KarenWest / hardwareSecurity
hardware security course from Coursera and University of Maryland
☆27Updated 10 years ago
Alternatives and similar repositories for hardwareSecurity:
Users that are interested in hardwareSecurity are comparing it to the libraries listed below
- Hardware Security Labs☆30Updated 7 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆29Updated 3 years ago
- ☆41Updated 8 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- CSAW Embedded Security Challenge 2020☆26Updated 4 years ago
- Solutions for the Matasano Crypto Challenges☆22Updated 6 years ago
- Tools for timing attacks☆18Updated 9 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆44Updated last year
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 10 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- Software Security course☆21Updated 10 years ago
- Lecture notes for the Hardware and Embedded Systems Security lecture☆80Updated last year
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 3 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Updated 6 years ago
- ☆12Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- ☆20Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆29Updated 8 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆73Updated 6 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- ☆20Updated 5 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago