{"id":"https://openalex.org/W4390189355","doi":"https://doi.org/10.1109/milcom58377.2023.10356226","title":"Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis","display_name":"Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4390189355","doi":"https://doi.org/10.1109/milcom58377.2023.10356226"},"language":"en","primary_location":{"id":"doi:10.1109/milcom58377.2023.10356226","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom58377.2023.10356226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006961953","display_name":"Kurt A. Vedros","orcid":"https://orcid.org/0000-0001-5668-0664"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kurt A. Vedros","raw_affiliation_strings":["University of Idaho,Computer Science Department,Idaho Falls,Idaho","Computer Science Department, University of Idaho, Idaho Falls, Idaho"],"affiliations":[{"raw_affiliation_string":"University of Idaho,Computer Science Department,Idaho Falls,Idaho","institution_ids":["https://openalex.org/I155093810"]},{"raw_affiliation_string":"Computer Science Department, University of Idaho, Idaho Falls, Idaho","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088023851","display_name":"Constantinos Kolias","orcid":"https://orcid.org/0000-0002-3020-291X"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Constantinos Kolias","raw_affiliation_strings":["University of Idaho,Computer Science Department,Idaho Falls,Idaho","Computer Science Department, University of Idaho, Idaho Falls, Idaho"],"affiliations":[{"raw_affiliation_string":"University of Idaho,Computer Science Department,Idaho Falls,Idaho","institution_ids":["https://openalex.org/I155093810"]},{"raw_affiliation_string":"Computer Science Department, University of Idaho, Idaho Falls, Idaho","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029832036","display_name":"Robert C. Ivans","orcid":"https://orcid.org/0000-0003-3923-2389"},"institutions":[{"id":"https://openalex.org/I2800102766","display_name":"Idaho National Laboratory","ror":"https://ror.org/00ty2a548","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I2800102766","https://openalex.org/I2801818860"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert C. Ivans","raw_affiliation_strings":["Idaho National Labs,Idaho Falls,Idaho","Idaho National Labs, Idaho Falls, Idaho"],"affiliations":[{"raw_affiliation_string":"Idaho National Labs,Idaho Falls,Idaho","institution_ids":["https://openalex.org/I2800102766"]},{"raw_affiliation_string":"Idaho National Labs, Idaho Falls, Idaho","institution_ids":["https://openalex.org/I2800102766"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006961953"],"corresponding_institution_ids":["https://openalex.org/I155093810"],"apc_list":null,"apc_paid":null,"fwci":0.2033,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48914064,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"716","last_page":"721"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.805404543876648},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.7179216146469116},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6166597008705139},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6066006422042847},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5686444044113159},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.5673537850379944},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.546297550201416},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.4709252715110779},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4452230632305145},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3697572350502014},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3534048795700073},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3533586859703064},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11739182472229004}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.805404543876648},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.7179216146469116},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6166597008705139},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6066006422042847},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5686444044113159},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.5673537850379944},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.546297550201416},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.4709252715110779},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4452230632305145},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3697572350502014},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3534048795700073},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3533586859703