Fraunhofer-AISEC / DATAView external linksLinks
Differential Address Trace Analysis
☆63Mar 27, 2024Updated last year
Alternatives and similar repositories for DATA
Users that are interested in DATA are comparing it to the libraries listed below
Sorting:
- ☆11Oct 28, 2020Updated 5 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- ☆37Jun 6, 2017Updated 8 years ago
- Python library for Alphanov's PDM laser sources control☆13Jan 16, 2026Updated 3 weeks ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- ☆41Feb 25, 2019Updated 6 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 2 months ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆83May 13, 2019Updated 6 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Line-based testcase reducer☆100Dec 15, 2025Updated last month
- ☆54May 13, 2024Updated last year
- ☆48Dec 19, 2018Updated 7 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- Side-channel traces visualizer☆16Apr 28, 2025Updated 9 months ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 6 years ago
- Datasets from CHES papers on random delays☆13Apr 13, 2021Updated 4 years ago
- ☆58Oct 15, 2020Updated 5 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Nov 30, 2025Updated 2 months ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- Lazily wraps various Linux system auditing tools☆19Oct 26, 2025Updated 3 months ago
- ☆13Sep 6, 2021Updated 4 years ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- A research tool to identify the version of shared library files.☆22Mar 14, 2017Updated 8 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Symbiotic is a tool for finding bugs in computer programs based on instrumentation, program slicing and KLEE☆335Feb 2, 2026Updated last week
- A free and open source tool for Deep Learning Side Channel Analysis☆16Oct 31, 2019Updated 6 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 5 months ago
- AES-128 and DES differential fault analysis☆16Jan 20, 2021Updated 5 years ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated last week
- BinaryCFGExtractor is an automated tool for extracting binary code control flow graph (CFG).☆18May 23, 2021Updated 4 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 4 years ago
- A library for binary analysis and rewriting☆49Sep 28, 2023Updated 2 years ago