🪪 About | 🏷️ Description | 🗃️ Usage | 🔗 Citation | 📝 Paper
This repository contains the dataset for the paper: Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks
SCADataset is a dataset for Side-Channel Analysis (SCA) related to cryptographic algorithms. This dataset includes power consumption data during the execution of various cryptographic algorithms (DES, Hash, RSA) and can be utilized for research and analysis of side-channel analysis.
- Qemu
- GDB
- Elmo
Sequence: A unique identifier representing the order of the data.Power: The power consumption value measured during the execution of cryptographic algorithms.label: The label of the data:0: Original data1: Dummy data
instruction: The assembly instruction executed.context: Contextual information related to the cryptographic algorithm.
- Total number of records: 832,555
- Cryptographic algorithms: DES, Hash, RSA
- Labels:
0: Original data1: Dummy data
This dataset can be used for the following research and analysis purposes:
- Analyzing the vulnerability of hiding techniques to side-channel attacks.
- Training machine learning models for side-channel analysis.
- Studying power consumption patterns of cryptographic algorithms.
If you use this dataset for your research, please cite the following paper.
Title: Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks
DOI: https://doi.org/10.3390/app15136981
@article{park2025evaluating,
journal = {Applied Sciences},
title = {Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks},
doi = {https://www.mdpi.com/2076-3417/15/13/6981},
author = {Park, Seungun and Seo, Aria and Cheong, Muyoung and Kim, Hyunsu and Kim, JaeCheol and Son, Yunsik},
year = {2025}
}