dim0x69 / embedded-systems-security-examples
embedded-systems-security-examples
☆26Updated 3 years ago
Alternatives and similar repositories for embedded-systems-security-examples:
Users that are interested in embedded-systems-security-examples are comparing it to the libraries listed below
- An open-source deterministic fault attack simulator prototype☆58Updated 4 years ago
- Sample Code for Embedded and Real-Time Operating Systems by K. C. Wang☆21Updated 7 months ago
- mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology…☆54Updated 3 weeks ago
- MultiZone® Security TEE for Arm® Cortex®-M is the quick and safe way to add security and separation to any Cortex-M based device. MultiZo…☆14Updated last year
- Coresight Access Library☆118Updated last week
- Espressif ROM binaries☆22Updated 5 months ago
- ZedBoard Bare Metal examples☆23Updated 4 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆59Updated 7 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆31Updated last year
- Sources for the AARCH64 experiments for posts on https://krinkinmu.github.io/☆30Updated 2 years ago
- 🌄 RISC-V Ecosystem Landscape: a living document that developers, investors, vendors, researchers and others can use as a resource on the…☆14Updated this week
- ChipWhisperer CW308 UFO Target Hardware Files☆34Updated last week
- Python Based ARM CoreSight Debug and Trace Tools☆76Updated 2 years ago
- Side-channel analysis setup for OpenTitan☆30Updated last week
- ☆82Updated 2 weeks ago
- LTZVisor: a Lightweight TrustZone-assisted Hypervisor☆80Updated 6 years ago
- Gathers most appreciated Linux debugging methods in a step by step manual.☆20Updated 5 years ago
- Reverse engineering the TI AM3358 boot ROM☆51Updated 7 months ago
- A FREE comprehensive step-by-step embedded RISC-V hacking tutorial covering RISC-V Embedded Software Development to Reverse Engineering.☆20Updated 5 months ago
- CSAW Embedded Security Challenge 2020☆26Updated 4 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 3 years ago
- Read only mirror for Hafnium☆12Updated this week
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆61Updated 2 weeks ago
- Proof-of-concept for the GhostWrite CPU bug.☆106Updated 7 months ago
- C native app that takes an EXE file, automatically figures out all the DLL dependencies, and copies them next to the EXE.☆12Updated last year
- A set of benchmarks chosen to show the energy consumption of embedded devices under different conditions☆63Updated 2 years ago
- This repository contains my individual work for the "Build Your Own RealTime OS (RTOS) From Ground Up™ on ARM 1" Udemy class created and …☆27Updated 4 years ago
- Coresight Wire Protocol (CSWP) Server/Client and streaming trace examples.☆25Updated last month
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆54Updated 2 years ago
- Security payload for next-Gen firmware architecture☆52Updated 2 years ago