüvenliN Stratejisi KHGHI DODQ ELU \D]ÕOÕP VDOGÕUÕVÕ JHUoHNOHúWLULOPLú YH  KDIWD VUH\OH øQJLOL] .UDOL\HW 'RQDQPDVÕQÕQ SHUVRQHOL VLVWHPOHU ]HULQH NLúLVHO HULúLPOHULQL VD÷OD\DPDPÕúWÕU Detaylı

HA03 - Mühendislik Fakültesi

HA03 - Mühendislik Fakültesi +DVDU DQDOL]L LQFHOHPHVLQH WkEL WXWXODQ PDO]HPHOHU NXPODPD PDNLQDVÕQD DLW ³FKDLQ OLQN´ DGÕ YHULOHQ SDUoDODUGÕU 3DUoDQÕQ JHQHO J|UQP ùHNLO ¶GH YHULOPLúWLU .XPODPD PDNLQDVÕ...

Detaylı

AES BloN Şifresinin Anahtar Genişletme Rutininin Geliştirilmesi ve

AES BloN Şifresinin Anahtar Genişletme Rutininin Geliştirilmesi ve YHUVL\RQODUÕQGDNL DQDKWDU SODQODPD DOJRULWPDVÕQÕQ$(6-128 (128-ELWDQDKWDUNXOODQDQ$(6EORNúLIUHVL YHUVL\RQXQDJ|UH GDKD \DYDú \D\ÕOÕP |]HOOL÷L VD÷ODPDVÕ RODUDN YHULOHELOLU $\UÕFD ]...

Detaylı

Özgün Bir Şifreleme Algoritması Kullanan Güvenli E

Özgün Bir Şifreleme Algoritması Kullanan Güvenli E Herhangi bir e-SRVWD VXQXFX\D ED÷ODQÕUNHQ QRUPDO ELU TCP/IP ED÷ODQWÕVÕ \DSÕOPDNWDGÕU 323 LOH LOJLOL JHUHNOL

Detaylı

DNS Güçlendirme Saldırısı RisN Analizi

DNS Güçlendirme Saldırısı RisN Analizi 7/¶ye ve \DSÕODQ LúOHP PLNWDUÕQÕQ GD  PLO\RQX EXOPDVÕ beklenmektedir [2]. 'Q\DQÕQ GL÷HU ONHOHULQGH GH ,78 (International Telecommunication Union) verilerinHJ|UH PLO\DU NLúLQL...

Detaylı

Pinnacle Brochure

Pinnacle Brochure 0úWHULOHULPL]H GHWD\OÕ PDOL\HW DQDOL] VUHFL YH SL\DVD o|]POHPHOHUL LoLQ EHOLUOL ELU PDOL\HW PRGHOLQH HULúLP LPNkQÕ VD÷ODQPDNWDGÕU7P +D¿I dHOLN Detaylı

Türkçe

Türkçe 1308140110 MAHMOUD GHAZAL

Detaylı

GenetiN Algoritma ve TeNil Değer Ayrışımı Tabanlı Yeni Bir Kırılgan

GenetiN Algoritma ve TeNil Değer Ayrışımı Tabanlı Yeni Bir Kırılgan 3UR$VLF WLSL )3*$ HOHPDQÕGÕU dDOÕúPD NDSVDPÕQGD DUDúWÕUPDFÕODU DQDOL] HGLOHQ )3*$ HOHPDQÕQÕQ -7$* DUD\]QH \R÷XQODúPÕúODUGÕU %X DUD\] DUDFÕOÕ÷Õ LOH

Detaylı