Enhancing deep learning-based side-channel analysis using feature engineering in a fully simulated IoT system
- Authors
- Alabdulwahab, Saleh; Cheong, Muyoung; Seo, Aria; Kim, Young-Tak; Son, Yunsik
- Issue Date
- Mar-2025
- Publisher
- Elsevier
- Keywords
- Side-channel attacks; Feature engineering; Hiding countermeasures; Disassembly attacks; Deep learning; Reverse engineering
- Citation
- Expert Systems with Applications, v.266
- Indexed
- SCIE
SCOPUS
- Journal Title
- Expert Systems with Applications
- Volume
- 266
- URI
- https://scholarworks.korea.ac.kr/kumedicine/handle/2021.sw.kumedicine/75780
- DOI
- 10.1016/j.eswa.2024.126079
- ISSN
- 0957-4174
1873-6793
- Abstract
- The increasing integration of cloud and embedded systems has made security more critical. Despite efforts to implement countermeasures against attacks, new threats have constantly emerged. Deep learning (DL) is most notable for side-channel disassembly attacks that expose cloud-to-things operations. This underscores the need to develop effective tools to test a system's robustness against such attacks. In this study, we developed a robust instruction-level side-channel disassembler for hiding countermeasures in a fully simulated embedded system. We investigated the effect of a moving-window-based feature engineering technique using statistical methods on the performance of side-channel disassembly attacks orchestrated via DL models. In addition, we propose a moving log-transformed temporal integration feature that enhances the performance of DL models for detecting and inferencing tasks. The created dataset was applied for two DL tasks: detecting hiding countermeasures and inferring assembly instructions. Using our feature engineering method, we found that the artificial neural network (ANN) showed an accuracy of 98.81% for hiding countermeasure detection, and the gated recurrent unit (GRU) model inferred the assembly sequence with 98.7% accuracy. These results highlight the need for advanced hardware- and software-level security measures to prevent side-channel attacks on embedded devices as potential vulnerabilities in the cloud infrastructure.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - 4. Research institute > Research Institute of Molecular Medicine and Nutrition > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.