{"id":"https://openalex.org/W4212770300","doi":"https://doi.org/10.5220/0010793000003116","title":"Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols","display_name":"Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4212770300","doi":"https://doi.org/10.5220/0010793000003116"},"language":"en","primary_location":{"id":"doi:10.5220/0010793000003116","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010793000003116","pdf_url":null,"source":{"id":"https://openalex.org/S4363608837","display_name":"Proceedings of the 14th International Conference on Agents and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Agents and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.5220/0010793000003116","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034484004","display_name":"Pritha Gupta","orcid":"https://orcid.org/0000-0002-7277-4633"},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Pritha Gupta","raw_affiliation_strings":["Department of Computer Science, Paderborn University, Warburger Str. 100, 33098 Paderborn, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Paderborn University, Warburger Str. 100, 33098 Paderborn, Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086784011","display_name":"Arunselvan Ramaswamy","orcid":"https://orcid.org/0000-0001-7547-8111"},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Arunselvan Ramaswamy","raw_affiliation_strings":["Department of Computer Science, Paderborn University, Warburger Str. 100, 33098 Paderborn, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Paderborn University, Warburger Str. 100, 33098 Paderborn, Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105660530","display_name":"J. Drees","orcid":"https://orcid.org/0000-0002-7982-9908"},"institutions":[{"id":"https://openalex.org/I167360494","display_name":"University of Wuppertal","ror":"https://ror.org/00613ak93","country_code":"DE","type":"education","lineage":["https://openalex.org/I167360494"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Drees","raw_affiliation_strings":["Department of Computing, University of Wuppertal, Gau\u00dfstra\u00dfe 20, 42119 Wuppertal, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computing, University of Wuppertal, Gau\u00dfstra\u00dfe 20, 42119 Wuppertal, Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I167360494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059439673","display_name":"Eyke H\u00fcllermeier","orcid":"https://orcid.org/0000-0002-9944-4108"},"institutions":[{"id":"https://openalex.org/I8204097","display_name":"Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen","ror":"https://ror.org/05591te55","country_code":"DE","type":"education","lineage":["https://openalex.org/I8204097"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Eyke H\u00fcllermeier","raw_affiliation_strings":["Institute of Informatics, University of Munich (LMU), Akademiestr. 7, 80538 Munich, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics, University of Munich (LMU), Akademiestr. 7, 80538 Munich, Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I8204097"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014309709","display_name":"Claudia Priesterjahn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Claudia Priesterjahn","raw_affiliation_strings":["achelos GmbH, Vattmannstra\u00dfe 1, 33100 Paderborn, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"achelos GmbH, Vattmannstra\u00dfe 1, 33100 Paderborn, Germany, --- Select a Country ---","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090157645","display_name":"Tibor Jager","orcid":"https://orcid.org/0000-0002-3205-7699"},"institutions":[{"id":"https://openalex.org/I167360494","display_name":"University of Wuppertal","ror":"https://ror.org/00613ak93","country_code":"DE","type":"education","lineage":["https://openalex.org/I167360494"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tibor Jager","raw_affiliation_strings":["Department of Computing, University of Wuppertal, Gau\u00dfstra\u00dfe 20, 42119 Wuppertal, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computing, University of Wuppertal, Gau\u00dfstra\u00dfe 20, 42119 Wuppertal, Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I167360494"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5034484004"],"corresponding_institution_ids":["https://openalex.org/I206945453"],"apc_list":null,"apc_paid":null,"fwci":0.4324,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.42384839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"152","last_page":"163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7454043626785278},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7394005060195923},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6499590873718262},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5793896913528442},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5644778609275818},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4743684232234955