0xADE1A1DE / Rosita
☆15Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Rosita
- ☆45Updated 6 months ago
- ☆21Updated 4 years ago
- Side-channel analysis setup for OpenTitan☆28Updated 2 months ago
- ☆14Updated 11 months ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆11Updated last year
- Secure AES128 Encryption Implementation for ATmega8515☆34Updated 3 years ago
- ☆12Updated 3 years ago
- ☆23Updated 9 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆18Updated last year
- An open-source deterministic fault attack simulator prototype☆50Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Side-Channel Analysis Library☆74Updated 2 months ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆28Updated 2 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆11Updated last year
- Microarchitectural exploitation and other hardware attacks.☆81Updated 7 months ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆21Updated 5 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆55Updated 3 months ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆20Updated 6 months ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 2 years ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆29Updated 7 months ago
- Medusa Repository: Transynther tool and Medusa Attack☆20Updated 4 years ago
- ☆12Updated 2 years ago
- ☆17Updated 2 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 4 months ago
- ☆44Updated 5 years ago
- Designs of first-order SCA-secure hardware implementations of AES encryption/decryptoin dedicated to Xilinx FPGAs (using BRAM)☆14Updated 3 years ago
- HW interface for memory caches☆26Updated 4 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated last month
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 4 years ago