Yossioren / AttacksonImplementationsCourseBookLinks
☆234Updated 7 months ago
Alternatives and similar repositories for AttacksonImplementationsCourseBook
Users that are interested in AttacksonImplementationsCourseBook are comparing it to the libraries listed below
Sorting:
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- Side-channel toolkit in Julia☆165Updated 3 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆98Updated 3 weeks ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆50Updated 5 years ago
- ☆194Updated last year
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Updated 7 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆77Updated last month
- Website and PoC collection for transient execution attacks☆187Updated last year
- Code and exercises for a workshop on z3 and angr☆230Updated 4 years ago
- Nailgun attack on ARM devices.☆167Updated 4 years ago
- This repository contains several tools to perform Cache Template Attacks☆154Updated last year
- Differential Address Trace Analysis☆58Updated last year
- The code to the SGX-ROP paper☆184Updated 5 years ago
- A practical attack framework for precise enclave execution control☆460Updated 3 months ago
- Tools for "Another Flip in the Wall"☆38Updated 7 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆187Updated 2 weeks ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆65Updated 9 years ago
- Microarchitectural exploitation and other hardware attacks.☆94Updated last year
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Side-Channel Analysis Library☆96Updated this week
- Python Elliptic Curve Side-Channel Analysis toolkit.☆61Updated last week
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated 2 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆316Updated last year
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- A curated list of awesome side-channel attack resources☆88Updated last month