Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacksopen access
- Authors
- Park, Seungun; Seo, Aria; Cheong, Muyoung; Kim, Hyunsu; Kim, Jaecheol; Son, Yunsik
- Issue Date
- Jun-2025
- Publisher
- MDPI
- Keywords
- side-channel attack; cryptographic security; hiding technique; dummy data; deep learning model; power consumption pattern; cyber-physical system
- Citation
- Applied Sciences, v.15, no.13, pp 1 - 22
- Pages
- 22
- Indexed
- SCIE
SCOPUS
- Journal Title
- Applied Sciences
- Volume
- 15
- Number
- 13
- Start Page
- 1
- End Page
- 22
- URI
- https://scholarworks.dongguk.edu/handle/sw.dongguk/58768
- DOI
- 10.3390/app15136981
- ISSN
- 2076-3417
2076-3417
- Abstract
- (1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of complex countermeasures. Traditional countermeasures, such as hiding techniques, attempt to obscure power consumption patterns; however, their effectiveness has been increasingly challenged. This study evaluates the vulnerability of dummy power traces against deep learning-based SCAs (DL-SCAs). (2) Methods: A power trace dataset was generated using a simulation environment based on Quick Emulator (QEMU) and GNU Debugger (GDB), integrating dummy traces to obfuscate execution signatures. DL models, including a Recurrent Neural Network (RNN), a Bidirectional RNN (Bi-RNN), and a Multi-Layer Perceptron (MLP), were used to evaluate classification performance. (3) Results: The models trained with dummy traces achieved high classification accuracy, with the MLP model reaching 97.81% accuracy and an F1-score of 97.77%. Despite the added complexity, DL models effectively distinguished real and dummy traces, highlighting limitations in existing hiding techniques. (4) Conclusions: These findings highlight the need for adaptive countermeasures against DL-SCAs. Future research should explore dynamic obfuscation techniques, adversarial training, and comprehensive evaluations of broader cryptographic algorithms. This study underscores the urgency of evolving security paradigms to defend against artificial intelligence-powered attacks.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - ETC > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.