KarenWest / hardwareSecurity
hardware security course from Coursera and University of Maryland
☆27Updated 10 years ago
Alternatives and similar repositories for hardwareSecurity:
Users that are interested in hardwareSecurity are comparing it to the libraries listed below
- Hardware Security Labs☆30Updated 7 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆19Updated 11 years ago
- Modular library for manipulating physically-uncloneable functions☆18Updated 8 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- Eliminating Keystroke Timing Attacks☆21Updated 7 years ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 3 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- Software Security course☆21Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- ☆17Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆36Updated 10 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆29Updated 3 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- ☆14Updated 9 years ago
- Cryptanalysis library for breaking classical ciphers☆26Updated 5 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 2 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 10 years ago
- A Security and Privacy Guide for non-technical users☆44Updated 9 years ago
- ☆198Updated 9 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Scapy hands-on at #GreHack16☆15Updated 8 years ago
- A research tool to identify the version of shared library files.☆22Updated 8 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- distributed www CMS spyder☆8Updated 7 years ago
- ☆10Updated 8 years ago