064},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11739182472229004},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom58377.2023.10356226","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom58377.2023.10356226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1973276154","https://openalex.org/W2113577581","https://openalex.org/W2533642151","https://openalex.org/W2802164016","https://openalex.org/W2808659260","https://openalex.org/W2884466206","https://openalex.org/W2950860056","https://openalex.org/W2996587685","https://openalex.org/W3101692599","https://openalex.org/W3111004365","https://openalex.org/W3118164623","https://openalex.org/W3215382533","https://openalex.org/W4226063663","https://openalex.org/W4232592560","https://openalex.org/W4361187301","https://openalex.org/W6713645886","https://openalex.org/W6810926057","https://openalex.org/W6847227953"],"related_works":["https://openalex.org/W4389116644","https://openalex.org/W2153315159","https://openalex.org/W3103844505","https://openalex.org/W259157601","https://openalex.org/W4205463238","https://openalex.org/W2761785940","https://openalex.org/W1482209366","https://openalex.org/W2110523656","https://openalex.org/W2521627374","https://openalex.org/W2100349471"],"abstract_inverted_index":{"The":[0,140],"analysis":[1],"of":[2,24,35,58,65,71,86,107,112,121,137,157,188,199,243,248,257,271],"EM":[3,113,177],"signals":[4,40,61,114,167,209],"has":[5],"become":[6],"a":[7,11,72,105,158,185,239],"popular":[8],"approach":[9,194],"as":[10,160,173,276],"means":[12],"for":[13,62,109,135,196,245,254],"achieving":[14],"non-intrusive":[15],"and":[16,80,162,252],"external":[17],"anomaly":[18,94,201,235],"detection,":[19],"particularly":[20],"in":[21,33,52,90,163],"the":[22,53,56,63,110,119,126,152,174,180,197,246,255,268,272,279],"realm":[23],"embedded":[25],"devices.":[26],"Previous":[27],"efforts":[28,76],"have":[29,191],"shown":[30],"huge":[31],"potential":[32],"terms":[34],"discriminative":[36],"precision":[37],"between":[38],"those":[39],"that":[41,129,150,207,213],"correspond":[42],"to":[43,131,278,284],"normal":[44],"versus":[45],"anomalous":[46],"operations.":[47],"However,":[48],"virtually":[49],"all":[50,67],"research":[51],"area":[54],"neglects":[55],"challenge":[57],"gathering":[59],"high-quality":[60],"purpose":[64],"fingerprinting":[66],"possible":[68],"execution":[69],"paths":[70,88],"program.":[73],"Today,":[74],"such":[75],"are":[77],"mainly":[78],"human-driven":[79],"because":[81],"there":[82],"may":[83],"be":[84],"hundreds":[85],"alternative":[87],"even":[89,217],"simple":[91],"programs,":[92],"EM-based":[93],"detection":[95,202,236,247,256,286],"approaches":[96],"exhibit":[97],"poor":[98],"scalability.":[99],"In":[100],"this":[101,124],"work,":[102],"we":[103,190],"introduce":[104],"set":[106],"methods":[108],"generation":[111],"directly":[115],"from":[116],"code.":[117],"To":[118],"best":[120],"our":[122,193],"knowledge,":[123],"is":[125,143],"first":[127],"effort":[128],"aims":[130],"address":[132],"code-to-signal":[133],"synthesis":[134],"purposes":[136],"side-channel":[138],"analysis.":[139],"proposed":[141,181],"framework":[142],"based":[144],"on":[145],"Generative":[146],"Adversarial":[147],"Networks":[148],"(GAN)":[149],"receive":[151],"corresponding":[153,175],"assembly":[154],"(ASM)":[155],"code":[156,219,226],"program":[159],"input":[161],"turn":[164],"produce":[165],"artificial":[166],"which":[168],"bear":[169],"near-identical":[170],"morphological":[171],"characteristics":[172],"real":[176],"signals.":[178],"Although":[179],"method":[182],"pertains":[183],"across":[184],"wide":[186],"range":[187],"applications":[189],"evaluated":[192],"specifically":[195],"task":[198],"training":[200],"models.":[203],"We":[204],"experimentally":[205],"showed":[206],"synthetic":[208],"can":[210,214],"train":[211],"models":[212,237],"then":[215],"detect":[216],"stealthy":[218],"injection":[220],"attacks":[221],"i.e.,":[222,266],"very":[223],"challenging":[224],"minimal":[225],"alterations":[227],"with":[228],"great":[229],"accuracy.":[230,287],"More":[231],"specifically,":[232],"synthetically":[233],"trained":[234],"achieve":[238],"near-perfect":[240],"AUC":[241],"score":[242],"0.993":[244],"four":[249],"malicious":[250,259],"instructions":[251],"0.981":[253],"two":[258],"instructions.":[260],"Interestingly,":[261],"applying":[262],"rudimentary":[263],"feature":[264],"engineering":[265],"considering":[267],"maximum":[269],"amplitude":[270],"signal":[273,282],"per":[274],"cycle":[275],"opposed":[277],"entire":[280],"raw":[281],"leads":[283],"perfect":[285]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
