☆239Jan 6, 2025Updated last year
Alternatives and similar repositories for AttacksonImplementationsCourseBook
Users that are interested in AttacksonImplementationsCourseBook are comparing it to the libraries listed below
Sorting:
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆192Updated this week
- ☆19Dec 28, 2021Updated 4 years ago
- ☆12May 6, 2020Updated 5 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆132Feb 13, 2022Updated 4 years ago
- ECED440 Computer Security☆11Updated this week
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Side-channel analysis setup for OpenTitan☆37Nov 3, 2025Updated 4 months ago
- A curated list of awesome side-channel attack resources☆107Nov 23, 2025Updated 3 months ago
- Source code for the HorrorScope and material for the ScaCheapier workshop☆25Dec 24, 2019Updated 6 years ago
- ☆55May 13, 2024Updated last year
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆15Sep 16, 2020Updated 5 years ago
- ☆17May 26, 2020Updated 5 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based …☆14Oct 29, 2020Updated 5 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆45Sep 20, 2023Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆404Sep 5, 2023Updated 2 years ago
- The Art, Science, and Engineering of Fuzzing: A Survey☆229Jan 3, 2026Updated 2 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated last week
- The new phuzzing framework!☆164Jun 14, 2024Updated last year
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- a tool to analyze filesystem images for security☆512Oct 8, 2023Updated 2 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- ☆17Nov 14, 2022Updated 3 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,436Feb 25, 2026Updated 3 weeks ago
- A tool for side-channel attacks (SCAs) using deep learning (DL)☆17Apr 1, 2025Updated 11 months ago
- ☆13Sep 6, 2021Updated 4 years ago
- Side Channels Analysis and Deep Learning☆233Dec 31, 2025Updated 2 months ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆459Feb 7, 2024Updated 2 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆978Jan 7, 2026Updated 2 months ago