Differential Address Trace Analysis
☆63Mar 27, 2024Updated last year
Alternatives and similar repositories for DATA
Users that are interested in DATA are comparing it to the libraries listed below
Sorting:
- Instruction cache leakage detection tool for modular exponentation software.☆15Mar 17, 2017Updated 8 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- ☆38Mar 20, 2017Updated 8 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- ☆37Jun 6, 2017Updated 8 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆85Feb 12, 2026Updated 3 weeks ago
- ☆41Feb 25, 2019Updated 7 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Sep 20, 2023Updated 2 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 3 months ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆83May 13, 2019Updated 6 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- 🦜 yair - a high-level compiler IR entirely written in Rust☆38Dec 11, 2021Updated 4 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Line-based testcase reducer☆100Dec 15, 2025Updated 2 months ago
- ☆48Dec 19, 2018Updated 7 years ago
- ☆54May 13, 2024Updated last year
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 6 years ago
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- A tutorial on side channel leakage modelling using linear regression☆14Nov 20, 2017Updated 8 years ago
- Side-channel traces visualizer☆16Apr 28, 2025Updated 10 months ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- ☆58Oct 15, 2020Updated 5 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Nov 30, 2025Updated 3 months ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- ☆13Sep 6, 2021Updated 4 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Lazily wraps various Linux system auditing tools☆20Oct 26, 2025Updated 4 months ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year