{"id":"https://openalex.org/W4416922923","doi":"https://doi.org/10.1109/lca.2025.3639372","title":"LeakDiT: Diffusion Transformers for Trace-Augmented Side-Channel Analysis","display_name":"LeakDiT: Diffusion Transformers for Trace-Augmented Side-Channel Analysis","publication_year":2025,"publication_date":"2025-12-02","ids":{"openalex":"https://openalex.org/W4416922923","doi":"https://doi.org/10.1109/lca.2025.3639372"},"language":null,"primary_location":{"id":"doi:10.1109/lca.2025.3639372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lca.2025.3639372","pdf_url":null,"source":{"id":"https://openalex.org/S17643076","display_name":"IEEE Computer Architecture Letters","issn_l":"1556-6056","issn":["1556-6056","1556-6064","2473-2575"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computer Architecture Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064588553","display_name":"Inseop Lee","orcid":"https://orcid.org/0000-0002-9822-9860"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Insup Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea","School of Cybersecurity, Korea University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-9822-9860","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072687179","display_name":"Daehyeon Bae","orcid":"https://orcid.org/0000-0002-5523-6710"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Daehyeon Bae","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea","School of Cybersecurity, Korea University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-5523-6710","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078931547","display_name":"Seokhie Hong","orcid":"https://orcid.org/0000-0001-7506-4023"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seokhie Hong","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea","School of Cybersecurity, Korea University, Seoul, Republic of Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100413944","display_name":"Sangjin Lee","orcid":"https://orcid.org/0000-0002-6809-5179"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sangjin Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea","School of Cybersecurity, Korea University, Seoul, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-6809-5179","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064588553"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19393967,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":"5","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.955299973487854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.955299973487854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.01769999973475933,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0052999998442828655,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.6879000067710876},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.4878999888896942},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.41780000925064087},{"id":"https://openalex.org/keywords/variance","display_name":"Variance (accounting)","score":0.38370001316070557},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.37059998512268066},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.34389999508857727},{"id":"https://openalex.org/keywords/diffusion","display_name":"Diffusion","score":0.33550000190734863}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6970000267028809},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.6879000067710876},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4878999888896942},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.4352000057697296},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.41780000925064087},{"id":"https://openalex.org/C196083921","wikidata":"https://www.wikidata.org/wiki/Q7915758","display_name":"Variance (accounting)","level":2,"score":0.38370001316070557},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.37059998512268066},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35359999537467957},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.34389999508857727},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.33550000190734863},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3240000009536743},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3206999897956848},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3041999936103821},{"id":"https://openalex.org/C92548554","wikidata":"https://www.wikidata.org/wiki/Q2262868","display_name":"Domain model","level":3,"score":0.2922999858856201},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2915000021457672},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.27889999747276306},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2648000121116638},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.2526000142097473},{"id":"https://openalex.org/C8272713","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Stochastic process","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lca.2025.3639372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lca.2025.3639372","pdf_url":null,"source":{"id":"https://openalex.org/S17643076","display_name":"IEEE Computer Architecture Letters","issn_l":"1556-6056","issn":["1556-6056","1556-6064","2473-2575"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computer Architecture Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2746796098","https://openalex.org/W2990296674","https://openalex.org/W2996022685","https://openalex.org/W4226069231","https://openalex.org/W4245524709","https://openalex.org/W4390872297","https://openalex.org/W4396689114","https://openalex.org/W4399930930","https://openalex.org/W4405262996","https://openalex.org/W4405963753"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"learning":[1],"has":[2],"been":[3],"extensively":[4],"used":[5],"in":[6],"side-channel":[7],"analysis":[8],"(SCA),":[9],"making":[10],"trace":[11,25],"data":[12],"insufficiency":[13],"and":[14,44,98],"class":[15],"imbalance":[16],"a":[17,59,71],"critical":[18],"challenge.":[19],"Although":[20],"several":[21],"studies":[22],"have":[23],"explored":[24],"augmentation":[26],"with":[27],"generative":[28],"models,":[29],"two":[30],"core":[31],"limitations":[32],"remain:":[33],"(i)":[34],"insufficient":[35],"integration":[36],"of":[37,48,102],"SCA":[38,96],"domain":[39],"knowledge":[40],"into":[41],"the":[42,85,100],"models":[43],"(ii)":[45],"limited":[46],"adoption":[47],"state-of-the-art":[49],"diffusion":[50],"transformers":[51],"(DiT).":[52],"This":[53],"letter":[54],"presents":[55],"<sc":[56,67,92],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[57,68,93],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">LeakDiT</small>,":[58],"domain-specific":[60],"one-dimensional":[61],"DiT":[62],"that":[63,83,91],"generates":[64],"high-quality":[65],"traces.":[66],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">LeakDiT</small>":[69,94],"introduces":[70],"loss":[72],"based":[73],"on":[74],"normalized":[75],"inter-class":[76],"variance":[77],"(NICV)":[78],"to":[79],"produce":[80],"realistic":[81],"traces":[82,104],"preserve":[84],"leakage":[86],"structure.":[87],"Experimental":[88],"results":[89],"demonstrate":[90],"improves":[95],"performance":[97],"reduces":[99],"number":[101],"required":[103],"for":[105],"key":[106],"recovery.":[107]},"counts_by_year":[],"updated_date":"2026-01-01T23:40:50.289205","created_date":"2025-12-02T00:00:00"}
