Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacksopen access

Authors
Park, SeungunSeo, AriaCheong, MuyoungKim, HyunsuKim, JaecheolSon, Yunsik
Issue Date
Jun-2025
Publisher
MDPI
Keywords
side-channel attack; cryptographic security; hiding technique; dummy data; deep learning model; power consumption pattern; cyber-physical system
Citation
Applied Sciences, v.15, no.13, pp 1 - 22
Pages
22
Indexed
SCIE
SCOPUS
Journal Title
Applied Sciences
Volume
15
Number
13
Start Page
1
End Page
22
URI
https://scholarworks.dongguk.edu/handle/sw.dongguk/58768
DOI
10.3390/app15136981
ISSN
2076-3417
2076-3417
Abstract
(1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of complex countermeasures. Traditional countermeasures, such as hiding techniques, attempt to obscure power consumption patterns; however, their effectiveness has been increasingly challenged. This study evaluates the vulnerability of dummy power traces against deep learning-based SCAs (DL-SCAs). (2) Methods: A power trace dataset was generated using a simulation environment based on Quick Emulator (QEMU) and GNU Debugger (GDB), integrating dummy traces to obfuscate execution signatures. DL models, including a Recurrent Neural Network (RNN), a Bidirectional RNN (Bi-RNN), and a Multi-Layer Perceptron (MLP), were used to evaluate classification performance. (3) Results: The models trained with dummy traces achieved high classification accuracy, with the MLP model reaching 97.81% accuracy and an F1-score of 97.77%. Despite the added complexity, DL models effectively distinguished real and dummy traces, highlighting limitations in existing hiding techniques. (4) Conclusions: These findings highlight the need for adaptive countermeasures against DL-SCAs. Future research should explore dynamic obfuscation techniques, adversarial training, and comprehensive evaluations of broader cryptographic algorithms. This study underscores the urgency of evolving security paradigms to defend against artificial intelligence-powered attacks.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Son, Yun Sik photo

Son, Yun Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE