Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis"
☆14Oct 29, 2020Updated 5 years ago
Alternatives and similar repositories for EnsembleSCA
Users that are interested in EnsembleSCA are comparing it to the libraries listed below
Sorting:
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- ☆17May 26, 2020Updated 5 years ago
- Datasets from CHES papers on random delays☆13Apr 13, 2021Updated 4 years ago
- ☆44Jun 27, 2022Updated 3 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆11Aug 26, 2025Updated 6 months ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- ☆13Feb 8, 2022Updated 4 years ago
- DL-LA: Deep Learning Leakage Assessment. Source Code and Traces.☆17Nov 9, 2023Updated 2 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Deep Learning-based Framework for Side-Channel Analysis☆39Apr 22, 2022Updated 3 years ago
- Side Channels Analysis and Deep Learning☆229Dec 31, 2025Updated 2 months ago
- A curated list of awesome side-channel attack resources☆106Nov 23, 2025Updated 3 months ago
- Software Implementation of Masked AES S-box with Packed Multiplication☆22Sep 12, 2020Updated 5 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- A High-Performance Side-Channel-Resistant AES on GPUs☆13May 9, 2019Updated 6 years ago
- Control a TEA5767 fm radio with your Flipper Zero☆10Apr 26, 2023Updated 2 years ago
- this is the notes of cuda c++ programming guide, which hopes record my think in learning.☆13Sep 4, 2025Updated 5 months ago
- 2018秋招数据开发类复习总结☆11Aug 5, 2019Updated 6 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- Manage efficiently your heavy side-channel datasets with eShard library and process them with http://gitlab.com/eshard/scared. This is a …☆14Jan 28, 2026Updated last month
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 6 years ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆17Nov 15, 2022Updated 3 years ago
- The code of MultiSPANS.☆12Oct 20, 2023Updated 2 years ago
- ☆54May 13, 2024Updated last year
- Masked Ascon Software Implementations☆12May 3, 2022Updated 3 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- 3d Telepresence(SBS) Platform using Google Cardboard and Raspberry Pi 2☆12Nov 9, 2017Updated 8 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android☆17Apr 26, 2018Updated 7 years ago
- ECM Factorization on CUDA-GPUs☆14Sep 29, 2020Updated 5 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- ☆15Feb 24, 2021Updated 5 years ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated last year