Differential Address Trace Analysis
☆63Mar 27, 2024Updated 2 years ago
Alternatives and similar repositories for DATA
Users that are interested in DATA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Instruction cache leakage detection tool for modular exponentation software.☆14Mar 17, 2017Updated 9 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- ☆37Mar 20, 2017Updated 9 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆15Sep 7, 2020Updated 5 years ago
- ☆38Jun 6, 2017Updated 8 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated 2 months ago
- Datasets from CHES papers on random delays☆14Apr 13, 2021Updated 5 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 6 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆87May 13, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆86Apr 1, 2026Updated last month
- ☆47Dec 19, 2018Updated 7 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- ☆41Feb 25, 2019Updated 7 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 8 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆48Apr 15, 2018Updated 8 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- ☆55May 13, 2024Updated last year
- Python Elliptic Curve Side-Channel Analysis toolkit.☆64Mar 8, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆82Nov 15, 2025Updated 5 months ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆54Feb 15, 2020Updated 6 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 7 years ago
- A basic UNIX shell implementation in C☆34Oct 2, 2019Updated 6 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- ☆57Oct 15, 2020Updated 5 years ago
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆195Apr 2, 2026Updated last month
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆39Dec 8, 2022Updated 3 years ago
- Native Segwit (Bech32) vanity address generator using the secp256k1 library used in Bitcoin Core.☆22May 26, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago