danpage / scale
SCALE: Side-Channel Attack Lab. Exercises
☆43Updated last year
Alternatives and similar repositories for scale:
Users that are interested in scale are comparing it to the libraries listed below
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆49Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆61Updated 7 years ago
- Side-channel toolkit in Julia☆161Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆161Updated 3 years ago
- ☆20Updated 5 years ago
- Differential Address Trace Analysis☆55Updated last year
- Qt Side Channel Analysis Tool to handle signal traces and more☆32Updated 3 years ago
- ☆149Updated 6 years ago
- Tools for "Another Flip in the Wall"☆38Updated 6 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Updated 8 years ago
- ☆187Updated 10 months ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 5 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- ☆73Updated 6 years ago
- Tools for timing attacks☆18Updated 9 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆63Updated 8 years ago
- RHme+ 2015 challenge☆111Updated 8 years ago
- This repository contains several tools to perform Cache Template Attacks☆148Updated last year
- Python Elliptic Curve Side-Channel Analysis toolkit.☆58Updated 2 weeks ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆74Updated 5 years ago
- ☆228Updated 3 months ago
- Program for finding low gate count implementations of S-boxes.☆39Updated 5 months ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Differential fault analysis framework for AES128☆48Updated 11 years ago