Pseudo-Labeling for Deep Learning-Based Side-Channel Disassembly Using Contextual Layer and Feature Engineering

dc.contributor.advisorSon, Yunsik
dc.contributor.authorAlabdulwahab, Saleh Sami S
dc.date.accessioned2025-08-26T04:53:32Z
dc.date.issued2025
dc.description.abstractEmbedded devices face critical cyber-attacks due to their lightweight design and the sensitive data they handle. Integrating cloud and embedded systems increases the need for security measures against threats. Among these threats are deep learning-based side-channel disassembly attacks, which can expose sensitive information or steal software intellectual properties. Conducting a security test to evaluate the systems against these threats is essential. However, the main challenges include a comprehensive and refined dataset for training deep learning-based side-channel attacks and the lack of public datasets; labeling and profiling such attacks are costly and time-consuming. Additionally, accurately disassembling a single instruction is difficult due to the multiple classes representing each instruction and the obfuscation caused by dummy instructions. This study aimed to create an advanced side-channel evaluation methodology that performs three main deep-learning tasks: profiling using context-aware pseudo-labeling techniques at an instruction level, a disassembly model enhanced with moving log-transformed temporal interaction features, and a sequence labeling model for the detection of dummy instructions using natural language processing techniques. Utilizing gated recurrent units, the proposed pseudo-labeling model achieved 0.996 R2 in estimating the power trace for the assembly instructions. The proposed features improved the disassembly model's accuracy to 0.993, outperforming the related works. Additionally, the detection of dummy instructions using a long short-term memory model reached an accuracy of 0.979. This study provides valuable insights and methodology for measuring the software robustness against side-channel attacks.
dc.format.extent161
dc.identifier.other10.23216/dgu.000000089549.11020.0002343
dc.identifier.urihttp://www.dcollection.net/handler/dgu/000000089549
dc.identifier.urihttps://hdl.handle.net/20.500.14154/76245
dc.language.isoen
dc.publisherSaudi Digital Library
dc.subjectSide-channel attacks
dc.subjectFeature engineering
dc.subjectDisassembly attacks
dc.subjectDeep learning
dc.subjectReverse engineering
dc.subjectPseudo-labeling
dc.subjectNatural language processing
dc.subjectMachine learning
dc.titlePseudo-Labeling for Deep Learning-Based Side-Channel Disassembly Using Contextual Layer and Feature Engineering
dc.typeThesis
sdl.degree.departmentComputer Science and Engineering
sdl.degree.disciplineInformation Security
sdl.degree.grantorDongguk University
sdl.degree.nameDoctor of Engineering

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
SACM-Dissertation.pdf
Size:
3.96 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed to upon submission
Description:

Copyright owned by the Saudi Digital Library (SDL) © 2025