Cited 0 time in
Advanced Side-Channel Evaluation Using Contextual Deep Learning-Based Leakage Modeling
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Alabdulwahab, Saleh | - |
| dc.contributor.author | Kim, JaeCheol | - |
| dc.contributor.author | Kim, Young-Tak | - |
| dc.contributor.author | Son, Yunsik | - |
| dc.date.accessioned | 2026-03-04T05:00:25Z | - |
| dc.date.available | 2026-03-04T05:00:25Z | - |
| dc.date.issued | 2026-02 | - |
| dc.identifier.issn | 1049-331X | - |
| dc.identifier.issn | 1557-7392 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/63885 | - |
| dc.description.abstract | Side-channel attacks (SCAs) exploit power analysis to extract secret information. Researchers have employed this technique to disassemble software and retrieve cryptographic keys by examining power consumption or electromagnetic emissions. They utilized hardware or Hamming-based fluctuations measurement to profile or model the power leakage. Developers employ power modeling to comprehend software leakage, although manually profiling the power trace across various devices and architectures requires time and effort. This work proposes a custom deep learning (DL) method to model the power trace. The DL model was trained to analyze how each assembly instruction produces leakage based on its context with other instructions. The proposed method can predict the power trace with 0.9963 R² from unseen assembly instructions. This method automates device leakage testing and captures contextual and non-linear relationships to help developers understand the software behavior, significantly reducing the time and effort required for power modeling. The potential impact of this DL model on software security is that it can effectively mitigate the risk of SCAs, thus enhancing the overall security of software systems. © 2026 Copyright held by the owner/author(s). | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Association for Computing Machinery | - |
| dc.title | Advanced Side-Channel Evaluation Using Contextual Deep Learning-Based Leakage Modeling | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1145/3734219 | - |
| dc.identifier.scopusid | 2-s2.0-105030206429 | - |
| dc.identifier.wosid | 001696471500001 | - |
| dc.identifier.bibliographicCitation | ACM Transactions on Software Engineering and Methodology, v.35, no.2 | - |
| dc.citation.title | ACM Transactions on Software Engineering and Methodology | - |
| dc.citation.volume | 35 | - |
| dc.citation.number | 2 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Disassemble | - |
| dc.subject.keywordAuthor | Reverse engineering | - |
| dc.subject.keywordAuthor | Side channel attacks | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
