{"id":"https://openalex.org/W4413320868","doi":"https://doi.org/10.1109/iolts65288.2025.11117044","title":"Side-Channel Attack Detection Using gem5 and Machine Learning: A Case Study on Fault-Based Attacks in RISC-V","display_name":"Side-Channel Attack Detection Using gem5 and Machine Learning: A Case Study on Fault-Based Attacks in RISC-V","publication_year":2025,"publication_date":"2025-07-07","ids":{"openalex":"https://openalex.org/W4413320868","doi":"https://doi.org/10.1109/iolts65288.2025.11117044"},"language":"en","primary_location":{"id":"doi:10.1109/iolts65288.2025.11117044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts65288.2025.11117044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026368134","display_name":"Muhammad Isa Khan","orcid":"https://orcid.org/0000-0002-3324-0532"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Mahreen Khan","raw_affiliation_strings":["Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048830959","display_name":"Maria Mushtaq","orcid":"https://orcid.org/0000-0003-0046-2582"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Maria Mushtaq","raw_affiliation_strings":["Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110715651","display_name":"Renaud Pacalet","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Renaud Pacalet","raw_affiliation_strings":["Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058794408","display_name":"Ludovic Apvrille","orcid":"https://orcid.org/0000-0002-1167-4639"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ludovic Apvrille","raw_affiliation_strings":["Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Telecom Paris, Institut Polytechnique de Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026368134"],"corresponding_institution_ids":["https://openalex.org/I12356871"],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87090431,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7994053363800049},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7638710141181946},{"id":"https://openalex.org/keywords/reduced-instruction-set-computing","display_name":"Reduced instruction set computing","score":0.6967177391052246},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.49744608998298645},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.48622551560401917},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.45868492126464844},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42042276263237},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37580645084381104},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3211520314216614},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2795957922935486},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22868698835372925},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21877482533454895},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.20399126410484314},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1897168755531311},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.16767668724060059}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7994053363800049},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7638710141181946},{"id":"https://openalex.org/C126298526","wikidata":"https://www.wikidata.org/wiki/Q189376","display_name":"Reduced instruction set computing","level":3,"score":0.6967177391052246},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.49744608998298645},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.48622551560401917},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.45868492126464844},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42042276263237},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37580645084381104},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3211520314216614},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2795957922935486},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22868698835372925},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21877482533454895},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.20399126410484314},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1897168755531311},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.16767668724060059},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iolts65288.2025.11117044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts65288.2025.11117044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1930624869","https://openalex.org/W1993482360","https://openalex.org/W2101234009","https://openalex.org/W2473598730","https://openalex.org/W2507765405","https://openalex.org/W2522718524","https://openalex.org/W2792326895","https://openalex.org/W2803900647","https://openalex.org/W3015702715","https://openalex.org/W3016526453","https://openalex.org/W3036557299","https://openalex.org/W4239510810","https://openalex.org/W4384948664"],"related_works":["https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W2604133224","https://openalex.org/W2136687465","https://openalex.org/W3122756779","https://openalex.org/W3016859066","https://openalex.org/W4234532445","https://openalex.org/W5280335","https://openalex.org/W4200321003","https://openalex.org/W3042003498"],"abstract_inverted_index":{"Microarchitectural":[0],"side-channel":[1,63,183],"attacks":[2,21,130,184],"pose":[3],"a":[4,14,39,81,189],"significant":[5],"threat":[6],"to":[7,79,110,181],"modern":[8],"computing":[9],"architectures.":[10],"This":[11],"paper":[12],"presents":[13],"machine":[15,75,149,168],"learning-based":[16],"methodology":[17,178],"for":[18,128,192],"detecting":[19],"these":[20],"using":[22,106],"the":[23,28,69,97,103,117,124],"gem5":[24,56,145],"simulator,":[25],"focusing":[26],"on":[27,34,132],"recently":[29],"discovered":[30],"Flush+Fault":[31,129,155],"attack":[32,51,91],"[6]":[33,131],"RISC-V.":[35],"Our":[36,141],"approach":[37,191],"follows":[38],"three-phase":[40],"process.":[41],"The":[42,65,93],"first":[43,125],"phase":[44,67,95],"is":[45,68,96,123,179],"data":[46],"collection,":[47],"where":[48,72,100],"we":[49,73,101],"simulate":[50],"and":[52,57,90,114,170,185],"non-attack":[53],"scenarios":[54],"in":[55,137],"extract":[58],"microarchitectural":[59,194],"features":[60],"indicative":[61],"of":[62,85,119],"activity.":[64],"second":[66],"training":[70],"phase,":[71,99],"utilize":[74],"learning":[76,150],"(ML)":[77],"techniques":[78],"build":[80],"classification":[82],"model":[83,105],"capable":[84],"distinguishing":[86],"between":[87],"normal":[88],"execution":[89],"patterns.":[92],"last":[94],"testing":[98],"evaluate":[102],"trained":[104],"various":[107],"performance":[108],"metrics":[109,146],"validate":[111],"its":[112,135],"accuracy":[113,159],"precision.":[115],"To":[116],"best":[118],"our":[120],"knowledge,":[121],"this":[122,177],"detection":[126],"framework":[127],"RISC-V,":[133],"showcasing":[134],"effectiveness":[136],"mitigating":[138],"emerging":[139],"threats.":[140],"results":[142],"indicate":[143],"that":[144],"combined":[147],"with":[148,160,165,172],"models":[151],"can":[152],"reliably":[153],"detect":[154],"attacks,":[156],"achieving":[157],"0.99":[158],"random":[161],"forest":[162],"(RF),":[163],"0.96":[164],"support":[166],"vector":[167],"(SVM),":[169],"0.95":[171],"na\u00efve":[173],"bayes":[174],"(NB).":[175],"Moreover,":[176],"adaptable":[180],"different":[182],"architectures,":[186],"making":[187],"it":[188],"promising":[190],"strengthening":[193],"security.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