},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.42033839225769043},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.363849937915802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3307027220726013},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2250055968761444}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7454043626785278},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7394005060195923},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6499590873718262},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5793896913528442},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5644778609275818},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4743684232234955},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.42033839225769043},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.363849937915802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3307027220726013},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2250055968761444},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0010793000003116","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010793000003116","pdf_url":null,"source":{"id":"https://openalex.org/S4363608837","display_name":"Proceedings of the 14th International Conference on Agents and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Agents and Artificial Intelligence","raw_type":"proceedings-article"},{"id":"pmh:oai:epub.ub.uni-muenchen.de:91887","is_oa":true,"landing_page_url":"https://epub.ub.uni-muenchen.de/91887/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401845","display_name":"Open access LMU (Ludwid Maxmilian's Universitat Munchen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I8204097","host_organization_name":"Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen","host_organization_lineage":["https://openalex.org/I8204097"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doc-type:conferenceObject"}],"best_oa_location":{"id":"doi:10.5220/0010793000003116","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010793000003116","pdf_url":null,"source":{"id":"https://openalex.org/S4363608837","display_name":"Proceedings of the 14th International Conference on Agents and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Agents and Artificial Intelligence","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G352791218","display_name":null,"funder_award_id":"(BMBF)","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W3180573957","https://openalex.org/W3123987581","https://openalex.org/W2358406440","https://openalex.org/W2162805750","https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2043669269","https://openalex.org/W2103519941"],"abstract_inverted_index":{"Due":[0],"to":[1,32,55,84,99,115,125,131],"the":[2,43,71,104,138,146,149,159,188,191],"proliferation":[3],"of":[4,8,26,73,161,190],"a":[5,17,27,57,111,154],"large":[6],"amount":[7],"publicly":[9],"available":[10],"data,":[11],"information":[12,25,45,51],"leakage":[13],"(IL)":[14],"has":[15],"become":[16],"major":[18],"problem.":[19],"IL":[20],"occurs":[21],"when":[22],"secret":[23,50],"(sensitive)":[24],"system":[28,78],"is":[29],"inadvertently":[30],"disclosed":[31],"unauthorized":[33],"parties":[34],"through":[35],"externally":[36],"observable":[37,47],"information.":[38],"Standard":[39],"statistical":[40,123],"approaches":[41,64,94],"estimate":[42],"mutual":[44],"between":[46],"(input)":[48],"and":[49,80,97,122,182],"(output),":[52],"which":[53,118,143],"tends":[54],"be":[56,85],"difficult":[58],"problem":[59,160],"for":[60,101],"high-dimensional":[61],"input.":[62],"Current":[63],"based":[65],"on":[66,76,137,177],"(supervised)":[67],"machine":[68,120],"learning":[69,121],"using":[70],"accuracy":[72],"predictive":[74],"models":[75],"extracted":[77],"input":[79],"output":[81],"have":[82],"proven":[83],"more":[86],"effective":[87],"in":[88,103,148,167,180],"detecting":[89,116,162,178],"these":[90,93,127],"leakages.":[91],"However,":[92],"are":[95],"domain-specific":[96],"fail":[98],"account":[100],"imbalance":[102],"dataset.":[105],"In":[106,172],"this":[107],"paper,":[108],"we":[109,157],"present":[110],"robust":[112],"autonomous":[113],"approach":[114,186],"IL,":[117],"blends":[119],"techniques,":[124],"overcome":[126],"shortcomings.":[128],"We":[129],"propose":[130],"use":[132,155],"Fisher\u2019s":[133],"Exact":[134],"Test":[135],"(FET)":[136],"evaluated":[139],"confusion":[140],"matrix":[141],",":[142],"inherently":[144],"takes":[145],"imbalances":[147],"dataset":[150],"into":[151],"account.":[152],"As":[153],"case,":[156],"consider":[158],"padding":[163],"side-channels":[164],"or":[165],"ILs":[166,179],"systems":[168],"implementing":[169],"cryptographic":[170],"protocols.":[171],"an":[173],"extensive":[174],"experimental":[175],"study":[176],"synthetic":[181],"real-world":[183],"scenarios,":[184],"our":[185],"outperforms":[187],"state":[189],"art.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
