KarenWest / hardwareSecurityLinks
hardware security course from Coursera and University of Maryland
☆28Updated 10 years ago
Alternatives and similar repositories for hardwareSecurity
Users that are interested in hardwareSecurity are comparing it to the libraries listed below
Sorting:
- Hardware Security Labs☆31Updated 8 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Updated 2 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 4 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Updated 2 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- GDB cheatsheet for reversing binaries☆21Updated 7 years ago
- Lecture notes for the Hardware and Embedded Systems Security lecture☆80Updated 2 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆78Updated 6 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Updated 7 years ago
- Timing Sidechannel workshop☆30Updated 12 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 8 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11Updated 8 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Updated 7 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Updated 8 years ago
- Embedded AppSec Best Practices☆45Updated 3 months ago
- ☆43Updated 9 years ago
- ☆153Updated 7 years ago
- Kernel Hacking study materials collection☆108Updated 9 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 7 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- The USB host security assessment tool☆286Updated 7 years ago
- Modular library for manipulating physically-uncloneable functions☆19Updated 9 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- Stuff for the DEFCON 24 Car Hacking Village Badge☆13Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆194Updated 8 years ago