Detailed Information

Cited 2 time in webofscience Cited 3 time in scopus
Metadata Downloads

Enhancing deep learning-based side-channel analysis using feature engineering in a fully simulated IoT system

Full metadata record
DC Field Value Language
dc.contributor.authorAlabdulwahab, Saleh-
dc.contributor.authorCheong, Muyoung-
dc.contributor.authorSeo, Aria-
dc.contributor.authorKim, Young-Tak-
dc.contributor.authorSon, Yunsik-
dc.date.accessioned2025-03-05T01:43:13Z-
dc.date.available2025-03-05T01:43:13Z-
dc.date.issued2025-03-
dc.identifier.issn0957-4174-
dc.identifier.issn1873-6793-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/57834-
dc.description.abstractThe increasing integration of cloud and embedded systems has made security more critical. Despite efforts to implement countermeasures against attacks, new threats have constantly emerged. Deep learning (DL) is most notable for side-channel disassembly attacks that expose cloud-to-things operations. This underscores the need to develop effective tools to test a system's robustness against such attacks. In this study, we developed a robust instruction-level side-channel disassembler for hiding countermeasures in a fully simulated embedded system. We investigated the effect of a moving-window-based feature engineering technique using statistical methods on the performance of side-channel disassembly attacks orchestrated via DL models. In addition, we propose a moving log-transformed temporal integration feature that enhances the performance of DL models for detecting and inferencing tasks. The created dataset was applied for two DL tasks: detecting hiding countermeasures and inferring assembly instructions. Using our feature engineering method, we found that the artificial neural network (ANN) showed an accuracy of 98.81% for hiding countermeasure detection, and the gated recurrent unit (GRU) model inferred the assembly sequence with 98.7% accuracy. These results highlight the need for advanced hardware- and software-level security measures to prevent side-channel attacks on embedded devices as potential vulnerabilities in the cloud infrastructure.-
dc.format.extent16-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier Ltd-
dc.titleEnhancing deep learning-based side-channel analysis using feature engineering in a fully simulated IoT system-
dc.typeArticle-
dc.publisher.location네델란드-
dc.identifier.doi10.1016/j.eswa.2024.126079-
dc.identifier.scopusid2-s2.0-85211991898-
dc.identifier.wosid001385939600001-
dc.identifier.bibliographicCitationExpert Systems with Applications, v.266, pp 1 - 16-
dc.citation.titleExpert Systems with Applications-
dc.citation.volume266-
dc.citation.startPage1-
dc.citation.endPage16-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaOperations Research & Management Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryOperations Research & Management Science-
dc.subject.keywordPlusCHALLENGES-
dc.subject.keywordPlusPOWER-
dc.subject.keywordAuthorSide-channel attacks-
dc.subject.keywordAuthorFeature engineering-
dc.subject.keywordAuthorHiding countermeasures-
dc.subject.keywordAuthorDisassembly attacks-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorReverse engineering-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Son, Yun Sik photo

Son, Yun Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE