Home Browse Online First

Online First

Online First, unedited articles published online and citable. The final edited and typeset version of record will appear in the future.
Please wait a minute...
  • Select all
    |
  • Wu Yuhan, Lü Jiqiang
    Journal of Cybersecurity.
    Accepted: 2026-04-02

    Side-channel analysis (SCA), which extracts physical information such as power consumption and electromagnetic radiation during the operation of cryptographic devices to recover secret keys, is a critical technique for evaluating the security of cryptographic modules. Deep learning is widely adopted in this field due to its powerful feature extraction capabilities. However, the applicability of emerging neural network architectures needs systematic evaluation. Capsule networks (CapsNet), as an innovative architecture, are widely applied and perform well in image recognition, but their applications in side-channel analysis tasks remain limited. The suitability of CapsNet for SCA is investigated. A lightweight CapsNet architecture is designed, an exhaustive hyperparameter search is conducted, and Leading Degree (LD) is used as the core evaluation metric to determine optimal configurations. The performance of CapsNets is rigorously compared with state-of-the-art convolutional neural networks (CNN) based on the ASCAD dataset under identical experimental parameters. Experimental results demonstrate that CapsNets achieve only 59%~75% of the LD values of CNN under both the Hamming Weight (HW) and Identity (ID) leakage models. Furthermore, CapsNets exhibit slower convergence, poorer stability, and a parameter count 5 to 50 times higher than that of CNN, leading to significantly increased computational and spatial overhead. The performance gap stems from the misalignment between the spatial-semantic optimization objectives of CapsNets and the temporal pattern mining requirements of SCA. The dynamic routing mechanism has limited sensitivity to local temporal features, while excessive parameters amplify the upper bound of generalization error under limited data, thereby exacerbating overfitting risks. These results and analysis verify the inherent incompatibility between

  • ZHANG Dong, ZHAN Yichen, BAI JiaJu, GUAN ZhenYu
    Accepted: 2026-01-20

    To systematically explore the input and state space of HTTP protocol implementations and automate vulnerability discovery, a large language model-driven security testing method, LRPT, was proposed. Targeting text-based protocols such as HTTP in network devices, the method built an intelligent agent system centered on the DeepSeek model. It semantically analyzed limited captured traffic to infer protocol message formats. Based on these inferred formats, the system generated test requests, sent them to the server, and captured responses. The agent iteratively analyzed the responses to expand the protocol’s input and state space. On this basis, it autonomously generated test cases likely to trigger security flaws and detected potential vulnerabilities. Experimental results showed that the method could explore a broader range of request types and parameter combinations, even with minimal traffic samples, and uncovered ten security vulnerabilities on network devices. These findings demonstrate the effectiveness of large language models in protocol security testing and provide a novel intelligent approach to protocol analysis and vulnerability discovery.

  • LI Zhiqiang, HUANG Xin, LI Sudan, HAN Biao
    Accepted: 2025-09-29

    With the widespread deployment of unmanned aerial vehicle (UAV) swarms in emergency response, intelligent reconnaissance, and collaborative operations, identity authentication technologies face critical challenges such as communication link exposure, dynamic node mobility, and resource constraints. To address these issues, this paper proposed a multi-module entropy-cooperative PUF (Physical Unclonable Function) generation method tailored for general-purpose micro-UAV platforms. The method leveraged onboard hardware components—including analog-to-digital converters (ADC), pulse-width modulators (PWM), real-time clocks (RTC), and floating-point units (FPU)—as heterogeneous entropy sources. A self-supervised encoder with cross-layer residual connections was employed to extract stable features from each module while preserving critical identification cues through residual pathways. This design generated challenge-response pairs (CRPs) with improved stability and uniqueness, effectively mitigating the instability, limited entropy strength, and modeling vulnerabilities found in single-module PUFs. In addition, a decentralized identity authentication protocol was designed based on extended CRPs to overcome the reliance on centralized authorities and the risk of single points of failure. Experimental results showed that the proposed PUF generation method significantly outperformed traditional schemes in resisting machine learning-based modeling attacks. Formal analysis under the Dolev-Yao threat model using the Scyther tool further validated the security of the proposed distributed authentication process, revealing no feasible attack paths across multiple simulated adversarial rounds. This work provides a lightweight, hardware-compatible authentication solution that enables secure, decentralized identity verification for UAV swarms operating in dynamic and resource-constrained environments.