Next Article in Journal
IoT Socioenvironmental Assessment Instrument: Validation Process Applying Delphi Method
Previous Article in Journal
Extraction, Detection, and Quantification Methods for Analyzing Glyphosate and AMPA in Foods: Challenges and Opportunities
Previous Article in Special Issue
Synergizing Intelligence and Privacy: A Review of Integrating Internet of Things, Large Language Models, and Federated Learning in Advanced Networked Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks

1
Department of Computer Science and Artificial Intelligence, Dongguk University, Seoul 04620, Republic of Korea
2
Department of Computer Science and Engineering, Dongguk University, Seoul 04620, Republic of Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(13), 6981; https://doi.org/10.3390/app15136981
Submission received: 14 May 2025 / Accepted: 17 June 2025 / Published: 20 June 2025

Abstract

(1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of complex countermeasures. Traditional countermeasures, such as hiding techniques, attempt to obscure power consumption patterns; however, their effectiveness has been increasingly challenged. This study evaluates the vulnerability of dummy power traces against deep learning-based SCAs (DL-SCAs). (2) Methods: A power trace dataset was generated using a simulation environment based on Quick Emulator (QEMU) and GNU Debugger (GDB), integrating dummy traces to obfuscate execution signatures. DL models, including a Recurrent Neural Network (RNN), a Bidirectional RNN (Bi-RNN), and a Multi-Layer Perceptron (MLP), were used to evaluate classification performance. (3) Results: The models trained with dummy traces achieved high classification accuracy, with the MLP model reaching 97.81% accuracy and an F1-score of 97.77%. Despite the added complexity, DL models effectively distinguished real and dummy traces, highlighting limitations in existing hiding techniques. (4) Conclusions: These findings highlight the need for adaptive countermeasures against DL-SCAs. Future research should explore dynamic obfuscation techniques, adversarial training, and comprehensive evaluations of broader cryptographic algorithms. This study underscores the urgency of evolving security paradigms to defend against artificial intelligence-powered attacks.
Keywords: side-channel attack; cryptographic security; hiding technique; dummy data; deep learning model; power consumption pattern; cyber-physical system side-channel attack; cryptographic security; hiding technique; dummy data; deep learning model; power consumption pattern; cyber-physical system

Share and Cite

MDPI and ACS Style

Park, S.; Seo, A.; Cheong, M.; Kim, H.; Kim, J.; Son, Y. Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks. Appl. Sci. 2025, 15, 6981. https://doi.org/10.3390/app15136981

AMA Style

Park S, Seo A, Cheong M, Kim H, Kim J, Son Y. Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks. Applied Sciences. 2025; 15(13):6981. https://doi.org/10.3390/app15136981

Chicago/Turabian Style

Park, Seungun, Aria Seo, Muyoung Cheong, Hyunsu Kim, JaeCheol Kim, and Yunsik Son. 2025. "Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks" Applied Sciences 15, no. 13: 6981. https://doi.org/10.3390/app15136981

APA Style

Park, S., Seo, A., Cheong, M., Kim, H., Kim, J., & Son, Y. (2025). Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks. Applied Sciences, 15(13), 6981. https://doi.org/10.3390/app15136981

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop