Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Advanced Side-Channel Evaluation Using Contextual Deep Learning-Based Leakage Modeling

Full metadata record
DC Field Value Language
dc.contributor.authorAlabdulwahab, Saleh-
dc.contributor.authorKim, JaeCheol-
dc.contributor.authorKim, Young-Tak-
dc.contributor.authorSon, Yunsik-
dc.date.accessioned2026-03-04T05:00:25Z-
dc.date.available2026-03-04T05:00:25Z-
dc.date.issued2026-02-
dc.identifier.issn1049-331X-
dc.identifier.issn1557-7392-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/63885-
dc.description.abstractSide-channel attacks (SCAs) exploit power analysis to extract secret information. Researchers have employed this technique to disassemble software and retrieve cryptographic keys by examining power consumption or electromagnetic emissions. They utilized hardware or Hamming-based fluctuations measurement to profile or model the power leakage. Developers employ power modeling to comprehend software leakage, although manually profiling the power trace across various devices and architectures requires time and effort. This work proposes a custom deep learning (DL) method to model the power trace. The DL model was trained to analyze how each assembly instruction produces leakage based on its context with other instructions. The proposed method can predict the power trace with 0.9963 R² from unseen assembly instructions. This method automates device leakage testing and captures contextual and non-linear relationships to help developers understand the software behavior, significantly reducing the time and effort required for power modeling. The potential impact of this DL model on software security is that it can effectively mitigate the risk of SCAs, thus enhancing the overall security of software systems. © 2026 Copyright held by the owner/author(s).-
dc.language영어-
dc.language.isoENG-
dc.publisherAssociation for Computing Machinery-
dc.titleAdvanced Side-Channel Evaluation Using Contextual Deep Learning-Based Leakage Modeling-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1145/3734219-
dc.identifier.scopusid2-s2.0-105030206429-
dc.identifier.wosid001696471500001-
dc.identifier.bibliographicCitationACM Transactions on Software Engineering and Methodology, v.35, no.2-
dc.citation.titleACM Transactions on Software Engineering and Methodology-
dc.citation.volume35-
dc.citation.number2-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorDisassemble-
dc.subject.keywordAuthorReverse engineering-
dc.subject.keywordAuthorSide channel attacks-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Son, Yun Sik photo

Son, Yun Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE