Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Seungun-
dc.contributor.authorSeo, Aria-
dc.contributor.authorCheong, Muyoung-
dc.contributor.authorKim, Hyunsu-
dc.contributor.authorKim, Jaecheol-
dc.contributor.authorSon, Yunsik-
dc.date.accessioned2025-07-22T01:30:12Z-
dc.date.available2025-07-22T01:30:12Z-
dc.date.issued2025-06-
dc.identifier.issn2076-3417-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/58768-
dc.description.abstract(1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of complex countermeasures. Traditional countermeasures, such as hiding techniques, attempt to obscure power consumption patterns; however, their effectiveness has been increasingly challenged. This study evaluates the vulnerability of dummy power traces against deep learning-based SCAs (DL-SCAs). (2) Methods: A power trace dataset was generated using a simulation environment based on Quick Emulator (QEMU) and GNU Debugger (GDB), integrating dummy traces to obfuscate execution signatures. DL models, including a Recurrent Neural Network (RNN), a Bidirectional RNN (Bi-RNN), and a Multi-Layer Perceptron (MLP), were used to evaluate classification performance. (3) Results: The models trained with dummy traces achieved high classification accuracy, with the MLP model reaching 97.81% accuracy and an F1-score of 97.77%. Despite the added complexity, DL models effectively distinguished real and dummy traces, highlighting limitations in existing hiding techniques. (4) Conclusions: These findings highlight the need for adaptive countermeasures against DL-SCAs. Future research should explore dynamic obfuscation techniques, adversarial training, and comprehensive evaluations of broader cryptographic algorithms. This study underscores the urgency of evolving security paradigms to defend against artificial intelligence-powered attacks.-
dc.format.extent22-
dc.language영어-
dc.language.isoENG-
dc.publisherMDPI-
dc.titleEvaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks-
dc.typeArticle-
dc.publisher.location스위스-
dc.identifier.doi10.3390/app15136981-
dc.identifier.scopusid2-s2.0-105010323477-
dc.identifier.wosid001526238300001-
dc.identifier.bibliographicCitationApplied Sciences, v.15, no.13, pp 1 - 22-
dc.citation.titleApplied Sciences-
dc.citation.volume15-
dc.citation.number13-
dc.citation.startPage1-
dc.citation.endPage22-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordAuthorside-channel attack-
dc.subject.keywordAuthorcryptographic security-
dc.subject.keywordAuthorhiding technique-
dc.subject.keywordAuthordummy data-
dc.subject.keywordAuthordeep learning model-
dc.subject.keywordAuthorpower consumption pattern-
dc.subject.keywordAuthorcyber-physical system-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Son, Yun Sik photo

Son, Yun Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE